Comparison of Privacy and Security Policies Essay

Exclusively available on Available only on IvyPanda®
This academic paper example has been carefully picked, checked and refined by our editorial team.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment

Beth Israel

Beth permits occasional and limited personal use of information technology resources subject to the condition that such use does not interfere with the user’s or any other user’s work performance and result in the violation of the provisions of the privacy and security policies of the organization. The policy also states that the users cannot expect to have any expectation of privacy of the information generated by them using the technological resources of the organization. The policy prohibits the use of inappropriate or unlawful materials. The users are generally restricted from copying or distribution of any copyrighted materials except when they comply with the legal requirements of fair use. The policy further states that all the e-mail addresses assigned by the organization remain the property of Beth Israel (HIMSS).

Mayo

Mayo’s web policy states that the organization will not share the information that is submitted by the users to third parties unless it is warranted for any specific purposes. However the company will request the third parties to protect the information passed on by it. The company will take responsibility for ensuring that the information collected is accurate, up to date and complete. The policies also state that the organization will take reasonable steps to protect the personal information from loss, unauthorized access and misuse. The policy reiterates that subscribing to the policy statement the user has consented to abide by the terms of the company’s policies regarding the use of the information resources (Mayo Healthcare).

Georgetown

Georgetown has laid down well-defined elaborate policies regarding the privacy and security of information. The most important policy pertains to the patient access to protected health information and accounting of disclosures. The organization permits the patients to inspect and obtain a copy of protected health information in a pre-designed format subject to certain restrictions. This ensures that the patient or any other users draw only necessary information.

While the policies regarding the access and use of information remain the same in all the three organizations, Georgetown has laid down policies, which are different from other organizations, which can be considered to provide better privacy and security of information. One of the distinguishing features of the security and privacy policy of Georgetown is that the patients may request for an accounting of disclosures to any other authority or user (Georgetown University).

This ensures higher level of security of personal information, as the organization commits itself to provide the patients to pass on information on the nature of information disclosed and the authority or third party to whom the disclosures were made. However, the organization may not provide disclosures of information pertaining to treatment, payment and health care operations and several other information contained in the policy statement. Another feature that makes the policies of Georgetown distinct from others is that the University entertains the requests of patients to enable them to receive communication of protected health information by alternative means or alternative locations. This policy enhances the availability and utility of information more than the others do.

References

Georgetown University ‘University Policies: Privacy Policies’. 2009. Web.

HIMSS Managing Information Privacy &Security in Healthcare’. Web.

Mayo Healthcare ‘Privacy Policy’. 2009. Web.

Print
More related papers
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2022, March 4). Comparison of Privacy and Security Policies. https://ivypanda.com/essays/comparison-of-privacy-and-security-policies/

Work Cited

"Comparison of Privacy and Security Policies." IvyPanda, 4 Mar. 2022, ivypanda.com/essays/comparison-of-privacy-and-security-policies/.

References

IvyPanda. (2022) 'Comparison of Privacy and Security Policies'. 4 March.

References

IvyPanda. 2022. "Comparison of Privacy and Security Policies." March 4, 2022. https://ivypanda.com/essays/comparison-of-privacy-and-security-policies/.

1. IvyPanda. "Comparison of Privacy and Security Policies." March 4, 2022. https://ivypanda.com/essays/comparison-of-privacy-and-security-policies/.


Bibliography


IvyPanda. "Comparison of Privacy and Security Policies." March 4, 2022. https://ivypanda.com/essays/comparison-of-privacy-and-security-policies/.

Powered by CiteTotal, best bibliography tool
If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
Cite
Print
1 / 1