Information security

Home » Downloads » Information security

Information security

Week 1 Discussion Question 2
>
> In Discussion 2, you are asked to create a presentation using a web 2.0
> tool…….make sure you are creating a presentation and providing a link
> to that presentation……do NOT just tell the class what you would
> do….*you
> must create a presentation* using one of the tools discussed and provide
> the link to that presentation in your post.
>
>   *Confidentiality*
>   Reading the Report: Over 120 UCLA Hospital Staff Saw Celebrity Health
> Records <http://www.foxnews.com/story/0,2933,398784,00.html> article, what
> training could you as a manager put into place to avoid this situation?
> Present your training idea using any Web 2.0 tools
> <http://www.go2web20.net/>. How can this training on confidentiality be
> effective for the employees?
> Examples of Web 2.0 tools:
>
>    – Articulate – E-Learning Software and Authoring Tools
>    <http://www.articulate.com/>
>    – Jing <http://www.jingproject.com/>
>    – Reallusion <http://www.reallusion.com/crazytalk/>
>    – Slideshare <http://www.slideshare.net/>
>    – Smilebox <http://www.smilebox.com/>
>    – Voice Threa <http://voicethread.com/#home>
>

 

 

 

 

……………….Answer Preview…………….

           In the current world security breaches have become a normal phenomenon with organizations receiving security updates on a daily basis. In matters concerning patient privacy concerning their medical records the hospitals should employ methods such as the use of programs that prohibit unauthorized access. The supervisors should equally be discouraged from granting their subordinates their pass keys. The ultimate panacea to such a scenario as that of Los Angeles hospital would be employing security………………..

APA

305 Words

× Lets chat on whatsapp?