Information Security – Catalog of Services
- Policy and Procedures
Develop the policies and procedures for Information Services (HS) supported systems and processes, relating to the confidentiality, integrity, and availability of data, network and system security, and user access.
- Security Audits & Vulnerability Assessments
Perform general security audits to identify gaps and exposures, and risk assessments to assess the overall safety of the environment. These audits typically assess four key security aspects: policies and procedures, network controls, infrastructure and system protection (physical security, patch management), and data confidentiality.
Specific, detailed technical security audits or vulnerability assessments of any one or more aspects of the IS infrastructure.
Provide expert security support of internal and external company audits or CMS surveys.
- Security Consultation
Provide minimum requirements to best practices consultation and advice to, among others, HR, Compliance, Legal Counsel, Contracts, and other Information Services (HS) departments.
Provide research and interpretation of security and patient confidentiality rules and regulations.
- Security Investigations
In cooperation with HR, Compliance, and Legal Counsel, perform technical data gathering for personnel issues and patient confidentiality breaches.
Perform non-personnel investigations of security intrusions.
- Security Monitoring
Provide proactive monitoring and response for general security incidents and activity, including, Email abuse, firewall breaches, and virus intrusion.
Develop the processes and configure the systems used to provide security monitoring.
notification_important One Portal Maintenance
We’re cleaning up One Portal and removing outdated content to improve your experience. For more info or help, contact us.
