Temas Variados

Páginas: 22 (5271 palabras) Publicado: 11 de diciembre de 2012
Goal Statement
Welcome to the Information Security lesson. In this lesson, you will learn some key techniques for keeping VA’s information secure.
Objectives
After completing this lesson, you will be able to:
1. identify the principles of computer and data security, including encryption, password protection, authorized use of computers, and data transmission/usage including appropriateuse of thumb drives, laptops, e–mail and text messaging;
2. identify the circumstances when the facility Information Security Officer should be contacted;
3. define "limited personal use" of government computers and systems; and
4. certify that you have read and will comply with the VA National Rules of Behavior.

Information Security Overview
Congress mandates that all VA employees,contractors, and all other users of VA information and VA information systems complete computer security training, including trainees, even if you come to VA for a brief rotation!
Information security helps you understand what you need to do to ensure:
* confidentiality, integrity, and the protection of VA’s sensitive information, including Veterans’ Personal Health Information (PHI);
*timely and uninterrupted flow of information throughout VA systems; and
* the protection of VA information and information systems from fraud, waste, and abuse.

Confidentiality

Confidentiality at VA means information is available only to those people who need it to do their jobs to take care of patients. To maintain confidentiality you must:
* understand what information you haveaccess to and why;
* not access information that you don’t need for your role;
* read and follow remote access security policies;
* only access information systems through approved hardware, software, solutions, and connections;
* take appropriate steps to protect information, network access, passwords, and equipment;
* control access to patient files or information saved ondisks or other media (such as thumb drives or CDs); and not use automatic password–saving features found on web sites.
Promptly report to your ISO (Information Security Officer) if you are concerned that any Veteran’s personal information has been compromised. If you do not know your ISO, ask your supervisor. Every VA facility has an ISO who can help you with any questions you may have.

What arethe VA National Rules of Behavior?
Prior to being granted access to VA’s information and information systems, you must agree to the VA National Rules of Behavior, stating you have read, understand, and will abide by these security rules. The VA National Rules of Behavior must be read and signed each year.
The VA National Rules of Behavior also contain the consequences of inappropriate behavior.Consequences vary depending on the violation and may include a written reprimand, being asked to leave your VA rotation, etc.

Electronic Transfer of Data

E–mail: Electronic mail (e–mail) helps us do our jobs faster. But using e–mail also has risks. Since e–mail is not private, never use e–mail to send VA sensitive personal information about Veterans unless the e–mail can be encryptedaccording to Federal guidelines (sometimes referred to as FIPS 140–2 approved). Because most trainees at VA will not be assigned a personal VA computer or VA encryption certificates, trainees should not send Veteran personally identifiable information by e–mail. Note: Do not send Veteran’s personal information to other people at your college or university, and do not send Veteran’s personal informationto yourself at other e–mail addresses (yahoo, gmail, etc.). This can compromise the security of a Veteran’s identity. If a Veteran’s identity is comprised, the VA pays for a year of credit monitoring services.
Text Messaging: Text messaging that is not encrypted according to Federal guidelines should not be utilized to send VA sensitive information about Veterans.
Removable Storage Media:...
Leer documento completo

Regístrate para leer el documento completo.

Estos documentos también te pueden resultar útiles

  • Temas variados
  • Temas variados
  • Temas variados
  • Temas variados
  • Temas varios
  • Temas Variados
  • Temas Variados
  • Temas Variados

Conviértase en miembro formal de Buenas Tareas

INSCRÍBETE - ES GRATIS