I am getting an error:
Shelf: *
Folder: *
Page 1 of 3
Internet Use Filtering and Monitoring Policy
Effective Date: 4/16Current Revision Date:
Policy-
CHANGE the security of confidential patient data from Internet-based threats is imperative. A layered and strong security strategy will work to stop data from leaving the network at the perimeter and assist health organizations in complying with HIPAA regulations. Cyber risks can gravely impact organizational operations, the ability to access and transmit crucial patient data, and capacity to sustain a safe and productive environment for employees and patients.
The quality of healthcare provided by health organizations relies upon a secure network and readily accessible patient data, which can be safeguarded through sound Internet filtering. Filtering allows organizations to proactively defend against threats, prevent productivity loss from unmanaged online access, and minimize the risk of legal liability.
Definition
Internet Filtering: The use of technology to monitor instances of communication between devices on a network and the Internet as well as block traffic according to specific rules
User ID: Identifier used by associates to log into [ORGANIZATION NAME] network(s)
IP Address: Unique network address possessed by each device, permitting communication with other Internet capable devices on the network
SMTP: Simple Mail Transfer Protocol—the protocol that facilitates the mail messages exchange between Internet mail servers
Peer-to-Peer File Sharing: Services such as BitTorrent that permit hosts to upload files available for download by
other hosts
Social Networking Services: Internet sites such as Facebook that allow users to interact in online communications
and as well as share and post content
SPAM: Unsolicited Internet e-mail
Phishing: The attempt to fraudulently gain sensitive information by disguising oneself as a trusted entity in an
Internet communication
Hacking: Sites that offer information about subverting or violating computer security controls
Purpose-
The purpose of this policy is to outline standards for systems that limit and monitor Internet use from any host within [ORGANIZATION NAME]’s network. These standards are created to guarantee employees responsibly and safely use the Internet, and ensure that employee Internet use can be researched or monitored during an incident.
Equipment-
Virtual Desktops
Physical Personal Computers
Laptops
Ipads
Smart Phones (Using the Hosptial Internet)
Procedure
Website Monitoring
Access to Website Monitoring Reports
Internet Use Filtering Rule Changes
Internet Use Filtering Exceptions
Enforcement
Approved by:
Revision dates: 4/16
Author: Dan Yarian