Please click on the link to read the following article:
After reading the article, review the sections on Technical Safeguards, including Access Control and Audit Controls in this module’s reading assignment. The author states that audit controls are “‘hardware, software, and /or procedural mechanisms that record and examine activity in information systems.’ Most information systems provide some level of audit controls and audit reports. These are useful, especially when determining if a security violation occurred” (Gartee, p. 404).
Next, review the information presented in the table. This data was pulled to view a general login and logout pattern in the EHR for hospital staff on the morning listed (01/05/16). These are descriptions of these staff members’ positions.
This space is for the file that i uploaded.
Given this information, answer the following questions:
Your response to this audit should be a one-two page document (four-five paragraphs) to provide a complete response to the audit results based on each of the roles.
Please no plagiarism on this work.