Security Program Charter Assignment Kevin Splittgerber
Security Program Charter Assignment Kevin Splittgerber
Kevin Splittgerber
The HIC, Inc. company is fully committed to utilizing the latest in information
technology to produce efficient systems that speed the delivery of our products to our internal
and external customers and produce Health Insurance Portability and Accountability Act
contains highly sensitive personally identifiable information and confidential medical records, it
is imperative that all levels of the organization participate in the cyber security program.
Protecting the availability, integrity and is everyone’s responsibility. As such the organization
produced the security charter contained within this document. This charter provides the
guidance for the establishment all security related policies, guidelines, standards and procedures.
Scope
The security program shall apply to and be accepted by all persons who are invited to
work on or participate in any part of the organization’s business operations. This applies to full
time, part time, contracted and temporary team members as well as external organizations who
Mission Statement
The HIC, Inc company cyber security program will use the risk management framework
to inventory the organization’s information systems, assess vulnerabilities, risk and criticality,
develop and implement security controls as well as continuously monitor the controls to actively
determine the effectiveness in mitigating risk. The security policies developed during this
process will be fully aligned with the applicable HIPAA regulatory requirements, as well as the
needs of the business operations and the privacy needs of our internal and external customers.
Security policies, controls, procedures, guidelines and standards will be routinely reassessed
ASSIGNMENT 1 SECURITY PROGRAM CHARTER 3
when changes are made to the system to ensure compliance with the established cyber security
charter.
Ownership
The cyber security program charter and resulting policies, procedures, standards and
guidelines are approved by the HIC, Inc. Chief Executive Officer (CEO). The charter assigns the
Chief Information Officer (CIO) as the owner and responsible party of the cyber security
program. The CIO appoints a Chief Information Security officer (CISO) to be the steward of the
cyber security program and is responsible for the development and maintenance of the program,
as well as ensuring compliance with the charter and applicable regulatory requirements. In
addition, an effective training program and regular communication of the cyber security program
Any persons who fail to comply with the organization cyber security program may
receive disciplinary action, including termination of employment at HIC, Inc. and prosecution
under applicable laws. Regular compliance audits will be made to ensure that all team members
abide by the HIC Inc. cyber security policies. If it is determined that there are gaps in policy,
procedures, standards or guidelines, is it the responsibility of the CISO to review and revise the
deficient documents and create activities designed to remediate the deficiencies in policy,
Approved: ____________________________________________
John Smith
Chief Executive Officer