UR UMUC Healthy Fitness Center Business Solution Deanna Huntt December 1 st, 2013 University of Maryland University College.

Slides:



Advertisements
Similar presentations
FMS. 2 Fires Terrorism Internal Sabotage Natural Disasters System Failures Power Outages Pandemic Influenza COOP/ Disaster Recovery/ Emergency Preparedness.
Advertisements

INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Presentation Retail Security Key Holding Mobile Patrols Access Control Systems Manned Security Receptionist CCTV Monitoring.
Backup and Disaster Recovery (BDR) A LOGICAL Alternative to costly Hosted BDR ELLEGENT SYSTEMS, Inc.
CHCAC1C Provide support to the older person Chapter 4: Responding to risk.
Security Controls – What Works
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Factors to be taken into account when designing ICT Security Policies
Small Business Security By Donatas Sumyla. Content Introduction Tools Symantec Corp. Company Overview Symantec.com Microsoft Company Overview Small Business.
Risk management planning related to Health Information Technology
© 2003 by Carnegie Mellon University page 1 Information Security Risk Evaluation for Colleges and Universities Carol Woody Senior Technical Staff Software.
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
Cloud Computing How secure is it? Author: Marziyeh Arabnejad Revised/Edited: James Childress April 2014 Tandy School of Computer Science.
1 CHCOHS312A Follow safety procedures for direct care work.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Welcome to iDOC Corp. DocHost Solution Online Document Management DocHost 14 Day Free Trial
Protecting ICT Systems
To Protect What Matters!! Protection Against Computer Virus Unit portfolio presentation by Saira Imtiaz.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Systems Development Life Cycle Dirt Sport Custom.
Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Social.
Chapter 4.  Can technology alone provide the best security for your organization?
BUSINESS B1 Information Security.
© 2001 Carnegie Mellon University S8A-1 OCTAVE SM Process 8 Develop Protection Strategy Workshop A: Protection Strategy Development Software Engineering.
E-Security: 10 Steps to Protect Your School’s Network NEN – the education network.
Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Files are at risk from loss if your computer breaks or if you get a virus. Files can also become corrupted. Solutions: Make regular back ups of files Use.
FITNESSGRAM OUT WITH THE OLD AND IN WITH THE NEW.
The ProactiveWatch Monitoring Service. Are These Problems For You? Your business gets disrupted when your IT environment has issues Your employee and.
VDI for Clinical Researchers TEAM 2 Mimoza Dimodugno Ian Goodsell Robert McPherson Mathew Olsen Jesse Rivera 12/15/2012.
System Implementation Dr. Dania Bilal IS 582 Spring 2009.
The Culture of Healthcare Privacy, Confidentiality, and Security Lecture d This material (Comp2_Unit9d) was developed by Oregon Health and Science University,
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
Company small business cloud solution Client UNIVERSITY OF BEDFORDSHIRE.
PRESENTATION TITLE Presented by: Xxxx Xxxxx. Providence Health & Services Very large Catholic healthcare system 33 hospitals in AK, CA, MT, OR, WA 65,000.
PRIVACYRELIABILIT Y SECURITY Secures against attacks Protects confidentiality, integrity, and availability of data and systems Helps manage risk Protects.
Cindy Olvera, Johnathan Sloss Anabel Belmares, Robert Mora Edgar Salinas.
Business Continuity Disaster Planning
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
TECHDOTCOMP SUPPORT TECHDOTCOMP nd Ave, Seattle, WA 98122, USA Phone:
BASIC SECURITY THREATS TO INFORMATION SYSTEMS. All information systems linked up in networks are prone to security violations. All information systems.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
BizSmart Lunch & Learn Webinar Information Security and Protecting your business With the increased risk of some sort of cyber- attack over the past few.
Welcome to the ICT Department Unit 3_5 Security Policies.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Cloud Professional Services Cloud Assessment Cloud Migration.
Food Safety Program Based on HACCP Principles by Ramadan Badran
EAST AFRICAN DATA HANDLERS DATA SECURITY/MOBILITY
TCSEC: The Orange Book.
AAtom ERP.
Business Management and Booking Platform on Azure Brings Service Companies to the Cloud “As we grow, we need to be able to depend on our infrastructure,
Policies and Planning Premises: Strategic Management
CRM software: useful tool for building business
Contact Norton Antivirus | Norton Antivirus Support UK
Searchable. Secure. Simple.
Exergame Tracker Web App
Modular Object Scanning Technology (MOST)
Windows 10 Enterprise E3 for Small and Medium Business
Windows 10 Enterprise subscriptions in CSP – Messaging Summary
Unit 4 IT Security Kerris Davies.
Increase and Improve your PC management with Windows Intune
Edge Recorder Client
Microsoft Azure Takes Document Management, Automation and Collaboration Further in Cloud MINI-CASE STUDY “Faster time to market, reduced costs, increased.
Mid-size organizations cannot be under the impression they will not benefit from a cloud ERP solution. ERP solutions in the cloud make it possible for.
Improving Data Security & Protection Using Data Provenance Figure 1
Supports launch of cloud-based endpoint management service
Presentation transcript:

UR UMUC Healthy Fitness Center Business Solution Deanna Huntt December 1 st, 2013 University of Maryland University College

Purpose To formulate a solution to bring our fitness facility into this day and age by making technological improvements.

To be discussed… Status of UR UMUC Health Facility Problems Business Strategy Solution Benefits Risks

Problem The UR UMUC Healthy Facility is outdated! Generic Strategy: The Differentiation Strategy Strategic Business Area: Develop and improve upon a competitive edge Process to be improved: Improve our overall facility with the latest technology while catering to the needs and desire of our buyers

Solution We need to implement a computerized system into the UR UMUC Healthy facility.

Benefits We will be able to easily maintain customer records, client profiles, and employee documentation. We will be able to monitor cliental fitness progression and provide them with reports. We will be able to strengthen relationships with our customers. Data can be stored in cloud form

Risks Security Hazards Detection of threats within or to our systems Potential disasters and the ability to recover

Technological Factors Security: - Resistance against hackers - Prevention of viruses and other harmful outside sources - Protect sensitive customer information

Technological Factors Accessibility: - Simple user name and password login - Customers can update information - Easy access to employee information

Technological Factors Scalability: - Rooms to store all cliental information - Able to store all employee documentation - Cloud capabilities

Technological Factors Usability: - Tutorials and guides to assist new users - Staff assistance - Easy to use and maintain profiles

Conclusion/Summary Installing a computerized system will: -Our business will have a competitive edge and allow us to build strong relationships with our customers. - We will increase our business and productivity.

References MindBody (n.d.) Fitness Business Management Software. MindBody.com. Retrieved November 24, 2013 from: business-management- software?campaignID= PmPxAAK&W T.mc_id=Search_Google%28PPC%29_USCA_Fitn ess_software_software%20for%20fitness&gclid= CIKMgOj0_roCFQbNOgodHDgAlA