CIS 348 Information Technology Project Management Assignment

Assignment Help Other Subject
Reference no: EM132763214

CIS 348 Information Technology Project Management Assignment - Strayer University, USA

Learning Outcomes - The specific course learning outcomes associated with this assignment are:

Summarize the legal aspects of the information security triad: availability, integrity, and confidentiality.

Use technology and information resources to research legal issues in information security.

Write clearly and concisely about information security legal issues and topics using proper writing mechanics and technical style conventions.

Case Study - HIPAA, CIA, and Safeguards

This assignment consists of two (2) sections: a written paper and a PowerPoint presentation. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for.

Health Information Technology (HIT) is a growing field within health services organizations today; additionally, health information security is a major concern among health organizations, as they are required to maintain the security and privacy of health information. The Department of Health and Human Services (HHS) provides extensive information about the Health Insurance Portability and Accountability Act (HIPAA). Visit the HHS Website, at www.hhs.gov/ocr/privacy, for more information about HIPAA requirements. In March 2012, the HHS settled a HIPAA case with the Blue Cross Blue Shield of Tennessee (BCBST) for $1.5 million. As an IT security manager at a regional health services organization, your CIO has asked for the following: an analysis of this incident, an overview of the HIPAA security requirements necessary to prevent this type of an incident, and a briefing for management on the minimum security requirements to be HIPAA complaint.

Section 1: Written Paper

1. Write a three to five (3-5) page paper in which you: (900 words + references with in-text citations)

a. Describe the security issues of BCBST in regard to confidentiality, integrity, availability, and privacy based on the information provided in the BCBST case.

b. Describe the HIPPA security requirement that could have prevented each security issue identified if it had been enforced.

c. Analyze the corrective actions taken by BCBST that were efficient and those that were not adequate.

d. Analyze the security issues and the HIPAA security requirements and describe the safeguards that the organization needs to implement in order to mitigate the security risks. Ensure that you describe the safeguards in terms of administrative, technical, and physical safeguards.

e. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Section 2: PowerPoint Presentation

2. Create a six to eight (6-8) slide PowerPoint presentation in which you: (5 slides (500 words) + title slide + reference slide)

a. Provide the following on the main body slides:

i. An overview of the security issues at BCBST.

ii. HIPAA security requirements that could have prevented the incident.

iii. Positive and negative corrective actions taken by BCBST.

iv. Safeguards needed to mitigate the security risks.

Attachment:- Information Technology Project Management Assignment File.rar

Reference no: EM132763214

Social variables Milgram manipulated in the later experiment

Name 5 of the social variables Milgram manipulated in the later experiments. How did each of these affect the rate of obedience to authority?  Which social variable resulted i

Produce the collection of sets

COP 4020 - Your assignment is to read in a start symbol of a set of productions followed by the set of productions from stdin and produce the collection of sets of LR(0) ite

Discuss how to deal with this kind of situation

Many crimes involving emails have e-mail accounts set up in countries less willing to cooperate with the country in which the crime is being investigated. Discuss how to dea

Describe what is flood frequency analysis

What is flood frequency analysis? Flood records have been kept of the lower Mississippi River since 1543. If the greatest flood along the river occurred in 1927, what w

Important and useful chemistry application

We will investigate radiocarbon dating, a very important and useful chemistry application -  In order to advance from one page to the next, you first need to correctly answe

Calculate the height of a cliff

Calculate the height of a cliff when a ball is dropped from the cliff. The time for the fall is 10 second before hitting the ground (time of fall is 20 seconds) Given: Vo=0, V

Etype the sentence and draw vertical lines to identify

Directions: In a separate word document, retype the sentence and draw vertical lines to identify the slot boundaries in the following sentences; label each slot with its for

Child observation project

CHILD OBSERVATION PROJECT, This assignment will enable you to engage in field observations of children and will help you to assimilate several aspects of what is taught throug

Reviews

Write a Review

 
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd