Create a security plan for medium sized health care facility

Assignment Help Management Information Sys
Reference no: EM13862494

Instructions:

There are two parts to this Assignment. Each one will help you better understand how security breaches are handled and give you the opportunity to create a security plan. Creating this security plan will help you understand what is needed to protect data.

Part I

1. Search the internet for news about security breaches in healthcare and other industries in the last three years. Suggested source for the latest breach information from the Office of Civil Rights:

Source: HIPAA Privacy, Security, and Breach Notification Audit Program: United States Department of Health & Human Services. Retrieved from https://www.hhs.gov/ocr/privacy/hipaa/enforcement/audit/index.html

2. Write a critical essay summarizing the two cases. In your summary, identify the principal threats in each of these cases and what could have been done to minimize these threats.

Part II

1. Using what you learned from Part I, create a security plan for a medium sized health care facility. In your security plan, evaluate how you would approach security threats from both inside and outside the organization. Be sure that you address the following items in your security plan:

a. physical and administrative safeguards: employee education, health information archival and retrieval systems, disaster recovery, storage media

b. access safeguards: authentication, password management

c. network safeguards: cloud computing, mobile devices to deliver health care, firewalls, encryption / decryption

d. security threats of mobile devices used in health care delivery

2. Critique the plan you have written, identifying its strengths, elements that were not covered in the text, and any additional omissions or weaknesses of the plan.

Reference no: EM13862494

Questions Cloud

Analyze the legal issues of e-business : Write a 350- to 700-word review of the article. Your review should assess the different types of and legal protections for intellectual property. Analyze the legal issues of e-business to include intellectual property, privacy, ethics, and securit..
What extent is your organization''s financial health affected : what extent is your organization's financial health affected by fiscal and monetary policy?
Manufactures variety of gasoline-powered : TruCut Mower Company manufactures a variety of gasoline-powered mowers for discount hardware and department stores. TruCut uses a job cost system and treats each customer's order as a separate job. Prepare a complete analysis of all activity in Work-..
What is your evaluation of the concept of the a and f look : What are the legal and ethical issues in this case? What is your evaluation of the concept of the "A&F look?" Have you personally observed this concept in practice?
Create a security plan for medium sized health care facility : Using what you learned from Part I, create a security plan for a medium sized health care facility. In your security plan, evaluate how you would approach security threats from both inside and outside the organization
Dollar markup and markup percent based on selling price : Oceanside Biking is a retail bicycle store. For last year's summer racing season, Oceanside purchased one new model of racing bike to use in a special promotion. To sell the chairs and pads quickly, the store priced the chairs at $135 each. Compute t..
How can socialization and mentoring be used to advance : How can socialization and mentoring be used to advance a career?
Net cash flows from these activities : The Hamada Company sales for 2016 totaled $151,000 and purchases totaled $87,000. Selected January 1, 2016, balances were: accounts receivable, $18,600; inventory, $14,300; and accounts payable, $10,800. December 31, 2016, balances were: accounts rec..
Transactions for fund statements-government-wide statements : Transactions for Fund Statements and Government-wide Statements. For each of the transactions, prepare journal entries to record them in appropriate governmental funds. Prepare journal entries to reflect how the transactions would be reflected in gov..

Reviews

Write a Review

Management Information Sys Questions & Answers

  Designing compliance within the lan-to-wan domain

Designing Compliance within the LAN-to-WAN Domain

  Changes to a supply chain1 what independent variables

changes to a supply chain1 what independent variables should you consider when recommending changes to a supply chain

  What personal characteristics would be useful

Some have suggested that neural networks could be applied to people to indicate how likely they are to develop a disease or even become criminals. What personal characteristics would be useful

  Grammack et al claimed the software development life cycle

grammack et al. claimed the software development life cycle is a design cycle in any project where an information

  Determine the allocation of variable costs

Allocation of variable costs - What amount of variable costs will be allocated when a division uses a minute of computer time?

  Technology advancement and data collectionhow does the

technology advancement and data collectionhow does the advancement of technology affect the ability to collect data?

  The usage and influence of outsourcing and cloud computing

the usage and influence of outsourcing and cloud computing on management information systems is the proposed topic of

  Role of information systems in todays business environment

Understand the role of information systems in today's business environment, Gain an overview of information technology

  Prepare an abbreviated annotated bibliography

Prepare an abbreviated annotated bibliography on four important components Operations Management' as a business function

  Team for a company technology change

Who should be involved in a technology team for a company technology change?

  What are the advantages and disadvantages of the electronic

what are the advantages and disadvantages of the electronic medical record for patients and for providers?1 assess the

  Perform a crude analysis to show the interactivity

Create a behavioral state machine for each of the complex classes in the class diagram. Perform a CRUDE analysis to show the interactivity of the objects in the system

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd