Describe the security issues of bcbst

Assignment Help Computer Engineering
Reference no: EM132052125

Question: This assignment consists of two (2) sections: a written paper and a PowerPoint presentation. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for.

Health Information Technology (HIT) is a growing field within health services organizations today; additionally, health information security is a major concern among health organizations, as they are required to maintain the security and privacy of health information. The Department of Health and Human Services (HHS) provides extensive information about the Health Insurance Portability and Accountability Act (HIPAA).

Visit the HHS Website, for more information about HIPAA requirements. In March 2012, the HHS settled a HIPAA case with the Blue Cross Blue Shield of Tennessee (BCBST) for $1.5 million. Read more about this case. As an IT security manager at a regional health services organization, your CIO has asked for the following: an analysis of this incident, an overview of the HIPAA security requirements necessary to prevent this type of an incident, and a briefing for management on the minimum security requirements to be HIPAA complaint.

Section1: Written Paper1. Write a three to five (3-5) page paper in which you:

a. Describe the security issues of BCBST in regard to confidentiality, integrity, availability, and privacy based on the information provided in the BCBST case.

b. Describe the HIPPA security requirement that could have prevented each security issue identified if it had been enforced.

c. Analyze the corrective actions taken by BCBST that were efficient and those that were not adequate.

d. Analyze the security issues and the HIPAA security requirements and describe the safeguards that the organization needs to implement in order to mitigate the security risks. Ensure that you describe the safeguards in terms of administrative, technical, and physical safeguards.

e. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your written paper must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; references must follow APA or school-specific format. Check with your professor for any additional instructions.

• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required page length.

Section 2: PowerPoint Presentation2. Create a six to eight (6-8) slide PowerPoint presentation in which you:

a. Provide the following on the main body slides:

i. An overview of the security issues at BCBST

ii. HIPAA security requirements that could have prevented the incident

iii. Positive and negative corrective actions taken by BCBST

iv. Safeguards needed to mitigate the security risks

Your PowerPoint presentation must follow these formatting requirements:

• Include a title slide, four to six (4-6) main body slides, and a conclusion slide.

The specific course learning outcomes associated with this assignment are:

• Summarize the legal aspects of the information security triad: availability, integrity, and confidentiality.

• Use technology and information resources to research legal issues in information security.

• Write clearly and concisely about information security legal issues and topics using proper writing mechanics and technical style conventions.

Reference no: EM132052125

Questions Cloud

Describe the method you would use to identify exploits : Suppose you work as a security analyst and during a weekly meeting your supervisor asks for your opinion about the ways in which the department.
Look at your daily activities : Look at your daily activities. Start thinking about some of the tasks you perform and all the decisions needed to accomplish it.
While loop and for loop in matlab : What is the difference between the while loop and for loop in matlab?
What type of leadership is most effective : MADS 6658 - Leadership Global Advanced Scholarship - Fairleigh Dickinson University - What type of leadership is most effective in the 21st century organization
Describe the security issues of bcbst : Describe the security issues of BCBST in regard to confidentiality, integrity, availability, and privacy based on the information provided in the BCBST case.
What are the logical steps the automobile takes : What is your expected output? What are the logical steps the automobile takes to complete the turn?
Program that asks the user to enter a time duration in hours : Write program that asks the user to enter a time duration in hours, minutes, and seconds and then displays the time in terms of hours in decimal format.
Write the most important suggestions from the plan : Search the Internet for IT governance planning. Select a specific governance plan that exists at a company or a plan framework from an organization.
Receipt that contains all the information about their cheese : Vic wants to provide his customers with a receipt that contains all the information about their cheesecake and the total purchase price

Reviews

Write a Review

Computer Engineering Questions & Answers

  Assess the role of technology in project management

Summarize tools and techniques commonly used in project procurement. Assess the role of technology in project management.

  Design the logic for the game hangman

Design the logic for the game Hangman, in which the user guesses letters in a hidden word. Store the letters of a word in an array of characters.

  Which of the statements is not correct

When creating a table, which of the subsequent statements is NOT correct?

  Discuss hackers use not only computerized methods to steal

Hackers use not only computerized methods to steal your data but also social methods to prey on your emotions to obtain confidential data

  Why is a firewall usually a good place to terminate a

why is a firewall usually a good place to terminate a virtual private network vpn connection from a remote user? why

  Why are buses used in computers

Why are buses used in computers? Describe the similarities and differences between the computer bus and the electric power grid.

  Develop rwd for your microsite and use bootstrap framework

Develop RWD for your microsite and use the bootstrap framework to implement it. Explain the message that you want to communicate through your microsite.

  Create a measurement matrix in excel that identifies

Create a measurement matrix in Excel that identifies, categorizes, and ranks as many relevant performance measurements as you think are important.

  What are the possible return values of fork

Explain briefly differences between process, kernel, filesystem, persistence and give examples. What are the possible return values of fork and what does each one mean

  Discuss encryption can have on incident response activities.

Discuss in your own words the effects that encryption can have on incident response activities.

  Show how to connect given ttl to right circulate the input

TTL 74194 is a 4-bit universal shift register. Show how to connect TTL 74194 to left shift the input discarding the leftmost bit and setting the rightmost bit.

  Find path from top left-bottom right which minimize numbers

Given a m x n grid filled with non-negative numbers, find a path from top left to bottom right which minimizes the sum of all numbers along its path.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd