Evaluate hipaa security requirements

Assignment Help Other Subject
Reference no: EM133194630 , Length: Word Count: 500 Words

Assignment - HIPAA Cybersecurity Paper

Part 1 - Critical Analysis of the Law

1. Evaluate HIPAA security requirements for a security risk assessment (SRA).

How would you complete a security risk assessment that meets HIPAA security requirements? Outline it.

What physical, administrative, and technical safeguards would you recommend to keep data secure?

1. Evaluate HIT audits as a compliance tool . Describe an audit process you recommend that would meet the following criteria.

The audit is fair and unbiased and free from conflict of interest (1-2 points).

The audit results are effectively communicated to senior levels of the organization (1-2 strategies).

There is a process in place to correct any problems identified in the audit (1-2 actions).

How could a strong HIT audit system and the ACHE Code of Ethics serve to prevent the situation described in The Tracks We Leave: Chapter 9 Information Technology Setback: Heartland Health care System? Be specific and demonstrate understanding of the risks and how the compliance tool can be used specifically to control the risk

Part 2 - Strategic Compliance with the LawYou work for a large managed care organization (MCO) that includes 5 hospitals, 25 providers clinics, 1 health insurance company, and 10 pharmacies. The MCO is using electronic health records (EHR). Your organization is not using 2015 CEHRT. Your organization has been subject to medical identity theft through 3 recent cyberattacks that compromised the data of 2,000 patients. The cyberattacks all used a known vulnerability with poor data encryption during data transfer and poor security on the patient portal. All cyber-attacks removed the encryption or security safeguards to obtain patient data. The breach included a list of 20 HIV patients whose HIV status was being reported to the state as part of infectious disease reporting.

1. Evaluate what you need to do to respond to the cyberattack. Recommend a cyberattack response. Your response should include:

Methods to secure stolen data and mitigate harm (two).

Actions to correct the problem that allowed for the cyberattack (two).

2. Evaluate the breach notification requirements under HIPAA.

What breach notice actions do you recommend? (1-2)

When do they need to be completed?

3. Evaluate the organization's duty of privacy and security for HIV patients.

What do you recommend to keep this information secure during future reporting?

Are any additional protections required because of the HIV status? Why or why not?

Reference no: EM133194630

Questions Cloud

Should the nlrb rule in favor of the union : What should the result be in this case? Should the NLRB rule in favor of the union or in favor of the employer - On each event, nonemployee union organizers
Discuss how patient education can reduce health care costs : Patient Education Discussion - Identify and read two to three articles that discuss how patient education can reduce health care costs
Evaluate all safety training to ensure that form of training : Evaluate all safety training to ensure that the form of training and frequency of training needed by statute/regulation is being provided.
Why has union membership declined in the u. s. : University of Phoenix - Why has union membership declined in the U. S. since 1955? Do you expect this trend to continue? Explain why or why not. What value may
Evaluate hipaa security requirements : Evaluate HIPAA security requirements for a security risk assessment. Evaluate what you need to do to respond to the cyberattack
Do you think that the court was correct in holding : Business and Technical College - Do you think that the Court was correct in holding that Attorney Glenn Coe had apparent authority to settle the case with
Describes kiosk check-out process : Staryer University-Write a short narrative that describes the kiosk check-out process.
Describe real blockchain-based product : New York Institute of Technology-Manhattan Campus-Describe a real blockchain-based product that implements your chosen use case
Does patty have a right to privacy when using acme : Strayer University - Does Patty have a right to privacy when using Acme Corporation's e-mail system? Discuss the elements of the claim and how those elements

Reviews

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd