Evaluate the training you can provide to your staff

Assignment Help Management Information Sys
Reference no: EM131190187

As an information systems manager, you need to consider an important aspect of your operation--patient information, privacy, and security. Review the following case scenarios and select one to use for your management plan for security and privacy.

Case Scenario 1 (Security Breach)

The administration at St. John's Hospital takes pride in its sound policies and procedures for the protection of confidential client information.

In fact, it serves as a model for other institutions in the area; however, printouts discarded in the restricted-access information systems department are not shredded. On numerous occasions, personnel working late have observed the cleaning staff reading discarded printouts.

What actions, if any, should these personnel take toward the actions of the cleaning staff? What actions, if any, should be taken by the information systems administration?

Case Scenario 2 (Natural Disaster)

Living on the Gulf Coast is a benefit that many residents of a small Southern town enjoy; however, natural disasters are a concern. The town has just been struck by a hurricane and the entire basement of your operation is flooded by the storm surge. Patient files were destroyed or washed away with the receding water. What actions do you take when patients ask for their health records? What processes did you have in place to protect your records in anticipation of such an event?

Research management plans and choose one of the scenarios above and develop a process for maintaining patient privacy and security.

Create a detailed management plan for patient data privacy and security in the case of a security breach (Case Scenario 1) or a natural disaster (Case Scenario 2).

Based on the management plan format you found through your research write a 1,400- to 1,750-word paper that details your facility's management plan.

Include the following:

Create a business problem statement.

Analyze how you will respond to these situations.

Evaluate the training you can provide to your staff.

Analyze the considerations of HIPAA and patient privacy compliance requirements in planning.

Analyze the need for an information technology management plan for natural disasters and security breaches.

Evaluate how you will implement your management plan.

Create a 350-to 700-word executive summary in which you review the management plan you designed. Explore possible challenges and the utilization of your plan.

Cite a minimum of three peer-reviewed, scholarly, or similar references, other than the textbook, that directly support your analysis.

Format your paper according to APA guidelines.

Reference no: EM131190187

Questions Cloud

Implement the lms adaptive filter algorithm : ELECENG 7015 - Adaptive Signal Processing, 2016 - Implement the LMS adaptive filter algorithm for interference cancellation in matlab and investigate what the effect of adaptive filtering has on the EEG signals and whether we can conclude that adap..
Determine the magnitude of the plane : At a given instant, the position of a plane at A and a train at B are measured relative to a radar antenna at O. Determine the distance d between A and B at this instant. To solve the problem, formulate a position vector, directed from A to B, and..
Write about the impact of this external factor : Write an essay that reflect upon the ways that social, political, and cultural developments have an impact upon you and your actions.
How would you choose an appropriate level of significance : How would you choose an appropriate level of significance for your statistical test? What are the possible outcomes and limitations of your statistical test?
Evaluate the training you can provide to your staff : What actions, if any, should these personnel take toward the actions of the cleaning staff? What actions, if any, should be taken by the information systems administration?
Momentum effect as a phenomenon : Why conservatism bias would give rise to momentum in stock market returns, and why the momentum effect as a phenomenon in empirical finance may persist for a long period of time?
Determine the position x that is required for equilibrium : The single elastic cord ABC is used to support the 40-lbload. The cord passes through the smooth ring at B and has an unstretched length of 6 ft and stiffness of k=50lb/ft.
Why a multinational corporation might decide to borrow : Determine key reasons why a multinational corporation might decide to borrow in a country such as Brazil, where interest rates are high, rather than in a country like Switzerland, where interest rates are low
Interest rates in financial markets : How does the time value of money affect interest rates in financial markets?

Reviews

Write a Review

Management Information Sys Questions & Answers

  What are some of the best practices

Best practices for business e-mail; effect of Web on why business is conducted and What are some of the best practices or etiquette that should be followed when writing business e-mails?

  Define what is the secure sockets layer

What is the Secure Sockets Layer (SSL) and how does it support e-commerce. What is the role of a CRM system. What sort of business benefits can such a system produce

  Explain how an organization organizes and operates

Explain how an organization organizes and operates to meet the needs of customers

  Explain the type of data that businesses process

Explain the type of data that businesses process and correlate for us how that data is transformed into information.

  The usage and influence of outsourcing and cloud computing

the usage and influence of outsourcing and cloud computing on management information systems is the proposed topic of

  Briefly describe the enterprise in terms of its operations

Illustrate how its e-commerce or ERP implementation integrated with related CT (information and communication technologies- data mining. business htelligences. data ware house. databases. internet. RFID. VAN. EDI)?

  Representations of a to-be system will differ

Data planning and modelling - Explain how logical and physical representations of a To-Be system will differ.

  Explain types of computerized information systems

Instructions Explain the following types of computerized information systems: Clinical, Management

  Define a test plan or script

Testing process summary: Define a test plan or script that identifies major software functionality and hardware to be tested with the required outcomes

  What are the pros and cons of methods such as single sign-on

What are the pros and cons of methods such as Single Sign-On (SSO). Weigh the user benefits to security risks when considering the remote access methods.

  Identify an mis management issue

Consult your text, lectures, and or Google searching for MIS management issues. Once you identify an MIS management issue you are ready to get started. Do not hesitate to contact me for questions

  Challenges of successful presentationstopic a please

challenges of successful presentationstopic a please discuss the followingwhat are the challenges that you personally

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd