Explain which should be encrypted at storage

Assignment Help Computer Engineering
Reference no: EM133583743

Discussion Post: HIPAA Requirements

The Health Insurance Portability and Accountability Act (HIPAA) Security Rule defines the types of protected information and the safeguards that must be in place to ensure appropriate protection of electronic protected health information. For this activity, you will identify protected health information (PHI) that will require protection and identify control types to be placed on the protected HIPPAA data.

For your initial post, consider the scenario below.

Tom Jones completed his yearly medical checkup, and the doctor found that he had a small growth on his kidney that will require additional testing. Using what you have learned in this week, carefully evaluate the tables below with consideration of the HIPAA governance requirements. Table 1 has common personal information about Tom that you may see on most hospital visit forms. Table 2 has information about individuals and entities with some type of relationship with Tom. In your initial post, identify from Table 1 all the rows that are considered PHI. Evaluate the information and explain which should be encrypted at storage and which information should be left in clear text. Additionally, identify from Table 2 all the rows you believe HIPAA considers as associates of Tom. Support your statements with evidence from your sources.

Table 1

Tom Jones' Diagnostics: Liver Issue (Nephropathy)
Name
Telephone Number
Electronic email address
Social Security Number
Medical Record Number
IP address of his computer
Toms' Hobby
Toms' Driver's license number

Table 2

Tom's circle and relationship
Doctor
Kidney Specialist
Pharmacist
Priest
Medical Billing Organization
Insurance company
Children
Wife
Best Friend
Soccer Coach

Reference no: EM133583743

Questions Cloud

How might culture play a part in childrens involvement : How can children develop the communication skills necessary to participate effectively in such discussions?
Assesses penalties on hospitals with high readmission rates : assesses penalties on hospitals with high readmission rates for patients with certain medical conditions. requires that long-term care providers have contracts
Create a class description and make sure to include student : Within the template, complete each section. You will create a class description and make sure to include a student with ESL and a student with a disability.
List two routine health screening tools and their importance : List two routine health screening tools and their importance to your practice as an FNP (Family Nurse Practitioner). Support with evidence-based clinical
Explain which should be encrypted at storage : Evaluate the information and explain which should be encrypted at storage and which information should be left in clear text.
What is the next best step in his evaluation : What is the next best step in his evaluation? evaluation of an elevated bilirubin level detected on blood work for a preemployment physical.
What is the role of cms in ensuring compliance with : What is the role of CMS in ensuring compliance with the Affordable Care Act? Identify and explain specific initiatives/programs that are utilized by CMS.
Discuss effective treatment interventions : Effective Treatment Interventions Please discuss what key components are necessary for the effective treatment of substance use.
How can abeing healthya maintain and manage confidentiality : List any two (2) laws that have been breached in the above scenario. Give specific example of how they have breached them.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd