How will you go about handling this incident

Assignment Help Management Information Sys
Reference no: EM133499407

Question: How will you go about handling this incident? provide the steps? also how will you investigate this incident? what are the challenges and lesson learn? mitigating steps

As the IT Security manager ,please assist resolving this issue

Action:  Need to exam the media detail of text and photo.  

The patient photo was sent by text messaging via cell phone from someone in the facility to an outside contact. 

From a privacy view; 

  • the picture of the patient is identifiable. 
  • The nurse in the picture is identifiable.  
  • The computer has electronic demographics that can be digital enhanced to read (PHI). 
  • The setting is identifiable as a healthcare setting. SVH can be linked if viewer can identify the patient and/or the nurse or looks at the media detail. 
  • There is no evidence the photo was taken with consent of the patient via review of the chart.  
  • The photo of the patient was sent unsecure via test.

This constitutes a reportable breach of privacy. There is supporting evidence and continued risk. This event is reportable  to  HHS' Office for Civil Rights as an impermissible disclosure as a breach of unsecured PHI.

To mitigate circulation of this digital photo we need to determine who created the photo and where it was sent. Prior to informing the patient of the event.

Reference no: EM133499407

Questions Cloud

How the computer fraud and abuse act : How the Computer Fraud and Abuse Act and the Electronic Communications Privacy Act each specifically relate to the criminal activity described in the case study
Explain why continuous improvement is absolutely necessary : Explain why continuous improvement is absolutely necessary for an information assurance/information governance program
How different diagnoses appear on different skin tones : NSG 500- Complete the chart. When learning skin disorders, it is important to note how different diagnoses/conditions appear on different skin tones.
Examine the web page structure : Examine the web page structure by viewing the web page's source with the HTML loaded by the browser. Now if you were to examine the browser's internal web page
How will you go about handling this incident : How will you go about handling this incident? provide the steps? also how will you investigate this incident? what are the challenges and lesson learn
Explain what social media campaigns will be part : Explain what social media campaigns will be part of your strategy. Justify your strategy with research. Explain what promotional events will be part
Design a cybersecurity reporting strategy : Design a cybersecurity reporting strategy for an upcoming board meeting. Your Chief Information Security Officer (CISO) asked for your assistance
Provide an example of a vendor for each type of service : Provide an example of a vendor for each type of service - Describe each of the following terms: infrastructure as a service (IaaS) and software as a service
How article relates to sport licensing strategic alliances : how the article relates to sport licensing/strategic alliances. Be specific about what elements of the article relate to sport licensing/strategic alliances

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd