Analyze the technical control and the non-technical controls

Assignment Help Management Information Sys
Reference no: EM131610206

Imagine you are the Information Security Officer at a medium-sized hospital chain. The CEO and the other senior leadership of the company want to ensure that all of their hospitals are and remain HIPAA compliant.

They are concerned about the HIPAA Security and Privacy Rules and its impact on the organization.

You begin looking at the information provided by the Department of Health and Human Services. Specifically, you are asked to provide an analysis of two (2) of the cases found here with emphasis on what was done to resolve the compliance issues.

Section 1. Written Paper

Non-compliance with HIPAA regulations can result in significant fines and negative publicity.

To help ensure that your organization remains in compliance with HIPAA regulations you have been asked to write a four (4) page paper in which you:

1a. Create an overview of the HIPAA Security Rule and Privacy Rule.

1b. Analyze the major types of incidents and breaches that occur based on the cases reported.

1c. Analyze the technical controls and the non-technical controls that are needed to mitigate the identified risks and vulnerabilities.

1d. Analyze and describe the network architecture that is needed within an organization, including a medium-sized hospital, in order to be compliant with HIPAA regulations.

1e. Analyze how a hospital is similar to and different from other organizations in regards to HIPAA compliance.

1f. List the IT audit steps that need to be included in the organization's overall IT audit plan to ensure compliance with HIPAA rules and regulations.

1g. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format

Section 2. Network Architecture

2a. Create a network architecture diagram (using Visio or an open-source equivalent to Visio for creating diagrams), based on the description of the network architecture that you defined above for the organization to be compliant with HIPAA regulations.

2b. Include in the diagram the switches, routers, firewalls, IDS / IPS, and any other devices needed for a compliant network architecture.

Reference no: EM131610206

Questions Cloud

Create a class rational number with given capabilities : Create a constructor that prevents a 0 denominator in a fraction, reduces or simplifies fractions that are not in reduced form and avoids negative denominators.
Describe three mystical moments : describe three mystical moments and how they can contribute to mind-body-spirit health
What hoger have to gain by advocacy of early implementation : Explain what Hoger have to gain by advocacy of early implementation. Identify who might be affected by the decision against early implementation.
Prepare the statement of financial position of winter ltd : Prepare the statement of financial position of Winter Ltd for the year ended 30 June 2017 in accordance with AASB 101
Analyze the technical control and the non-technical controls : Analyze the technical controls and the non-technical controls that are needed to mitigate the identified risks and vulnerabilities.
Every stage of program development : Discuss why it is important to involve the users at every stage of program development. How might a programmer better understand the needs of the user?
Find the area of a segment of a circle : Find the area of unusual shapes using the areras of sectors and segments and find the area of a segment of a circle
Explain the ethical dilemma portrayed : Describe the perspectives, needs, and expectations of each of the following health care stakeholders. Explain the ethical dilemma portrayed
Determine a rationale for the stock that you selected : Provide a rationale for the stock that you selected, indicating the significant economic, financial, and other factors that led you to consider this stock.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Speculate on the implications of improperly documenting

Explain the primary manner in which you would apply the seven-step method to resolve this issue.Speculate on the implications of improperly documenting.

  Business intelligences usageseven-eleven japan using

business intelligences usageseven-eleven japan using business intelligence for more than customer analysis. this use of

  Examine the different levels of security and how an

write a 1400- to 2100-word paper describing the importance of policies and standards for maintaining information

  Explain an ecommerce network and its application

Explain an ecommerce network and its application. Does a properly installed and maintained firewall provide adequate defense against intrusion?

  Gve relevant descriptive statistics including graphs run

so lets try a real correlation linear regression model that comes up quite often.try to solve this problem in r. we

  What company government should be responsible for defending

Should the United States assign US Cyber Command with the responsibility of protecting certain private companies and if so what should the general standard be for determining what companies the government should be responsible for defending.

  Discuss about the functions and excel tasks

Discuss about the Functions and Excel Tasks.Identify three (3) Microsoft Excel 2013 functions that you believe to be the most useful within the application. Next, describe one (1) way in which you would consider utilizing each of the functions you ..

  Global operations management sample questiona why is

global operations management sample questiona. why is effective operations management vital for a global

  Are some types of devices better suited to dhcp than others

Provide a brief description for each DHCP message that would be exchanged, in order, if the DHCP server is in the middle of rebooting during an initial lease request but comes up seconds later. Answers might be slightly different depending on whe..

  Discuss about the gamers for life application

The technology paper is subject to a formal review process, with a draft being submitted to the professor for review and feedback .

  Discuss the brand image you want to convey and why

Discuss the brand image you want to convey and why. Describe how your audience would identify with your product through branding.

  What are the benefits and risks of cloud computing

What are the benefits and risks of cloud computing? Do you use a cloud to store any of your files or photographs? Does your employer use a cloud to store files or sensitive documents? Don't be quick to say 'no' - do a little research and leg work..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd