Create a letter that incorporates the five required elements

Assignment Help Management Information Sys
Reference no: EM132005163

As the Privacy and Security Officer, one of the biggest fears that the board of directors (BOD) feared which caused a bit of hesitancy to move forward with the adoption of the EHR, has become a reality.

You were recently notified of a recently discovered data breach that impacted your employer which represents ten (10) hospitals along the northeast coast.

You are responsible for creating a breach notification letter.

This letter is sent to patients whose patient health information (PHI) has been compromised in the breach.

According to federal regulations, the breach notification letter must contain five required elements addressed in a customized manner according to the situational circumstances and consisting of:

A brief description of what happened, including the date of the breach and the date of the discovery of the breach, if known

A description of the types of unsecured PHI that were involved in the breach (i.e., full name, Social Security number, date of birth, home address, account number, diagnosis, or disability code)

Any steps individuals should take to protect themselves from potential harm resulting from the breach

A brief description of what the organization is doing to investigate the breach, to mitigate harm to the individuals, and to protect against any further breaches

Contact procedures for individuals to ask questions or learn additional information, which shall include a toll-free telephone number, an e-mail address, Website, or postal address If appropriate.

The organization may include other customized information, including:

Information about steps the organization is taking to prevent future similar breaches

Information about sanctions the organization imposed on workforce members involved in the breach; Identity of workforce members should be on a need-to-know basis according to organizational policy

Consumer advice directing the individual to review account statements and monitor credit reports

Recommendations that the individual place a fraud alert on their credit card accounts, or contact a credit bureau to obtain credit monitoring services, if appropriate

Contact information for credit reporting agencies, including the information needed for reports for criminal investigation and law enforcement
Contact information for national consumer reporting agencies

Create a letter that incorporates the five required elements, and also include all six of the subcategories of information found in item #5.

Using the actual breach case of the Affinity Health Plan in 2013 attached below; research a healthcare data breach that occurred within the past ten years to better assist you in understanding the true impact of a healthcare data breach and efforts taken to respond and prevent future occurrences.

You will need to make up the specifics about your health care organization (email address, website, phone number, address...) but use the case for specifics about the breach event.

Reference no: EM132005163

Questions Cloud

What diagnostic impression do you reach : What diagnostic impression do you reach based on the information gathered about Johnny? What is your rationale for ruling-out other diagnoses?
Extend his theories into the social realm : What was the eugenics movement, and how did some of these ideas play out in the 20th century?
How was darwin influenced by the field of economics : How was Darwin influenced by the field of economics? What was the nature of Malthus' argument? How did Darwin incorporate these ideas into his theory?
Geology say about the timescales of earth history : What did "uniformitarian" geology say about the timescales of earth's history, and the rate at which change occurred?
Create a letter that incorporates the five required elements : As the Privacy and Security Officer, one of the biggest fears that the board of directors (BOD) feared which caused a bit of hesitancy to move forward.
Determination of the ld50 of an insecticide in cockroaches : Determination of the LD50 of an Insecticide in Cockroaches - Does you introduction provide the necessary background to understand
How has the innovation advanced the delivery of health care : How has the innovation advanced the delivery of health care? Explain how evidenced-based research influences the health care industry.
Discuss how inconsistency between the financial statements : ACC303 International Accounting Assignment - Analyse and discuss how inconsistency between the financial statements of companies
Evolutionary theories were proposed prior to darwin : How were these theories different from Darwin's theory: what extra concepts did they contain, and/or what did they lack?

Reviews

Write a Review

Management Information Sys Questions & Answers

  A key concept in information systems

A Key Concept in Information Systems- Present an overview of the origin and history of the concept that you have chosen

  What are the advantages of cloud computing dr solutions

What are the advantages of cloud computing DR solutions? What are the disadvantages and risks?

  How many attacks did boko haram conduct annually

Identify a group, organization, or individual to produce an RFI. How many attacks did Boko Haram conduct annually before pledging allegiance to ISIS?

  Address the new strategy in a three-phase rollout plan

The CIO wants to address the new strategy in a three-phase rollout plan and wants your feedback on LAN and MAN technology.

  Construct a decision tree that includes one decision node

Construct a decision tree that includes one decision node or maintain the status quo.- There are the two EHR systems under consideration by Bright Road Health Care System, eMed and Patient Data System (PDS).

  Evaluate the existing infrastructure as it currently exists

Each location is set up as a star topology with 40 PCs networked together, with the exception of the law firm's headquarters in Palo Alto, California.

  What are the disadvantages of easily obtainable information

What are the advantages and disadvantages of social media? What are the advantages and disadvantages of easily obtainable information?

  Analysing hostile code

Computer Forensics - Analysing hostile code - To deeply understand it, you may also try to figure out why it uses which resources. Write a report on your findings and submit it by the end of this week in the assignment folder.

  Importance of customer relationship management

Explain the strategic importance of Customer Relationship Management (CRM) and discuss how CRM can be used to create customer satisfaction and greater profits for the firm.

  Where are potential areas of vulnerability in the scenario

What are the initial steps you would take when planning an enterprise-level risk assessment of technology tools and procedures?

  What characteristics of virtual storage make this possible

The manual for a popular operating system points out that the number of concurrent users on the system can be increased if the users are sharing programs, such as editors, mail readers, or compilers. What characteristics of virtual storage make thi..

  What are the best practices and standards in your area

What are the best practices and standards in your area that you think are important, and why? What are the expectations of you when you are working on a project, in your area of expertise?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd