Create an overview of the hipaa security rule

Assignment Help Management Information Sys
Reference no: EM132085495

Case Study : HIPAA and IT Audits

Imagine you are the Information Security Officer at a medium-sized hospital chain. The CEO and the other senior leadership of the company want to ensure that all of their hospitals are and remain HIPAA compliant.

They are concerned about the HIPAA Security and Privacy Rules and its impact on the organization.

You begin looking at the information provided by the Department of Health and Human Services. Specifically, you are asked to provide an analysis of two (2) of the cases found here with emphasis on what was done to resolve the compliance issues.

Section 1. Written Paper

Non-compliance with HIPAA regulations can result in significant fines and negative publicity. To help ensure that your organization remains in compliance with HIPAA regulations you have been asked to write a three to five (3-5) page paper in which you:

1a. Create an overview of the HIPAA Security Rule and Privacy Rule.

1b. Analyze the major types of incidents and breaches that occur based on the cases reported.

1c. Analyze the technical controls and the non-technical controls that are needed to mitigate the identified risks and vulnerabilities.

1d. Analyze and describe the network architecture that is needed within an organization, including a medium-sized hospital, in order to be compliant with HIPAA regulations.

1e. Analyze how a hospital is similar to and different from other organizations in regards to HIPAA compliance.

1f. List the IT audit steps that need to be included in the organization's overall IT audit plan to ensure compliance with HIPAA rules and regulations.

1g. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

Section 2. Network Architecture

2a. Create a network architecture diagram (using Visio or an open-source equivalent to Visio for creating diagrams), based on the description of the network architecture that you defined above for the organization to be compliant with HIPAA regulations.

2b. Include in the diagram the switches, routers, firewalls, IDS / IPS, and any other devices needed for a compliant network architecture.

The specific course learning outcomes associated with this assignment are:

Describe the process of performing effective information technology audits and general controls.

Explain the role of cybersecurity privacy controls in the review of system processes.

Describe the various general controls and audit approaches for software and architecture to include operating systems, telecommunication networks, cloud computing, service-oriented architecture and virtualization.

Use technology and information resources to research issues in information technology audit and control.

Write clearly and concisely about topics related to information technology audit and control using proper writing mechanics and technical style conventions.

Reference no: EM132085495

Questions Cloud

Summarize a customer success story of an organization : Find and briefly summarize a customer success story of an organization that integrated Open Text with its CRM system.
Little law application : Mothers and babies stay, on average, two days before they leave the hospital.
What is the total cost of the new equipment : Prior to installation, Upton paid $2,500 to pour a concrete slab on which to place the equipment. What is the total cost of the new equipment
What level of importance do product costs play : Watch the videos and then discuss the components of product costs and how they are used in managerial accounting. Talk about what management decisions.
Create an overview of the hipaa security rule : Create an overview of the HIPAA Security Rule and Privacy Rule. Analyze the major types of incidents and breaches that occur based on the cases reported.
How much cash was provided by operating activities : There was also a loss on the sale of equipment of $2,000. How much cash was provided by operating activities
What is the highest total contribution margin : What is the highest total contribution margin that the company can earn if it makes optimal use of its constrained resource?
Difference between exception and safe harbor : What is the difference, if any, between an exception and a safe harbor?
Calculate the cash flows from operating activities : Exclusive of the effect of other adjustments, the cash flows from operating activities to be reported on the statement of cash flows is

Reviews

Write a Review

Management Information Sys Questions & Answers

  The physical access controls and logical access controls

Research a specific lapse in professional ethics by an IT professional in the last five (5) years. Be prepared to discuss.

  What business and it problems can be caused

List the advantages of a single customer service center for RR Communications.Devise an implementation strategy that would guarantee the support of the Divisional Presidents for the shared customer service center.Is it possible to achieve an enterp..

  Describe implementation of an emr and ehr/patient portal

In a paper (750-1,000 words), select an environment (one you currently work in, have worked in previously, or wish to move into) and describe the challenges and opportunities associated with the implementation of an EMR, EHR/Patient Portal, or Dec..

  Why organization should use these techniques to manage risk

Questionnaires and surveys are well established techniques for assessing project risk. Briargrove has been a learning process to this point.

  Explain what media disposition means

Briefly explain what needs to be accomplished before your company monitors the activities of authorized users of your company systems, and then explain what should be accomplished to legally monitor the activities of a hacker (unauthorized user) o..

  The answer to relational database management systemdescribe

the answer to relational database management systemdescribe three advantages to using a relational database management

  How can personal computer users protect their pii

Using the Internet, research methods you think corporations can use to protect themselves and their customers from security breaches involving PII.

  Write two paragraphs about it metrics- applying measurement

Write one or two paragraphs about IT Metrics - Applying Measurement to Solving a Business Problem. Please explain how and when to use that APA function. Write an APA topic with APA citations.

  Identify at least two e-commerce systems

Create an example that demonstrates how each could facilitate data exchange functionality in a cloud service environment.

  Compare effectiveness of classic and recently evolved models

Briefly explain in your own words the relationship between each element of the triple constraint of project management. Then, determine whether or not you believe it is important to understand the triple constraint to be an efficient project manag..

  Discuss about the swot analysis

LDR 503 : The purpose of the SWOT Analysis is to integrate your learning through this course. We have explored Engaging a Workforce through multiple lenses: Project Management, Diversity and Inclusion, Distributed and Virtual Teams, Decision Makin..

  Evaluating the use of iot technology

How to take a screenshot of a selected portion of your screen.Find the screenshot as a .png file on your desktop. Evaluating the Use of IoT technology.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd