Create an overview of the hipaa security rule

Assignment Help Other Subject
Reference no: EM132088807

Case Study 2: HIPAA and IT Audits

Imagine you are the Information Security Officer at a medium-sized hospital chain. The CEO and the other senior leadership of the company want to ensure that all of their hospitals are and remain HIPAA compliant. They are concerned about the HIPAA Security and Privacy Rules and its impact on the organization. You begin looking at the information provided by the Department of Health and Human Services. Specifically, you are asked to provide an analysis of two (2) of the cases found here with emphasis on what was done to resolve the compliance issues.

Section 1. Written Paper

Non-compliance with HIPAA regulations can result in significant fines and negative publicity. To help ensure that your organization remains in compliance with HIPAA regulations you have been asked to write a three to five (3-5) page paper in which you:

1a. Create an overview of the HIPAA Security Rule and Privacy Rule.

1b. Analyze the major types of incidents and breaches that occur based on the cases reported.

1c. Analyze the technical controls and the non-technical controls that are needed to mitigate the identified risks and vulnerabilities.

1d. Analyze and describe the network architecture that is needed within an organization, including a medium-sized hospital, in order to be compliant with HIPAA regulations.

1e. Analyze how a hospital is similar to and different from other organizations in regards to HIPAA compliance.

1f. List the IT audit steps that need to be included in the organization's overall IT audit plan to ensure compliance with HIPAA rules and regulations.

1g. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

Section 2. Network Architecture

2a. Create a network architecture diagram (using Visio or an open-source equivalent to Visio for creating diagrams), based on the description of the network architecture that you defined above for the organization to be compliant with HIPAA regulations.

2b. Include in the diagram the switches, routers, firewalls, IDS / IPS, and any other devices needed for a compliant network architecture.

The specific course learning outcomes associated with this assignment are:

• Describe the process of performing effective information technology audits and general controls.

• Explain the role of cybersecurity privacy controls in the review of system processes.

• Describe the various general controls and audit approaches for software and architecture to include operating systems, telecommunication networks, cloud computing, service-oriented architecture and virtualization.

• Use technology and information resources to research issues in information technology audit and control.

• Write clearly and concisely about topics related to information technology audit and control using proper writing mechanics and technical style conventions.

Reference no: EM132088807

Questions Cloud

How relevant are the new skills to your current profession : Base on the course content, discuss new skills you acquired from this class? How relevant are the new skills to your current and/or future profession?
Is it ethical for a company to sell personal information : Is it ethical for a company to sell personal information? Is gathering information about people's surfing and buying habits by tracking their clicks through.
Analyze the identity and access management approach : Analyze the identity and access management approach that organizations need to implement to effectively control access to their systems.
Write the logistic regression model interpretation : Write briefly in one line about the findings under the tables in the FREQUENCY file and Write the Chi-square data interpretation under the Bar charts
Create an overview of the hipaa security rule : Create an overview of the HIPAA Security Rule and Privacy Rule. Analyze the major types of incidents and breaches that occur based on the cases reported.
How the presence or absence of these elements impacts team : The success of a team is driven by clear goals and objectives, adequate resources to accomplish the goals and objectives.
Demonstrate your compliance with accessibility standards : Demonstrate your compliance with accessibility standards by performing accessibility testing on your site. As indicated above, there is a variety.
Discuss your reaction - creating sustainable performance : Your recommendations should be written as if you were an OB Consultant and were trying to convince top leadership the value of a "thriving" environment.
Review problem of agile software development : Research the Internet to obtain information on one of the following: SDLC, SCM, or Agile software development. Review the critical considerations to prepare.

Reviews

Write a Review

Other Subject Questions & Answers

  Government decides to increase taxes

Suppose the government decides to increase taxes by $30 billion in order to increase Social Security benefits by the same amount. How will this combined tax-transfer policy affect aggregate demand at current prices?

  Write a paper about communicative competence for parents

Write a paper about communicative competence for parents and teachers of young children. explain why it is important for children to acquire.

  Discuss policy of mandatory arrest to satisfy women group

Are there any ethical problems raised when one or more city council members get caught up in the mandatory arrest policy as victims themselves? How would you go about revising your policy of mandatory arrest to satisfy the women's group and the co..

  Analyze design and instructional concepts of e-learning

Analyze design and instructional concepts of e-Learning. Describe the unique needs and challenges of virtual learners.

  In what ways is race not a biological concept

What are some U.S. examples of how public policy has treated people differently based on race? What are some of the consequences of these policies?

  How leaders defined leadership management and followership

What similarities and/or differences in how leaders defined leadership, management and What key insights did you gain for this assignment?

  Discuss how the writing process has worked for you

Discuss how the writing process has worked for you thus far. Have you found it easy to be organized as you began working on this signature assignment?

  Which job offers the best start for mary

What are the advantages and disadvantages for each job listed in the scenario? Which job would you choose in this scenario? Why?

  What sort of study is appropriate for each methodology

Define quantitative research and qualitative research. Explain how they differ and relate each to the human services field and the scientific method. Also, Describe how to decide whether to use a quantitative or qualitative research methodology.

  Applied to the study human movement

Biomechanics , as applied to the study human movement, is a scientific field of study that deals primarily with:

  The mayflower compact

The Mayflower Compact...

  Discuss what is the position of who on caffeine

What is the position of WHO on caffeine. What is the position of CDC on caffeine

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd