Create an overview of the hipaa security rule

Assignment Help Other Subject
Reference no: EM132088807

Case Study 2: HIPAA and IT Audits

Imagine you are the Information Security Officer at a medium-sized hospital chain. The CEO and the other senior leadership of the company want to ensure that all of their hospitals are and remain HIPAA compliant. They are concerned about the HIPAA Security and Privacy Rules and its impact on the organization. You begin looking at the information provided by the Department of Health and Human Services. Specifically, you are asked to provide an analysis of two (2) of the cases found here with emphasis on what was done to resolve the compliance issues.

Section 1. Written Paper

Non-compliance with HIPAA regulations can result in significant fines and negative publicity. To help ensure that your organization remains in compliance with HIPAA regulations you have been asked to write a three to five (3-5) page paper in which you:

1a. Create an overview of the HIPAA Security Rule and Privacy Rule.

1b. Analyze the major types of incidents and breaches that occur based on the cases reported.

1c. Analyze the technical controls and the non-technical controls that are needed to mitigate the identified risks and vulnerabilities.

1d. Analyze and describe the network architecture that is needed within an organization, including a medium-sized hospital, in order to be compliant with HIPAA regulations.

1e. Analyze how a hospital is similar to and different from other organizations in regards to HIPAA compliance.

1f. List the IT audit steps that need to be included in the organization's overall IT audit plan to ensure compliance with HIPAA rules and regulations.

1g. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

Section 2. Network Architecture

2a. Create a network architecture diagram (using Visio or an open-source equivalent to Visio for creating diagrams), based on the description of the network architecture that you defined above for the organization to be compliant with HIPAA regulations.

2b. Include in the diagram the switches, routers, firewalls, IDS / IPS, and any other devices needed for a compliant network architecture.

The specific course learning outcomes associated with this assignment are:

• Describe the process of performing effective information technology audits and general controls.

• Explain the role of cybersecurity privacy controls in the review of system processes.

• Describe the various general controls and audit approaches for software and architecture to include operating systems, telecommunication networks, cloud computing, service-oriented architecture and virtualization.

• Use technology and information resources to research issues in information technology audit and control.

• Write clearly and concisely about topics related to information technology audit and control using proper writing mechanics and technical style conventions.

Reference no: EM132088807

Questions Cloud

How relevant are the new skills to your current profession : Base on the course content, discuss new skills you acquired from this class? How relevant are the new skills to your current and/or future profession?
Is it ethical for a company to sell personal information : Is it ethical for a company to sell personal information? Is gathering information about people's surfing and buying habits by tracking their clicks through.
Analyze the identity and access management approach : Analyze the identity and access management approach that organizations need to implement to effectively control access to their systems.
Write the logistic regression model interpretation : Write briefly in one line about the findings under the tables in the FREQUENCY file and Write the Chi-square data interpretation under the Bar charts
Create an overview of the hipaa security rule : Create an overview of the HIPAA Security Rule and Privacy Rule. Analyze the major types of incidents and breaches that occur based on the cases reported.
How the presence or absence of these elements impacts team : The success of a team is driven by clear goals and objectives, adequate resources to accomplish the goals and objectives.
Demonstrate your compliance with accessibility standards : Demonstrate your compliance with accessibility standards by performing accessibility testing on your site. As indicated above, there is a variety.
Discuss your reaction - creating sustainable performance : Your recommendations should be written as if you were an OB Consultant and were trying to convince top leadership the value of a "thriving" environment.
Review problem of agile software development : Research the Internet to obtain information on one of the following: SDLC, SCM, or Agile software development. Review the critical considerations to prepare.

Reviews

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd