Describe best practices in collecting digital evidence

Assignment Help Computer Engineering
Reference no: EM131236108

Assignment 1: Privacy Complaint to the Office of Civil Rights (OCR)

Learning Objectives and Outcomes

Describe the process of submitting a health information privacy complaint to the OCR.

Assignment Requirements

Imagine that you are a sophomore at Premier College. Over the past few months, you have not been well due to increased amounts of academic pressure and found yourself unable to concentrate in class or sleep well at night. You went to the student medical center for evaluation and, after consulting with the staff doctor, you were issued a prescription for the treatment of depression.

A few days later, one of your professors tells you that he too has had to take medicine for depression in the past. You ask him how he knew about your situation, and he replied that all student medical records are available to every instructor and staff member at Premier College. Hearing this, you feel that your privacy rights have been violated.

That afternoon you research privacy rights on the Internet and learn that filing a HIPAA privacy complaint to the OCR had been a tedious process before July 2009. On July 27, 2009, the Secretary of Health and Human Services (HHS) delegated to the Director of OCR the authority to administer and enforce the HIPAA Security Rule. This action improved HHS' ability to protect individuals' health information by combining the authority for administration and enforcement of federal standards for health information privacy and security. Those standards are outlined in the HIPAA legislation. With the new regulation, the process of filing a privacy complaint has become simpler and more effective.

Then you research the steps involved with filing a privacy complaint with the OCR (https://www.hhs.gov/ocr/privacy/hipaa/complaints/index.html), download the Health Information Privacy Complaint form at (https://www.hhs.gov/sites/default/files/ocr/privacy/hipaa/complaints/hipcomplaintform.pdf), and complete the form. While working on the form, you realize some sections are critical to your case and must be addressed carefully.

You decide to write about your experience in a paper for your Legal Issues in Information Security class. For this assignment:

1. Identify the early iterations of the HIPAA act and how the law has been modified to facilitate easier access to consumer complaints and enforcement.

2. Describe the overall process of submitting a health information privacy complaint to the OCR.

3. Identify specific sections of the complaint form that need critical attention while completing the form.

4. Analyze a few situations that can occur if the critical sections are not well identified.

5. Draft a brief summary, collating all your findings.

Required Resources

• Access to the Internet
• https://www.hhs.gov/ocr/privacy/hipaa/complaints/index.html
• https://www.hhs.gov/sites/default/files/ocr/privacy/hipaa/complaints/hipcomplaintform.pdf

Submission Requirements

Format: Microsoft Word
Font: Arial 10-point size, Double-space
Citation Style: Follow your school's preferred style guide
Length: No more than 500 words

Assignment 2: Best Practices in Collecting Digital Evidence

Learning Objectives and Outcomes

- Describe best practices in collecting digital evidence.

Assignment Requirements

You have been working for the DigiFirm Investigation Company for several months. The company has a new initiative to continually improve its processes.

Technology changes quickly. Therefore, companies need to change their procedures frequently to stay abreast of new developments. Organizations such as the National Institute of Justice and the FBI offer up-to-date recommendations on best practices. You will also want to check NIST.

Include the following:

1. Shutting down the computer
2. Collecting volatile data
3. Live analysis
4. Physical analysis
5. Logical analysis
6. Documentation

There is a meeting scheduled for next week to talk about best practices in collecting digital evidence.

For this assignment:

1. Research best practices in collecting digital evidence.

2. Create an electronic presentation for the meeting that highlights your findings.

Required Resources

- Course textbook
- Internet

Submission Requirements

- Write an executive summary detailing the above information (2-3 pages)
- Cite sources in APA format

Self-Assessment Checklist

- I researched best practices in collecting digital evidence.
- I created an electronic presentation that highlights my findings.

Reference no: EM131236108

Questions Cloud

Write cycles for various transistor width to length ratios : Using a computer simulation, investigate the Q and  values in the CMOS RAM cell shown in Figure during read and write cycles for various transistor width-to-length ratios.
Salaries of assistant professors follow normal distribution : According to a recent survey,the salaries of assistant professors have a mean of $40756 and a standard deviation of $6500. Assuming that the salaries of assistant professors follow a normal distribution, find the proportion of assistant professors..
Create a robust causal loop diagram : Create a robust causal loop diagram that incorporates appropriate causal loop logic in the analysis, and which also identifies common system archetype patterns within the diagram
What are legal and ethical issues involved in this disputes : You respond that code reviews were not in the required process. What are the legal and ethical issues involved in this dispute?
Describe best practices in collecting digital evidence : Describe best practices in collecting digital evidence. Describe the overall process of submitting a health information privacy complaint to the OCR.
Define self-concept self-image and self-esteem : Define self-concept, self-image, and self-esteem. Write at least two sentences on each term. Provide an example of how your self-concept, self-image, or self-esteem has affected your interpersonal communication.
Examine the characteristics of good process models : Examine the characteristics of good process models described in Section 2.4. Which characteristics are essential for processes to be used on projects where the problem and solution are not well understood?
Confidence interval for the proportion of females : Representatives from the USDepartment of Labor selected a random sample of 525 from over 10,000records on file and found that 229 are female. The 95% confidence interval for the proportion of females in the US labor force is
Discuss the concept and impact of unrestricted free trade : Examine at least two different theories explaining trade flows between the selected nations. Discuss the concept and impact of unrestricted free trade between the selected nations

Reviews

Write a Review

Computer Engineering Questions & Answers

  Explain why is the presence of a hardwired zero register so

question 1 why is the presence of a hardwired zero register so important in risc architectures?question 2 the mips isa

  Network in a gsm system

Consider two mobiles belonging to the same home network in a GSM system. Explain step by step the process in GSM roaming, when one mobile wakes up in a foreign network and makes a call to the other.

  What levels of osi model tcp/ip functions

in brief answer to explain at what levels of the OSI model TCP/IP functions.

  Conducting the forensic investigation

Describe the purpose of several initial reviews being conducted by forensics investigator (e.g., time lines, technical skills, procedures).

  When potential new suppliers compete for contracts

The company's newly hired VP of the IT is conducting this project because she does not have a security specialist on her staff and has learned that the company does not have the comprehensive security strategy. In fact, she suspects lack of even b..

  Choose two of the security features you recognize and write

third-party assurance providers such as bbbonline inc. and truste sell their services to businesses that want to

  Program can be used with a video rental business

Extend above with a Rental class. This class must store a Movie that is rented, an integer representing the ID of the customer who rented the movie, and an integer indicating how many days late the movie is.

  A computer programmer has been arraigned for a computer

a computer programmer has been arraigned for a computer crime. she is suspected of having accessed system files on a

  Construct an alternative e-r tables

Construct an alternative E-R tables that uses only a binary relationship between students and course_offerings

  Why there is a delay through combinational logic

In this representation every instruction takes at most 4 steps to complete a clock cycle. Explain what happens in each step of the clock cycle.

  Program to calculate the weight of students

We have run regression analysis along with the resulting estimated regression equation as follows:” the estimated weight equals (-180 pounds) plus (5 pounds times the height in inches).” Write down the program to calculate the weight of students.

  Draw the red-black bst

Draw the red-black BST that results when you insert items with the keys EASY QUTION in that order into an initially empty tree.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd