Describe best practices in collecting digital evidence

Assignment Help Computer Engineering
Reference no: EM131236108

Assignment 1: Privacy Complaint to the Office of Civil Rights (OCR)

Learning Objectives and Outcomes

Describe the process of submitting a health information privacy complaint to the OCR.

Assignment Requirements

Imagine that you are a sophomore at Premier College. Over the past few months, you have not been well due to increased amounts of academic pressure and found yourself unable to concentrate in class or sleep well at night. You went to the student medical center for evaluation and, after consulting with the staff doctor, you were issued a prescription for the treatment of depression.

A few days later, one of your professors tells you that he too has had to take medicine for depression in the past. You ask him how he knew about your situation, and he replied that all student medical records are available to every instructor and staff member at Premier College. Hearing this, you feel that your privacy rights have been violated.

That afternoon you research privacy rights on the Internet and learn that filing a HIPAA privacy complaint to the OCR had been a tedious process before July 2009. On July 27, 2009, the Secretary of Health and Human Services (HHS) delegated to the Director of OCR the authority to administer and enforce the HIPAA Security Rule. This action improved HHS' ability to protect individuals' health information by combining the authority for administration and enforcement of federal standards for health information privacy and security. Those standards are outlined in the HIPAA legislation. With the new regulation, the process of filing a privacy complaint has become simpler and more effective.

Then you research the steps involved with filing a privacy complaint with the OCR (https://www.hhs.gov/ocr/privacy/hipaa/complaints/index.html), download the Health Information Privacy Complaint form at (https://www.hhs.gov/sites/default/files/ocr/privacy/hipaa/complaints/hipcomplaintform.pdf), and complete the form. While working on the form, you realize some sections are critical to your case and must be addressed carefully.

You decide to write about your experience in a paper for your Legal Issues in Information Security class. For this assignment:

1. Identify the early iterations of the HIPAA act and how the law has been modified to facilitate easier access to consumer complaints and enforcement.

2. Describe the overall process of submitting a health information privacy complaint to the OCR.

3. Identify specific sections of the complaint form that need critical attention while completing the form.

4. Analyze a few situations that can occur if the critical sections are not well identified.

5. Draft a brief summary, collating all your findings.

Required Resources

• Access to the Internet
• https://www.hhs.gov/ocr/privacy/hipaa/complaints/index.html
• https://www.hhs.gov/sites/default/files/ocr/privacy/hipaa/complaints/hipcomplaintform.pdf

Submission Requirements

Format: Microsoft Word
Font: Arial 10-point size, Double-space
Citation Style: Follow your school's preferred style guide
Length: No more than 500 words

Assignment 2: Best Practices in Collecting Digital Evidence

Learning Objectives and Outcomes

- Describe best practices in collecting digital evidence.

Assignment Requirements

You have been working for the DigiFirm Investigation Company for several months. The company has a new initiative to continually improve its processes.

Technology changes quickly. Therefore, companies need to change their procedures frequently to stay abreast of new developments. Organizations such as the National Institute of Justice and the FBI offer up-to-date recommendations on best practices. You will also want to check NIST.

Include the following:

1. Shutting down the computer
2. Collecting volatile data
3. Live analysis
4. Physical analysis
5. Logical analysis
6. Documentation

There is a meeting scheduled for next week to talk about best practices in collecting digital evidence.

For this assignment:

1. Research best practices in collecting digital evidence.

2. Create an electronic presentation for the meeting that highlights your findings.

Required Resources

- Course textbook
- Internet

Submission Requirements

- Write an executive summary detailing the above information (2-3 pages)
- Cite sources in APA format

Self-Assessment Checklist

- I researched best practices in collecting digital evidence.
- I created an electronic presentation that highlights my findings.

Reference no: EM131236108

Questions Cloud

Write cycles for various transistor width to length ratios : Using a computer simulation, investigate the Q and  values in the CMOS RAM cell shown in Figure during read and write cycles for various transistor width-to-length ratios.
Salaries of assistant professors follow normal distribution : According to a recent survey,the salaries of assistant professors have a mean of $40756 and a standard deviation of $6500. Assuming that the salaries of assistant professors follow a normal distribution, find the proportion of assistant professors..
Create a robust causal loop diagram : Create a robust causal loop diagram that incorporates appropriate causal loop logic in the analysis, and which also identifies common system archetype patterns within the diagram
What are legal and ethical issues involved in this disputes : You respond that code reviews were not in the required process. What are the legal and ethical issues involved in this dispute?
Describe best practices in collecting digital evidence : Describe best practices in collecting digital evidence. Describe the overall process of submitting a health information privacy complaint to the OCR.
Define self-concept self-image and self-esteem : Define self-concept, self-image, and self-esteem. Write at least two sentences on each term. Provide an example of how your self-concept, self-image, or self-esteem has affected your interpersonal communication.
Examine the characteristics of good process models : Examine the characteristics of good process models described in Section 2.4. Which characteristics are essential for processes to be used on projects where the problem and solution are not well understood?
Confidence interval for the proportion of females : Representatives from the USDepartment of Labor selected a random sample of 525 from over 10,000records on file and found that 229 are female. The 95% confidence interval for the proportion of females in the US labor force is
Discuss the concept and impact of unrestricted free trade : Examine at least two different theories explaining trade flows between the selected nations. Discuss the concept and impact of unrestricted free trade between the selected nations

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd