Determine an overview of the hipaa security rule

Assignment Help Management Information Sys
Reference no: EM131866788

HIPAA and IT Audits

Imagine you are the Information Security Officer at a medium-sized hospital chain. The CEO and the other senior leadership of the company want to ensure that all of their hospitals are and remain HIPAA compliant.

They are concerned about the HIPAA Security and Privacy Rules and its impact on the organization. You begin looking at the information provided by the Department of Health and Human Services.

Specifically, you are asked to provide an analysis of two (2) of the cases found here with emphasis on what was done to resolve the compliance issues.

Section 1. Written Paper

Non-compliance with HIPAA regulations can result in significant fines and negative publicity. To help ensure that your organization remains in compliance with HIPAA regulations you have been asked to write a three to five (3-5) page paper in which you:

1a. Create an overview of the HIPAA Security Rule and Privacy Rule.

1b. Analyze the major types of incidents and breaches that occur based on the cases reported.

1c. Analyze the technical controls and the non-technical controls that are needed to mitigate the identified risks and vulnerabilities.

1d. Analyze and describe the network architecture that is needed within an organization, including a medium-sized hospital, in order to be compliant with HIPAA regulations.

1e. Analyze how a hospital is similar to and different from other organizations in regards to HIPAA compliance.

1f. List the IT audit steps that need to be included in the organization's overall IT audit plan to ensure compliance with HIPAA rules and regulations.

1g. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

Section 2. Network Architecture

2a. Create a network architecture diagram (using Visio or an open-source equivalent to Visio for creating diagrams), based on the description of the network architecture that you defined above for the organization to be compliant with HIPAA regulations.

2b. Include in the diagram the switches, routers, firewalls, IDS / IPS, and any other devices needed for a compliant network architecture.

The specific course learning outcomes associated with this assignment are:

Describe the process of performing effective information technology audits and general controls.

Explain the role of cybersecurity privacy controls in the review of system processes.

Describe the various general controls and audit approaches for software and architecture to include operating systems, telecommunication networks, cloud computing, service-oriented architecture and virtualization.

Use technology and information resources to research issues in information technology audit and control.

Write clearly and concisely about topics related to information technology audit and control using proper writing mechanics and technical style conventions.

Reference no: EM131866788

Questions Cloud

What could the company have done to prevent the hack : Share the details of the hack with your peers. Please try to find a unique hack, not one your peers have already discussed.
Functions of price in the market economy : A. Identify two (2) functions of price in the market economy. B. Explain how price is determined in the market economy.
Explain thiels critique of competition : Explain Thiels critique of competition. Do you agree with his perspective and Explain Theils statement that companies should strive to become monopolies
Changing income by what dollar amount : Assume income is constant, Px decreases to 1.5, and Py decreases to 0.75. This change in prices is equivalent to changing income by what dollar amount?
Determine an overview of the hipaa security rule : Analyze the major types of incidents and breaches that occur based on the cases reported.
Graph the budget constraint with a solid line : Graph the budget constraint with a solid line. Label both axes and intercepts. Now assume income is constant, Px decreases to 1
Draw the new budget constraint on the same axes : Now assume income falls to 200 and prices are constant. Draw the new budget constraint on the same axes as a dotted line. Label the new intercepts.
Default risk of corporate bonds : As a result, we would expect the equilibrium price on the corporate bonds to ____ and the yield on the corporate bonds to ____ .
Curve for corporate bonds : In this case, the demand curve for U.S. T bonds will shift to the ____ and the ____ curve for Corporate bonds will shift to the left.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Logical and physical representationsdescribe how logical

logical and physical representationsdescribe how logical and physical representations of a to-be system will

  Analyze apple using porters five force model

Which of Porter's Five Forces did Apple address through its introduction of the iPhone? Analyze Apple using Porter's Five Force Model

  Evaluate the capacity of most common distribution channels

Evaluate the capacity of the most common distribution channels available for the new product launch to provide consumers with easier access to the product.

  Prepare for the worst-case scenario having a plan

In all disasters, be it natural or act of God, one must prepare for the worst-case scenario having a plan into place.

  Summarize for investors what legal liabilities could arise

Summarize for investors what legal liabilities could arise for the Director or officer of that board?

  Identify information systems that exist in organisation

What problems do the previous information systems solve - what is the impact of using the previous information systems on the organization?

  Give the pseudocode and flowchart

Give the pseudocode and flowchart that would show how one of the additional data structures could be implemented to search data.

  What information systems could fitness quest develop

What additional information systems could Fitness Quest develop to create barriers to entry to the competition and to lock in customers?

  Explore the use of cross-channel marketing techniques

Identify the unique approaches taken by the company to reach their B2B customer. Explore the use of cross-channel marketing techniques. Correlate the strategy with the value network concept presented in the chapter readings.

  What role does information technology play in the businesses

What role does information technology play in businesses? How is it helping them refine their business strategy? Will Walmart be successful against Amazon.com?

  Decision support systems dssdescribe the three primary

decision support systems dssdescribe the three primary components that make up any decision support system dss and how

  Evaluate alternatives to the company self-hosting

Evaluate alternatives to the company self-hosting the site.Create a use case that documents the event of a customer ordering a bag of chips.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd