Evaluate hipaa security requirements

Assignment Help Other Subject
Reference no: EM133194630 , Length: Word Count: 500 Words

Assignment - HIPAA Cybersecurity Paper

Part 1 - Critical Analysis of the Law

1. Evaluate HIPAA security requirements for a security risk assessment (SRA).

How would you complete a security risk assessment that meets HIPAA security requirements? Outline it.

What physical, administrative, and technical safeguards would you recommend to keep data secure?

1. Evaluate HIT audits as a compliance tool . Describe an audit process you recommend that would meet the following criteria.

The audit is fair and unbiased and free from conflict of interest (1-2 points).

The audit results are effectively communicated to senior levels of the organization (1-2 strategies).

There is a process in place to correct any problems identified in the audit (1-2 actions).

How could a strong HIT audit system and the ACHE Code of Ethics serve to prevent the situation described in The Tracks We Leave: Chapter 9 Information Technology Setback: Heartland Health care System? Be specific and demonstrate understanding of the risks and how the compliance tool can be used specifically to control the risk

Part 2 - Strategic Compliance with the LawYou work for a large managed care organization (MCO) that includes 5 hospitals, 25 providers clinics, 1 health insurance company, and 10 pharmacies. The MCO is using electronic health records (EHR). Your organization is not using 2015 CEHRT. Your organization has been subject to medical identity theft through 3 recent cyberattacks that compromised the data of 2,000 patients. The cyberattacks all used a known vulnerability with poor data encryption during data transfer and poor security on the patient portal. All cyber-attacks removed the encryption or security safeguards to obtain patient data. The breach included a list of 20 HIV patients whose HIV status was being reported to the state as part of infectious disease reporting.

1. Evaluate what you need to do to respond to the cyberattack. Recommend a cyberattack response. Your response should include:

Methods to secure stolen data and mitigate harm (two).

Actions to correct the problem that allowed for the cyberattack (two).

2. Evaluate the breach notification requirements under HIPAA.

What breach notice actions do you recommend? (1-2)

When do they need to be completed?

3. Evaluate the organization's duty of privacy and security for HIV patients.

What do you recommend to keep this information secure during future reporting?

Are any additional protections required because of the HIV status? Why or why not?

Reference no: EM133194630

Questions Cloud

Should the nlrb rule in favor of the union : What should the result be in this case? Should the NLRB rule in favor of the union or in favor of the employer - On each event, nonemployee union organizers
Discuss how patient education can reduce health care costs : Patient Education Discussion - Identify and read two to three articles that discuss how patient education can reduce health care costs
Evaluate all safety training to ensure that form of training : Evaluate all safety training to ensure that the form of training and frequency of training needed by statute/regulation is being provided.
Why has union membership declined in the u. s. : University of Phoenix - Why has union membership declined in the U. S. since 1955? Do you expect this trend to continue? Explain why or why not. What value may
Evaluate hipaa security requirements : Evaluate HIPAA security requirements for a security risk assessment. Evaluate what you need to do to respond to the cyberattack
Do you think that the court was correct in holding : Business and Technical College - Do you think that the Court was correct in holding that Attorney Glenn Coe had apparent authority to settle the case with
Describes kiosk check-out process : Staryer University-Write a short narrative that describes the kiosk check-out process.
Describe real blockchain-based product : New York Institute of Technology-Manhattan Campus-Describe a real blockchain-based product that implements your chosen use case
Does patty have a right to privacy when using acme : Strayer University - Does Patty have a right to privacy when using Acme Corporation's e-mail system? Discuss the elements of the claim and how those elements

Reviews

Write a Review

Other Subject Questions & Answers

  What is failure mode and effects analysis

In the context of risk management, how can it be used to improve processes in healthcare organizations?

  Describing your self-assessment results

Write a 2-page paper describing your self-assessment results, including your strengths and improvement areas. How will you address the identified gaps in your.

  American airlines fear low-cost competitors

Should Delta, United Airlines, and American Airlines fear low-cost competitors? Employ Michael Porter's framework while discussing this question.

  What nursing actions need to be included in the plan of care

You are asked to see Mr. Basset, who is 80 years old, currently living alone, and has recently lost his wife. His children do not live nearby.

  Discussion about procedural and substantive due process

Begin by reading the case study "The Case of the Powdered Aspirin" in Chapter 5. This case helps school leadership candidates understand the conflict.

  What the product is today

An explanation of the conditions under which the igneous rock was formed in the first place, What the product is today, where it is located, and why it is famou

  What effects do judicial elections have on judges decisions

What effects do judicial elections have on judges' decisions? What effects should they have?

  Why each state has its own licensure requirements for health

Discuss why each state has its own licensure or certification requirements for health care professionals as it relates to each profession's practice act.

  What were some of the major criticisms that led some states

What were some of the major criticisms that led some states to abandon the indeterminate sentence and parole?

  Describe your current organization competition

Real World Application: Describe your current organization's competition. Then describe how this influences your organization's Human Resources practices. Include the strategies that are utilized or could be utilized within these practices

  Discuss the gap harvesting its own healing powers

the bone will grow into the gap harvesting its own healing powers

  Create an bibliography that summarizes key points in article

Create an annotated bibliography that summarizes the key points in each article, assesses application of quality improvement systems in healthcare environments.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd