HIPAA security and privacy rules

Assignment Help Basic Computer Science
Reference no: EM133086635

Overview

Imagine you are the information security officer at a medium-sized hospital chain. The CEO and the other senior leadership of the company want to ensure that all of their hospitals are and remain HIPAA compliant. They are concerned about the impact of the HIPAA Security and Privacy Rules on the organization. You begin looking at the information provided by the U.S. Department of Health and Human Services, HIPAA Enforcement, and are asked to provide an analysis of two of the cases found here with emphasis on what was done to resolve the compliance issues.

Section 1: Written Paper

Noncompliance with HIPAA regulations can result in significant fines and negative publicity. To help ensure that your organization remains in compliance with HIPAA regulations, you have been asked to write a 3-5 page paper in which you:

Create an overview of the HIPAA security and privacy rules.

Analyze the major types of incidents and breaches that occur based on the cases reported.

Analyze the technical controls and the nontechnical controls that are needed to mitigate the identified risks and vulnerabilities.

Analyze and describe the network architecture that is needed within an organization, including a medium-sized hospital, in order to comply with HIPAA regulations.

Analyze how a hospital is similar to and different from other organizations in regard to HIPAA compliance.

List the IT audit steps that must be included in the organization's overall IT audit plan to ensure compliance with HIPAA rules and regulations.

Use at least three quality resources. Note: Wikipedia and similar websites do not qualify as quality resources.

This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions.

Section 2: Network Architecture

Create a network architecture diagram (using Visio or an open-source equivalent to Visio for creating diagrams), based on the description of the network architecture that you defined above for the organization to comply with HIPAA regulations.

Include in the diagram the switches, routers, firewalls, IDS/IPS, and any other devices needed for a compliant network architecture.

The specific course learning outcome associated with this assignment is:

Create a network architecture diagram that is compliant with HIPAA regulations.

Reference no: EM133086635

Questions Cloud

Analyzing the quality user story : What are the attributes that comprise a quality user story, and why are these attributes necessary? Consider the result of poorly written user stories.
Company took to achieve operational excellence : Explain what actions the company took to achieve operational excellence.
Web browser and tightly integrated web functionalities : How has the use of core ideas such as location and orientation-aware pushed iPhone beyond its web browser and tightly integrated web functionalities?
Identify the appropriate Australian Legislation : What professional ethical dilemmas are Bui and Bharti dealing with here? (e.g. Should we allow or sanction Bui or Bharti's behaviour
HIPAA security and privacy rules : Create an overview of the HIPAA security and privacy rules. Analyze the major types of incidents and breaches that occur based on the cases reported.
Computer Forensics : Discusses how computer hardware and memory are likely to be transformed over the next 5 years.
Terms of bpm applications and functionality : What terms do they use to describe BPM initiatives and software suites? Compare and contrast their offerings in terms of BPM applications and functionality.
Perform threat modelling to inform defensive measures : Prepare a business case study and perform threat modelling to inform defensive measures to provide resilience and robustness management in IoT
Inpatient service days and daily inpatient census : How inpatient service days (IPSD) and the daily inpatient census (DIPC) are used and affect the financial well-being of the organization

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What effect will this scenario have on gdp

Gerald stops working to stay home with the kids. What effect will this scenario have on GDP?

  Future of life institute

Elon-Musk donated $10 million to a foundation called the Future of Life Institute. How can humans establish and maintain careful oversight of the work carried

  List and describe the major trends in computer hardware

List and describe the major trends in computer hardware. Which of these do you think will create the biggest changes in business information systems and why

  Network devices a side from hubs

What other network devices a side from hubs have "bitten the dust" in the recent past?

  Iot device attacks-current landscape of cybersecurity

IOT device attacks. Current landscape of cybersecurity and cyber-attacks in the world today

  Systems implementation and integration

Let's discuss the design phase. The design phase decides how the system will operate in terms of the hardware, software, and network infrastructure that will be

  Set architecture based on the number of explicit operands

List and explain different types of instruction formats in instruction Set Architecture based on the number of explicit operands.

  Describe the association

Roller coasters. Roller coasters get all their speed by dropping down a steep initial incline, so it makes sense that the height of that drop might be related to the speed of the coaster.

  About the benefits of cloud computing applications

Even with this great news about the benefits of cloud computing applications, the authors have warned the business user community regarding

  Quantitative or credit easing may affect the economy

Explain the three channels economists have identified through which quantitative or credit easing may affect the economy.

  Remake the map using this approach to scaling the circles

That is, for very large countries, no matter how large the population, the disk plotted on the map is no bigger than this cap. Remake the map using this approach to scaling the circles.

  Pros and cons of improving information security

Please discuss the pros and cons of improving information security with federal regulations. How well received are the regulations in the affected industries? Have they helped?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd