How do laws and regulations impact our information security

Assignment Help Computer Engineering
Reference no: EM133338390

Case: Massachusetts Eye and Ear Infirmary and Massachusetts Eye and Ear Associates, Inc. (collectively referred to as "MEEI") has agreed to pay the U.S. Department of Health and Human Services (HHS) $1.5 million to settle potential violations of the HIPAA Privacy and Security Rules. MEEI has also agreed to take corrective action to improve policies and procedures to safeguard the privacy and security of their patients' protected health information and retain an independent monitor to report on MEEI's compliance efforts. OCR's investigation followed a breach report submitted by MEEI, as required by the HIPAA Breach Notification Rule, reporting the theft of an unencrypted personal laptop containing the electronic protected health information (ePHI) of MEEI patients and research subjects. The information contained on the laptop included patient prescriptions and clinical information. OCR's investigation indicated that while MEEI's management was aware of the Security Rule, MEEI failed to take necessary steps to comply with the requirements of the Rule, such as such as conducting a thorough analysis of the risk to the confidentiality of ePHI maintained on portable devices, implementing security measures sufficient to ensure the confidentiality of ePHI that MEEI created, maintained, and transmitted using portable devices, adopting and implementing policies and procedures to restrict access to ePHI to authorized users of portable devices, and adopting and implementing policies and procedures to address security incident identification, reporting, and response.

Question: How do laws and regulations impact our Information Security and Privacy program?

Reference no: EM133338390

Questions Cloud

Describe a time that you were faced with a decision : Describe a time that you were faced with a decision where you didn't demonstrate integrity in a way you wished you had? What would you do differently?
What company first invested in apple : INFM 109 Ivy Tech Community College, Indianapolis What was the difference in the schooling of Bill Gates and Steve Jobs? Why is it important?
Do you belong to any online social networks which ones : Do you belong to any online social networks? Which ones? How do you use them? How might you use them to further your job search?
Why fraud does not fit into the cia model : Take some time to consider further why fraud doesn't fit into the CIA model. List some examples and try to imagine how you would mitigate the threat.
How do laws and regulations impact our information security : MET CS 684 Boston University How do laws and regulations impact our Information Security and Privacy program - implementing policies and procedures to address
How pro-g can address conflict with schmidt : How Pro-G can address conflict with Schmidt ? How should Pro-G handle this development? How should Pro-G strengthen its position in the U.S.?
How is it that organizations can legally set : How is it that organizations can legally set and enforce usage policies, and use methods such as checking e-mail records, logging system use.
Depicts coaching cycle and strategies : Depicts the coaching cycle and the strategies that are required for implementation. I
Discuss the different options for hedge receivables : Discuss the different options for hedge receivables and payables and recommend to your Board the best hedging strategy for the MNC. Be sure to qualify

Reviews

Write a Review

Computer Engineering Questions & Answers

  Illustrate your understanding of an access control matrix

Using a sample scenario (e.g. University System), illustrate your understanding of an Access Control matrix along with inclusion of access rights.

  Explain different uses of the tools besides cryptography

In this module, you learned that random numbers (or, at least, pseudorandom numbers) are essential in cryptography, but it is extremely difficult even.

  Describe the software delivery process

Add a new sub-section to your existing paper: 1200 words. Document the top 7-10 areas of waste you identify in your organization's software delivery process.

  What operating system choices are available

Operating System: With the recommended hardware, what operating system choices are available and which would be best? Why?

  Assume a direct access file consists of sectors

assume a direct access file consists of sectors with 1024 byte capacity. Suppose also that records are 32 bytes long. On which logical sector do the following logical records lie? What is the relative record number in the sector?

  Describe how your chosen organization uses technology

Describe how your chosen organization uses technology to improve its business goals or discuss your chosen article describing IT

  What is the probability of getting exactly k heads

What is the probability of getting exactly k heads on n tosses, where coin has a probability of p in coming up heads on each toss? What about k or more heads?

  Create a two-page website for the business you propose

Using the free website creation tool you studied for the last homework, create a two-page website for the business you propose in the class project.

  Explain the types of employees involved in the sdlc process

Explain the types of employees involved in the SDLC process and their roles (project manager, system analyst, developer).

  Oganizational charts organizational chart and a project

it project organization submit a word document of the it project organization. use apa formatting.the project

  Why is project stakeholder management important

Project Management final paper: What and why is Project Stakeholder Management important? Write a 2500-3000 word academic paper.

  Examine the threat modeling approach

Examine the threat modeling approach as required for a correct execution of a penetration test. The PTES standard focuses on two key elements of traditional

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd