How will you go about handling this incident

Assignment Help Management Information Sys
Reference no: EM133499407

Question: How will you go about handling this incident? provide the steps? also how will you investigate this incident? what are the challenges and lesson learn? mitigating steps

As the IT Security manager ,please assist resolving this issue

Action:  Need to exam the media detail of text and photo.  

The patient photo was sent by text messaging via cell phone from someone in the facility to an outside contact. 

From a privacy view; 

  • the picture of the patient is identifiable. 
  • The nurse in the picture is identifiable.  
  • The computer has electronic demographics that can be digital enhanced to read (PHI). 
  • The setting is identifiable as a healthcare setting. SVH can be linked if viewer can identify the patient and/or the nurse or looks at the media detail. 
  • There is no evidence the photo was taken with consent of the patient via review of the chart.  
  • The photo of the patient was sent unsecure via test.

This constitutes a reportable breach of privacy. There is supporting evidence and continued risk. This event is reportable  to  HHS' Office for Civil Rights as an impermissible disclosure as a breach of unsecured PHI.

To mitigate circulation of this digital photo we need to determine who created the photo and where it was sent. Prior to informing the patient of the event.

Reference no: EM133499407

Questions Cloud

How the computer fraud and abuse act : How the Computer Fraud and Abuse Act and the Electronic Communications Privacy Act each specifically relate to the criminal activity described in the case study
Explain why continuous improvement is absolutely necessary : Explain why continuous improvement is absolutely necessary for an information assurance/information governance program
How different diagnoses appear on different skin tones : NSG 500- Complete the chart. When learning skin disorders, it is important to note how different diagnoses/conditions appear on different skin tones.
Examine the web page structure : Examine the web page structure by viewing the web page's source with the HTML loaded by the browser. Now if you were to examine the browser's internal web page
How will you go about handling this incident : How will you go about handling this incident? provide the steps? also how will you investigate this incident? what are the challenges and lesson learn
Explain what social media campaigns will be part : Explain what social media campaigns will be part of your strategy. Justify your strategy with research. Explain what promotional events will be part
Design a cybersecurity reporting strategy : Design a cybersecurity reporting strategy for an upcoming board meeting. Your Chief Information Security Officer (CISO) asked for your assistance
Provide an example of a vendor for each type of service : Provide an example of a vendor for each type of service - Describe each of the following terms: infrastructure as a service (IaaS) and software as a service
How article relates to sport licensing strategic alliances : how the article relates to sport licensing/strategic alliances. Be specific about what elements of the article relate to sport licensing/strategic alliances

Reviews

Write a Review

Management Information Sys Questions & Answers

  Identify the essential requirements for the hiring system

Analyze the hiring process at Maryland Technology Consultants (MTC) to identify the essential requirements for the hiring system.

  Explain the purpose of security information

Discuss the role of incident containment in an incident response strategy and how a lack of planning for containment is a potential pitfall for any response.

  Discuss the application architecture checklist issues

Discuss the application architecture checklist issues that the system analyst should consider when selecting an application architecture.

  Develop an electronics management plan with the goal

Develop an Electronics Management Plan with the goal of outlining how your organization will identify, collect, protect, and provide forensic evidence.

  What are all the products the company has for others

What are all the products/services the company has for others to use when it comes to big data analytics and visualization.

  Challenges associated with requirement elicitation

What are some of the challenges associated with requirement elicitation - How does an iterative approach help that process?

  What are the key components of information assurance

Information Assurance: IT549- What are the key components of information assurance as they relate to individual roles and responsibilities within the information assurance plan?

  Describe ethical issues related to information technology

Describe ethical issues related to information technology. Which feature in Microsoft Word adds organization to your documents?

  Create a risk assessment on sangrafix

Risk Assessment documentation templates are located within this section. Make additional copies as needed. In a real risk analysis process, one of the first steps is meeting with all department managers, upper management, employee representatives,..

  Explain the information-gathering techniques

Describe the information-gathering techniques and design methods you would propose for the project. Identify the key factors that help ensure the information required for the project is gathered successfully

  Describes each goal its definition and importance to company

Create a 2-slide Microsoft PowerPoint training presentation which describes each goal, its definition, values, and importance to your company.

  Create an outline of your new it security policies

Create an outline of your new IT security policies for RollinOn. Be sure to relate your policies to the potential risks.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd