How would probability of a personal laptop being stolen

Assignment Help Management Information Sys
Reference no: EM133338416

Assignment:

Massachusetts provider settles HIPAA case for $1.5 million

Massachusetts Eye and Ear Infirmary and Massachusetts Eye and Ear Associates, Inc. (collectively referred to as "MEEI") has agreed to pay the U.S. Department of Health and Human Services (HHS) $1.5 million to settle potential violations of the HIPAA Privacy and Security Rules. MEEI has also agreed to take corrective action to improve policies and procedures to safeguard the privacy and security of their patients' protected health information and retain an independent monitor to report on MEEI's compliance efforts. OCR's investigation followed a breach report submitted by MEEI, as required by the HIPAA Breach Notification Rule, reporting the theft of an unencrypted personal laptop containing the electronic protected health information (ePHI) of MEEI patients and research subjects.

The information contained on the laptop included patient prescriptions and clinical information. OCR's investigation indicated that while MEEI's management was aware of the Security Rule, MEEI failed to take necessary steps to comply with the requirements of the Rule, such as such as conducting a thorough analysis of the risk to the confidentiality of ePHI maintained on portable devices, implementing security measures sufficient to ensure the confidentiality of ePHI that MEEI created, maintained, and transmitted using portable devices, adopting and implementing policies and procedures to restrict access to ePHI to authorized users of portable devices, and adopting and implementing policies and procedures to address security incident identification, reporting, and response.

1. Identify two policies that that would help MEEI reduce risk associated with the findings identified above.

a. Identify the two policies.

b. Explain how each would address concerns raised in the case above.

2. What technical or procedural measures could have been taken to secure the confidentiality of ePHI maintained on portable devices?

3. When performing a risk assessment, how would you classify the likelihood or probability of a personal laptop being stolen?

4. How would the risk assessment results change when comparing an ordinary laptop theft with the theft of a laptop containing ePHI?

Reference no: EM133338416

Questions Cloud

Federal welfare programs expanded dramatically : Federal welfare programs expanded dramatically during President Johnson's War on Poverty, continuing a prominent government role in welfare since Franklin D
About several different theories of human development : You learned about several different theories of human development. Which theory did you find most compelling? Describe the theory
Review recent hipaa violations : Access "HIPAA Violation Cases," located in the topic Resources, to review recent HIPAA violations.
Benefit the supply chain and logistics field : After learning about what economists study, how could an economist benefit the Supply Chain and Logistics field?
How would probability of a personal laptop being stolen : When performing a risk assessment, how would you classify the likelihood or probability of a personal laptop being stolen?
Social security and medicare are pay-as-you-go plans : What do economists mean when they say Social Security and Medicare are "pay-as-you-go" plans? What are the Social Security and Medicare trust funds
Explain market failure : Explain market failure. What is government's role when market failure occurs? Explain why.
Explain how shifts in income and substitution effects : Explain how shifts in the income and substitution effects can help us understand these developments.
Recessionary output gap or inflationary output gap : Is the economy experiencing a recessionary output gap or an inflationary output gap? Explain.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd