Identify the security and privacy controls

Assignment Help Management Information Sys
Reference no: EM131058680

I need a 200 word response to this discussion question. There is no need for any type of formating just answer my discussion post question with at least 200 words. Use at least 2 diffrent refrences.

The HITECH Act requires providers applying for financial incentives for meaningful use to engage in a number of very specific data collection, storage, and exchange activities. A large percentage of healthcare providers that might qualify for these financial incentives are small practices-essentially small businesses. These small businesses rarely have the resources available to purchase and maintain the technology necessary to qualify for these incentives. Providers have chosen a variety of solutions including partnering with large health systems that might provide the services as part of the partnership or choosing to outsource the work to a third party.

Dr. Taylor has been providing healthcare for his neighbors since the 1960s. Over the years, he has shared a clinic space with several other independent physicians, sharing expenses, support staff, and on-call responsibilities. Dr. Taylor and his partners have decided that they do not want to follow the path of many of their peers by joining forces with a large health insurance company. At a partners meeting, Dr. Taylor was tasked with finding a cloud provider to help the partners implement an appropriate electronic health record (EHR). The EHR would meet all criteria, including security and privacy regulations, that would qualify these health providers for meaningful use financial incentives.

Use the study materials and engage in any additional research needed to fill in knowledge gaps. Then discuss the following:

Describe the steps necessary to select an appropriate cloud provider that will provide access to an EHR and host data storage for a small provider practice.

Identify the security and privacy controls that the selected cloud provider must be able to implement to comply with the HITECH Act criteria.

Explain the roles and responsibilities of the cloud provider and the healthcare providers in ensuring that the HITECH Act security and privacy regulations are met.

Reference no: EM131058680

Questions Cloud

Explain security and permissions for the android platform : Briefly explain security and permissions for the Android Platform. Briefly describe some of the Android Platform Services. Describe the Android Platform Differences (complete, open, and free).
Describe the major elements of the communication model : Describe the major elements of the communication model. Then, provide an example of a communication event in an organization and explain the model using the communication event
Magnetic field perpendicular : A flexible electric circuit sits on a desk in a magnetic field perpendicular to and pointing into the desk. Which way (cw or ccw as seen from above) is the direction of the emf induced by folding the circuit such as to reduce its area?
Thickness and efficiency of the joint : Two plates of 10 mm thickness each are to be joined by means of a single riveted double strap butt joint. Determine the rivet diameter, rivet pitch, strap thickness and efficiency of the joint.
Identify the security and privacy controls : Describe the steps necessary to select an appropriate cloud provider that will provide access to an EHR and host data storage for a small provider practice.
Output power on secondary coil : A transformer has 4500 turns on a primary coil turns 30,000 turns on the secondary coil. If the secondary coil shows 2.5A of current under 400V and is 100% efficiency find the voltage and current of the primary coil If the new efficiency drops to ..
Is the link between quality and cost : Is the link between quality and cost any different in business as compared to healthcare; why or why not? Locate an article in the AUO library which supports your response
What is the torque experienced by the coil : What is the torque experienced by the coil? What is the magnitude of the magnetic field at the center of the coil?
Determining the constant speed : A flight of stairs is about 3.0 m tall.  How much work to you do carrying a 5.0 cake up three flights of stairs?  You may assume that you do so at constant speed.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Describe argument for the hims development method

Create an argument for the HIMS development method you think would be the most effective in a health care organization. Justify your response

  Calculate the processing load and available capacity

Calculate the processing load and available capacity and develop the load profile for a dishwasher. Eight employees work the assembly process for 40 hours per week each.

  How to respond information system security treats

Responding to Information System Security Treats - How should organizations respond to information system security threats?

  Development of the system using a waterfall model

Describe the steps that will be undertaken during the development of the system using a waterfall model

  Perform an environmental scan

Performing an Environmental Scan and Evaluating Business and Technology - What are the most important factors to consider when performing an environmental scan?

  Using the research topic does the united states benefit

using the research topic does the united states benefit from the world trade organization?1. locate a related reference

  Elements of the innovative process

Elements of the Innovative process - Write a paper in which you examine the elements of the innovative process as well as compare and contrast incremental

  Examine the effects of customer demands

Analyze the effects of customer demands on suppliers and Define various ways customers may prepare for supply interruptions or changes

  Describe potential risks to the information

Describe what techniques and processes you would use to identify the vulnerabilities and threats to the organization you have chosen. Describe potential risks to the information and the related vulnerabilities within the organization when utilizing..

  Discuss whether there are too many standards organizations

Discuss whether there are too many standards organizations attempting to regulate the networking field.  Consider whether consultation is necessary, and whether governmental or larger international bodies should be formed to manage standards.

  Why do you think digital certificates are not used

Why do you think digital certificates are not used on Google's home page (www.google.com)? Should they be?What protocol is being used when you navigated to gmail.google.com? Why did that automatically occur?What is different about the information exc..

  Why is data the most important asset organization possesses

Why is data the most important asset an organization possesses? What other assets in the organization require protection? Describe each asset in detail

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd