Personally identifiable information

Assignment Help Management Information Sys
Reference no: EM131623130

You have been hired to consult on access controls for a public health care provider, which provides medical services to a surrounding lower- to lower-middle-class community.

Information about clients of this health care provider include Personally Identifiable Information (PII) and Protected Health Information (PHI), which is governed by the federal Health Insurance Portability and Accountability Act (HIPAA) regulation.

Write a 1- to 2-page briefing paper addressed to the executives at the heath care provider that makes recommendations of at least one of the access control models, covering the following access control elements:

Physical access controls that should be in place

Logical access controls for protection of Data at Rest (DAR)

Logical access controls for protection of Data in Motion (DIM)

Reference no: EM131623130

Questions Cloud

Banking and finance industry : Explain the key factors in the banking and finance industry that led to the global financial crisis.
Weight used for equity in computation of solar shade wacc : what would be the weight used for equity in the computation of Solar Shade's WACC?
Explain the trinity lutheran church v. comer case : The Supreme Court recently heard oral argument in the Trinity Lutheran Church v. Comer case. How do you think the Supreme Court will rule
Positive influence on you and how she affected your life : In a short essay. Tell us about your mom who has had a positive influence on you and how she affected your life. How she helped you achieve something you didn't
Personally identifiable information : Write a 1- to 2-page briefing paper addressed to the executives at the heath care provider.Physical access controls that should be in place.
Calculate the refund fraction loan : Calculate the refund fraction for a 60-month loan that is paid off with 18 months remaining.
Awareness to keep their employees safe : What other ways can employers raise awareness to keep their employees safe?
Write a paper about the author formerly known as niccolo : Write a paper about The Author formerly known as Niccolo. Be sure to make direct reference to the text and do more than just summarize the reading.
Prepare an income statement on the income statement : ACCT305 Accounting Information Systems Excel Practical assessment. Prepare an income statement on the Income statement excel sheet

Reviews

Write a Review

Management Information Sys Questions & Answers

  Discuss potential logical threats that require attention.

Suppose you are the IT professional in charge of security for a small pharmacy that has recently opened within a shopping mall. The daily operation of a pharmacy is a unique business that requires a combination of both physical and logical access ..

  Explain the ways in which software can be supported

Describe the methods whereby training materials can be delivered to the users of the software system. Explain the ways in which software can be supported after it is implemented/released. Incorporate additional research or academic information to sup..

  Effective change in an organization

Effective Change in an Organization - The party creating the change or the party that is receiving the change? Or someone else?

  E-commerce offers the promise of conducting business

E-Commerce offers the promise of conducting business on the Internet, via Web-enabled applications. This allows organizations to sell and deliver products and services to customers remotely via the Internet. However, there are security concerns, for ..

  How is this a possible manifestation of moral panic

Police Culture. Describe occupational culture. How is occupational culture apparent between Captain Fuller and Officers Street and Gamble during their disciplinary review meeting. Media Ethics.Define Moral Panic.The sergeants were discussing how th..

  Draw the initial demand and supply curves

Suppose that the quantity demanded rises by 40 million packs of gum per month at each price.- Draw the initial demand and supply curves as given by the table above. Call this graph Graph 1.

  Developing the corporate strategy for information security

Examine three (3) specific functions a CISO and provide examples of when a CISO would execute these functions within the organization.

  Develop intellectual property infringement ramifications

Develop intellectual property violation reporting procedures. Develop intellectual property infringement ramifications. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality reso..

  Explore the reasons for using a marketing information system

Explore the reasons for using a marketing information system in the international market. What are the main types of information you would expect to use?

  What is disaster recovery

What is disaster recovery

  What do they mean by grafting

What are two reasons why the US may not want such a treaty?

  Distinguish between vulnerability threat and control

Theft usually results in some kind of harm. For example, if someone steals your car, you may suffer financial loss, inconvenience (by losing your mode of transportation), and emotional upset (because of invasion of your personal property and space..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd