What primary laws-regulations or statutes have been violated

Assignment Help Management Information Sys
Reference no: EM131045257

John Miller is the information security and privacy officer of a local county-owned teaching hospital. He is new to his position and began his work by evaluating the existing security and privacy controls that are in place in the institution. He is also new to information security, having only recently graduated with a BS in information security with professional experience as an active-directory administrator for two years. This work with active directory created his interest in pursuing a position in the field of security. Because he has most experience in the area of account management, user creation and management, groups, roles and group policy, these are the areas where he began his work. He found literally hundreds of idle accounts indicating that users are created but are not properly discontinued when medical students, nursing students, and other employees move on and no longer need access to the data collected and stored by the hospital.

This discovery inspired him to begin digging into other aspects of the security controls, and he found evidence of malware on the servers that house the data collected and stored for use by the hospitals clinical systems. His next discovery was the most alarming. The objective of the malware that had deeply infested the hospital systems was to package and transmit all available data to a remote host located in North Korea. John is clearly in over his head at this point and needs to act quickly to resolve this situation and stop the flow of personally identifiable health information to an unauthorized third party.

Use the study materials and any additional research needed to fill in knowledge gaps. Then discuss the following:

1. What primary laws, regulations, or statutes have been violated by this lack of attention to controls, leading to this serious breach of security?

2. What channels of communication should John enlist to assist him in resolving this matter, and in what order should those communication sources be contacted?

3. What tools and any supporting resources are available to John to determine the breadth of the breach and the mitigations available to secure those assets?

Reference no: EM131045257

Questions Cloud

Test statistic-critical value and p-value : Conduct the hypothesis test and provide the test statistic, critical value, and P-value, and state the conclusion.
Explain primary reasons why your strategy would be effective : Identify the main steps required to configure Cisco IOS IP service level agreements (SLAs) functionality. Outline a strategy for defining the operations, objects, or actions embedded in these steps. Explain the primary reasons why your strategy wo..
How do law enforcement organizations regulate use of media : How do law enforcement organizations regulate the use of social media? Just about every major law enforcement organization has a Facebook account associated with the organization's website.
Write a paper that identify the customer and business needs : Write a 750- to 1,250-word scope verification paper in which you identify the customer and business needs as the theme for the project your team selected. Complete the following in your paper.
What primary laws-regulations or statutes have been violated : What channels of communication should John enlist to assist him in resolving this matter, and in what order should those communication sources be contacted?
Contract with ideal insurance company : Brown enters into a written contract with Ideal Insurance Company under which, in consideration of her payment of the premiums, the insurance company promises to pay State College the face amount of the policy, $100,000, on Brown's death. Brown pa..
Provide a target price and also analyst recommendation : AC221 Financial Accounting Spring 2016 - Financial Statement Analysis Project. You will need to provide a target price and also analyst recommendation (Strong Buy, Buy, Hold, Sell, Strong Sell). You can rely on what stock analysts think already and..
Prepare the journal entries in the books of federation : Prepare the journal entries in the books of Federation Ltd to record the acquisition of Nigeria Pty Ltd and a Trail balance with entries then a statement of financial position for Federation Ltd immediately after the acquisition.
Option contract without pamela permission : Georgia purchased an option on Greenacre from Pamela for $10,000. The option contract contained a provision by which Georgia promised not to assign the option contract without Pamela's permission.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information managementdiscuss how the corrections system

information managementdiscuss how the corrections system uses case management software to more efficiently and safely

  Management infrastructure considerations are critical to a

management infrastructure considerations are critical to a strong defense. hackers place management stations high on

  How significant are these problems for healthcare

What are two problems related to use of technology identified in this article? How significant are these problems for healthcare organizations?

  Determine fundamental business advantages of e-business

Determine the fundamental business advantages and disadvantages of e-business and e-commerce across the business organization.

  Discuss specifically how the rules do or do not apply

Research the FRCP and e-discovery rules as they pertain to e-mail. Write a synopsis covering the topic: Describe the rules governing the situation.

  Cost benefits analysis for new systems

Cost Benefits Analysis for New Systems - One of the benefits made in some government IT projects

  Develop and populate the prototypee-commerce website

Develop and populate the prototypee-commerce website for which you prepared a strategic analysis and preliminary prototype e-commerce website.

  Issues with byod that could affect the enterprise

Moving beyond work/life balance issues, do you see other issues with BYOD that could affect the Enterprise? e.g. Is there a possibility of liability issues should the employee use the enterprise provided device for illegal activites

  Best practices in emr implementation a systematic review

best practices in emr implementation a systematic review analysisread the article best practices in emr implementation

  Discuss the applicability to it governance

Your paper must present a summary of your research, discuss the applicability to IT governance, present a discussion of five or more policy issues related to the topic.

  Contribute to the high failure rate under certain situations

What are some characteristics of software development that contribute to the high failure rate under certain situations?

  Show business presentation example with excessive technology

Business Presentation Examples with Excessive Technology and Distracting Visual Aids Sometimes, technology and visual aids can be more of a distraction than a helpful component to a presentation.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd