Identify the principal threats in each of the given cases


Assignment: Formulate a secure storage and retrieval process for healthcare data.

Requirements:

The Assignment should be three to four pages in length, prepared in a Microsoft Word document, and APA-formatted.

Include a title page and reference page. Length requirements do not include the title page, and the reference page.

This Assignment should follow the conventions of Standard American English featuring correct grammar, punctuation, style, and mechanics.
Include at least four references. All sources must be scholarly. Wikipedia is not acceptable. Use APA style for all citations including course materials.

Your writing should be well ordered, logical, and unified, as well as original and insightful.

Instructions:

There are two parts to this Assignment. Each one will help you better understand how security breaches are handled and give you the opportunity to create a security plan. Creating this security plan will help you understand what is needed to protect data.

Part I

1. Search the internet for news about security breaches in healthcare and other industries in the last three years. Suggested source for the latest breach information from the Office of Civil Rights:

Source: HIPAA Privacy, Security, and Breach Notification Audit Program: United States Department of Health & Human Services.

2. Write a critical essay summarizing the two cases. In your summary, identify the principal threats in each of these cases and what could have been done to minimize these threats.

Part II

1. Using what you learned from Part I, create a security plan for a medium sized health care facility. In your security plan, evaluate how you would approach security threats from both inside and outside the organization. Be sure that you address the following items in your security plan:

a. physical and administrative safeguards: employee education, health information archival and retrieval systems, disaster recovery, storage media

b. access safeguards: authentication, password management

c. network safeguards: cloud computing, firewalls, encryption / decryption and using mobile devices to deliver healthcare

2. Critique the plan you have written, identifying its strengths, elements that were not covered in the text, and any additional omissions or weaknesses of the plan.

Format your assignment according to the following formatting requirements:

1. The answer should be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides.

2. The response also include a cover page containing the title of the assignment, the student's name, the course title, and the date. The cover page is not included in the required page length.

3. Also Include a reference page. The Citations and references should follow APA format. The reference page is not included in the required page length.

Solution Preview :

Prepared by a verified Expert
HR Management: Identify the principal threats in each of the given cases
Reference No:- TGS02964138

Now Priced at $55 (50% Discount)

Recommended (96%)

Rated (4.8/5)