Our Services

Get 15% Discount on your First Order

[rank_math_breadcrumb]

Health Care Cybersecurity[WLO: 4] [CLOs: 2, 4, 5] Prior to beginning work on this assignment, Review Chapters 13 and 16 from your textbook.Read the article Healthcare Ransomware Attacks Increased by 9

Health Care Cybersecurity[WLO: 4] [CLOs: 2, 4, 5]

Prior to beginning work on this assignment,

You are being interviewed today for a chief executive officer (CEO) position with a local hospital, Shady Valley Hospital Center. The hospital is a 500-bed comprehensive facility that offers medical and surgical programs such as emergency care, oncology, pediatrics, heart and vascular care, and orthopedics. The hospital is committed to bringing state-of-the-art healthcare services with a focus on diversity, equity, and quality of care for their patients. Over the past 5 years, the board of trustees understood the importance of being proactive regarding reducing or even eliminating ransomware attacks. The board of trustees invested in a 5-million-dollar upgrade to protect both employee and patient electronic information, specifically the hospitals EHRs system.

During the interview process the board of trustees presents you with a real-world scenario as follows: 

The chief information officer (CIO) and the developer of the software company Ransom Detect informed you that the hospital experienced a ransomware attack overnight. All the hospital’s computer systems are shut down, and the patient’s EHR information and employee human resources (HR) information cannot be accessed. The attackers are demanding payment before they release the patient’s private health care information and employee HR information. To make matters worse or more urgent, the computer systems that are used to monitor patient vitals such as operating rooms, cardiac, emergency room, and neonatal care are non-functional. Additionally, the computer systems that are used to calculate medicine doses are not functioning properly and therefore causing fear among caregivers that patients could be inadvertently given 2, 3, or 4 times the proper dose of prescribed medicine. Lastly, it would appear that this recent cyberattack will delay patients from receiving surgical procedures for an undetermined length of time. 

The board of trustees provides you a few moments to think about the issues. Cyber criminals expect their victims to pay the ransom. In your paper, address the following:  

  • Explain to the board of trustees what additional security step policies could/should be taken, if the organization should pay/or refuse to pay the ransom, and why.
  • Describe what comes next; in other words, provide a detailed action plan that should take place after paying/or declining to pay the ransom.
  • Define any ethical and legal consequences regarding paying or not paying the ransom that may occur.
  • Describe who should be informed of the cyberattack (e.g., employees/staff, patients, the media, state/federal FBI agencies) and why.
  • Analyze the pros and cons of considering cyber insurance for future attacks.

Lastly, based on your research and this week’s readings, 

  • Explain, from a legal perspective, whether the cyber attackers could be criminally liable for any harm or death that occurs during a ransomware attack.
  • Be sure to validate your assertion with an analysis of a real-world court case regarding harm or death post ransomware attack in the last 5 years.

Your Healthcare Cybersecurity Response paper

  • must be three to five double-spaced pages in length (not including title and references pages) and formatted according toAPA StyleLinks to an external site. as outlined in the Writing Center’s APA Formatting for Microsoft WordLinks to an external site. resource.
  • must include a separate title page with the following:
  • title of paper in bold font
  • Space should appear between the title and the rest of the information on the title page.
  • student’s name
  • name of institution (The University of Arizona Global Campus)
  • course name and number
  • instructor’s name
  • due date
  • must utilize academic voice. See theAcademic VoiceLinks to an external site. resource for additional guidance.
  • must include an introduction and conclusion paragraph. Your introduction paragraph needs to end with a clear thesis statement that indicates the purpose of your paper.
  • For assistance on writing Introductions & ConclusionsLinks to an external site. andWriting a Thesis StatementsLinks to an external site., refer to the Writing Center resources.
  • must use at least three scholarly or peer-reviewed sources published in the past 5 years in addition to the course text.
  • The Scholarly, Peer-Reviewed, and Other Credible SourcesLinks to an external site. table offers additional guidance on appropriate source types. If you have questions about whether a specific source is appropriate for this assignment, please contact your instructor. Your instructor has the final say about the appropriateness of a specific source.
  • To assist you in completing the research required for this assignment, viewQuick and Easy Library ResearchLinks to an external site. tutorial, which introduces the University of Arizona Global Campus Library and the research process, and provides some library search tips.
  • must document any information used from sources in APA Style as outlined in the Writing Center’s APA: Citing Within Your PaperLinks to an external site.
  • must include a separate references page that is formatted according to APA Style as outlined in the Writing Center. See theAPA: Formatting Your References ListLinks to an external site. resource in the Writing Center for specifications.

Accessibility Statement: If you have a disability that impacts your ability to successfully participate in this or any other course activity, please provide your instructor with your authorized Accommodation Request form from the Office of Student Access and Wellness so that they can discuss and arrange an alternative plan with your instructor.

Carefully review the Grading RubricLinks to an external site. for the criteria that will be used to evaluate your assignment.

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Instructions In a few brief sentences, write a convincing argument you might use in trying to get a reluctant employee to agree to completing and submitting a self-evaluation (we are assuming that a s

Instructions In a few brief sentences, write a convincing argument you might use in trying to get a reluctant employee to agree to completing and submitting a self-evaluation (we are assuming that a self-evaluation is optional in your evaluation system.) APA but no references needed for this assignment! Just your own

Instructions Read Case: Surprise! Found in Chapter 15. Answer questions 1 – 3. Please be sure that each response is 5-10 sentences Case: Surprise! When the business office employees arrived at the

Instructions Read Case:  Surprise! Found in Chapter 15.  Answer questions 1 – 3.  Please be sure that each response is 5-10 sentences Case: Surprise! When the business office employees arrived at the hospital Monday morning, they immediately noticed the apparent absence of the office manager. This was not unusual; the manager was

Write 400–600 words that respond to the following questions with your thoughts, ideas, and comments. Be substantive and clear, and use examples to reinforce your ideas. The Health Information Data Exc

Write 400–600 words that respond to the following questions with your thoughts, ideas, and comments. Be substantive and clear, and use examples to reinforce your ideas. The Health Information Data Exchange is an emerging topic within healthcare systems. Discuss the following: Explain what use the health information data exchange could

For this essay, you will examine a scenario and apply sound ethical decision-making to determine the proper course of action. Scenario: Cindy Lou Kodingwho is a new coder at Southern Columbia Su

For this essay, you will examine a scenario and apply sound ethical decision-making to determine the proper course of action. Scenario: Cindy Lou Kodingwho is a new coder at Southern Columbia Surgical Center. She works under the Office Manager, Martha May, but also closely works with the physicians directly when

Imagine that you are a health information management (HIM) supervisor analyzing a computer-assisted coding system to find out if it will work well for your facility. The following is an operative note

Imagine that you are a health information management (HIM) supervisor analyzing a computer-assisted coding system to find out if it will work well for your facility. The following is an operative note with the ICD-10-PCS codes assigned by the computer-assisted coding (CAC) system that is being reviewed. Analyze the operative

Assignment objective: Imagine you are a new medical coder, and you are learning the process for looking up extracorporeal cases in ICD-10-PCS. Analyze and review an extracorporeal assistance case and

Assignment objective: Imagine you are a new medical coder, and you are learning the process for looking up extracorporeal cases in ICD-10-PCS. Analyze and review an extracorporeal assistance case and an extracorporeal performance case, and discuss proper ICD-10-PCS code assignment for these sections. Length: Your submission should be a minimum

1- Compare the four levels of prevention (primordial, primary, secondary, and tertiary) with the levels of service provision available across the life span. (CLO #2) 2- Compare the purposes, benefits,

1- Compare the four levels of prevention (primordial, primary, secondary, and tertiary) with the levels of service provision available across the life span. (CLO #2) 2- Compare the purposes, benefits, and limitations of Medicare, Medicaid, and other government sponsored programs in achieving health equity.  (CLO #2) 3- Discuss selected cultural

Submit a 2-3 page double-spaced Essay: Examining the Micromanager as found in the chapter. Make sure to include APA cited references and in-text citations for any information that you use from other

Submit a 2-3 page double-spaced Essay: Examining the Micromanager as found in the chapter.  Make sure to include APA cited references and in-text citations for any information that you use from other sources. Essay: Examining the Micromanager Surely most, if not all, readers ofthis text are familiar with the term

Hide Assignment InformationInstructions Read Case: The Employee in the Corner. Describe in detail what you would do in this situation. For each decision or action you mention, explain why you are taki

Hide Assignment InformationInstructions Read Case: The Employee in the Corner. Describe in detail what you would do in this situation. For each decision or action you mention, explain why you are taking this particular step.  (It is acceptable for you to make a few reasonable assumptions about you and your circumstances, as

Now that you have suggested an agile systems development life cycle (SDLC) and explored the requirements of the Health Insurance Portability and Accountability Act (HIPAA), you need to ensure that you

Now that you have suggested an agile systems development life cycle (SDLC) and explored the requirements of the Health Insurance Portability and Accountability Act (HIPAA), you need to ensure that your processes support the security of patient data. Complete the following: Conduct research to identify a healthcare data security plan

Write 400–600 words that respond to the following questions with your thoughts, ideas, and comments. Be substantive and clear, and use examples to reinforce your ideas. Healthcare information and syst

Write 400–600 words that respond to the following questions with your thoughts, ideas, and comments. Be substantive and clear, and use examples to reinforce your ideas. Healthcare information and system security is a major consideration for small and large healthcare organizations. Complete the following for this assignment: Conduct research to