Our Services

Get 15% Discount on your First Order

[rank_math_breadcrumb]

Analyzing Privacy Violations

 

Analyzing Privacy Violations

Module 2: A Case for Analyzing Privacy Violations

For this assignment, you will need to review the Case Study presented and assess the impact of the data breach that occurred under your third-party vendor’s system and provide a short report of your conclusions, corrective actions to take, and policy change recommendations.

 Expand AllPanels Collapse AllPanels


Case Study

As the Privacy Officer for a mid-sized healthcare organization, it has been identified that the organization has suffered a breach when a third-party vendor’s system was compromised. When the third-party vendor provided billing services to your patients for all services provided for the past 60-days, a breach resulted in unauthorized access to patient billing information, including names, addresses, and social security numbers. The investigation into the breach provided insight that the third-party vendor did not have ample security measures in place. Unfortunately, the healthcare organization did not conduct their due diligence of ensuring that there were regular audits being performed and that there were strong security measures in place. As a result of this lapse in follow through, the discovered breach exposed the personal and financial information of hundreds of patients.


Action Plan

As the Privacy Officer, you have been tasked with digging deeper into the privacy breach that just occurred and to make corrective action recommendations, as well as provide a proposal of changes to the policies and procedures to prevent similar data breaches from occurring in the future. You should focus on the aspect of the vendor management and compliance with HIPAA regulations.

Steps you will complete the following as part of your report:

1. Assess the HIPAA Privacy Rule violations relevant to the third-party vendor management and the protection of patient information. What are your conclusions?

2. Based upon the breach investigation findings, provide a list of corrective actions that should be taken to improve the security measures and for the oversight of the third-party vendor.

3. Provide a recommendation of policy changes that would better support vendor management practices and ensure adherence to compliance with privacy regulations.

Your deliverable method can be either in the form of a half-page to full page report or PowerPoint slides that outline your recommendations for updating/revising the organization’s privacy policy that includes a proposed corrective action plan of what is needed to prevent additional breaches from occurring.

Note: If you utilize your textbook or any references to support your recommendations, provide a reference list.

Action

Select the Start Assignment button to begin.

Once you have uploaded your file, select Submit Assignment.

Rubric

M2 A Case for Analyzing Privacy Violations

M2 A Case for Analyzing Privacy Violations

Criteria

Ratings

Pts

This criterion is linked to a Learning OutcomeParameters

Parameters
Paper Option
-Uses standard double-spacing without extra spaces between bullets or paragraphs
-Minimum length 1/2 page, maximum length 1 page
-Free of grammatical & spelling errors
-Uses APA in-text citations and reference list IF applicable

PowerPoint Option
-No more than 5 bullets per slide
-Keep slides uncluttered so easy to follow
-Notes Section of slides should contain a detailed outline of what slide is presenting (speaker notes)
-Free of grammatical & spelling errors
-Uses APA in-text citations and reference list on a reference slide IF applicable

7 pts

Meets or Exceeds

Student submission clearly encompasses all paper or PowerPoint parameters -Free of grammatical & spelling errors -Uses APA in-text citations and reference list IF applicable

5 pts

In Progress

Student submission mostly meets paper or PowerPoint parameters -1-3 grammatical & spelling errors -Uses some APA in-text citations and reference list IF applicable

2 pts

Little Evidence

Student submission does not clearly meet the paper or PowerPoint parameters -Has 4 or more grammatical & spelling errors -does not use APA in-text citations and reference list IF applicable

0 pts

No Evidence

Student submission clearly does not meet the required Parameters

7 pts

This criterion is linked to a Learning OutcomeHIPAA Privacy Rule

HIPAA Privacy Rule
-Clearly identifies any violations relevant to the third-party vendor management
CO2

9 pts

Meets or Exceeds

Student submission clearly provides for any violations relevant to the third-party vendor management

6 pts

In Progress

Student submission mostly identifies the violations relevant to the third-party vendor management

3 pts

Little Evidence

Student submission is off topic or does not clearly identify the violations relevant to the third-party vendor management

0 pts

No Evidence

Student submission does not clearly meet compliance issue audit findings or nothing submitted

9 pts

This criterion is linked to a Learning OutcomePolicy Changes

Policy Changes
-Clearly identified policy changes that would support vendor management practices
-A plan for meeting compliance with privacy regulations
CO2

9 pts

Meets or Exceeds

Student submission clearly identified policy changes that would support vendor management practices -A plan for meeting compliance with privacy regulations

6 pts

In Progress

Student submission mostly contains identified policy changes that would support vendor management practices -A plan for meeting compliance with privacy regulations

3 pts

Little Evidence

Student submission does not clearly provide policy changes for vendor management practices or a plan for meeting compliance with privacy regulations

0 pts

No Evidence

Student submission does not clearly meet a security measure assessment or nothing submitted

9 pts

This criterion is linked to a Learning OutcomeCorrective Actions

Corrective Actions
-Provides a clear list of corrective actions that should be taken to improve security measures and oversight of third-party vendors
CO2

10 pts

Meets or Exceeds

Student submission has clear list of corrective actions that should be taken to improve security measures and oversight of third-party vendors

7 pts

In Progress

Student submission contains a mostly clear list of corrective actions that should be taken to improve security measures and oversight of third-party vendors compliance deficiencies

4 pts

Little Evidence

Student submission may be slightly off topic or does not clearly provide list of corrective actions that should be taken to improve security measures and oversight of third-party vendors

0 pts

No Evidence

Student submission does not clearly give a list of corrective actions or nothing is submitted

10 pts

Total Points: 35

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Newwww

Life Rewound Project: Stages in Reverse (Stages 5-8) Use Erikson’s Stages of Development as a theoretical framework and analyze the character’s life journey in reverse. This project is made up of six parts. You will work on a section each week and bring it all together at the end. Below

snh

Submit your Milestone Two literature review. The literature review should be a paper integrating your review of the existing research and theory and relating it to your fully developed topic. You should have incorporated feedback to revise your research questions, and you should have provided support for the basic or

It’s All About the Process

  It’s All About the Process Module 3: It’s All About the Process For this assignment, you will need to review the Case Study presented and go through the process of completing a risk analysis to identify the security threats, determine the potential impacts of these risks and provide recommended

DEI Impacts

 DEI Impacts PowerPoint Module 3: DEI Impacts For this activity, you will be addressing the topic by utilizing a format of your choosing for your deliverable based on the following options: · Canva Infographic · 2-4 slide PowerPoint with explanations in the “notes” sections to provide clarity to slide content

I need help conflict 3

Title: Conflict in an Israeli Collective Community: A Case Study Author(s): Bernard Reisman Source: The Journal of Conflict Resolution, Vol. 25, No. 2 (Jun., 1981), pp. 237-258 The article presents a comprehensive conflict analysis case study. Your assignment is to scrutinize the case study and replicate the analysis within one

esss2

READ THE ATTACHMENT!!!! PAGE-14 Introduction Market research professionals must be able to conduct secondary and primary research to meet a client’s objectives and solve business problems. For this task, you will conduct secondary research, develop a survey, and prepare for a focus group to collect data about your client’s industry,

g

This assignment will introduce you to an overview of the addiction effects, affects, and models. These concepts will be the basis for future assessments. Based on a minimum of three peer reviewed scholarly resources, beyond the course textbook, complete the “Addiction Effects, Affects, and Models ” document with prompts about

need asap

Select a fictional character, celebrity, or historical figure for the project. The person must be in the last stage of Erikson’s Development Stages (65+) and can be living or deceased. This project is made up of six parts. You will work on a section each week and bring it all

Literature Help 1

See Attachments Assignment: Annotations of Beowulf Read Beowulf on pages 13-77 of the attachment and complete the 6 annotations listed below. Annotations should be phrased in complete sentences but do not have to be strictly formal in tone.  Note: You are only looking at Parts XXIII and XXIV for this

SWOT Analysis

cost of a Swot analysis? I would also need a presentation done as well. All rubrics/requirements are in the attachments

i need help d3

Class Discussion – Week 3 This week’s reading (Kriesberg) addressed the social context concerning adopting conflict strategies. Share your interpretation of the aspects highlighted by the author in your own words. Do you find them comprehensive, or can you identify additional social contextual factors? Ex Christina Kreitzer Jan 22 3:49pm|

English Exploration Assignment

Explore various topics by reading, watching, and/or listening to at least 10 sources. Submit a log of your exploration.  · The sources can be any format: print article, social media video, TV episode, podcast episode, etc.  · The sources can be from anywhere: social media, magazines, TV, books, etc. If

Please see attached

Use the above article and other references to determine which types of social media are most or least helpful for businesses desiring to connect more closely with consumers? Use the template below to answer the above question. · 750 words in length (typed, double-spaced, 12-point font) excluding the title and

Please see attached

Please critique ” E-cigarette brands and social media influencers on Instagram: a social network analysis. Links to an external site. ”  Use the template below to answer the above question. · 750 words in length (typed, double-spaced, 12-point font) excluding the title and reference pages. · The student will automatically

esss

READ THE ATTACHMENTS!!!! PAGES 14 Introduction An essential skill for marketing research professionals is analyzing multiple sources of information to determine appropriate research methodologies for meeting a client’s needs. Task 1 challenges you to assume the role of a market research analyst whose client is the owner of a coffee

cirtical thinkg

      Critical Thinking:  A researcher      received two samples: one of a virus and the other of a viroid. Unfortunately, the labels were lost.      Scientist felt that it could be distinguished the two by analyzing the      presence or absence of a single molecule. What molecule would be searching      for and

Form

HSO: In the telemedicine health services organization (HSO), a significant workforce issue arises from the rapid expansion of telemedicine technology and its associated challenges, such as workforce preparedness, technology training gaps, and the burnout of healthcare professionals. As telemedicine becomes more integral to healthcare delivery, the workforce must adapt to