Our Services

Get 15% Discount on your First Order

[rank_math_breadcrumb]

making recommendations to protect patient health information

 making recommendations to protect patient health information 

Module 1: A Case for Securing Healthcare Data

For this assignment, you will need to review the Case Study presented and perform an audit to assess if there are any gaps related to regulations, internal policies and procedures to identify any areas where the organization’s data security is leaving them vulnerable to virtual attacks. You will need to utilize the CIA triad principles to assist you in making recommendations to protect patient health information, along with a strategy to prevent future security breaches from occurring.

 Expand AllPanels Collapse AllPanels


Case Study


Action Plan

Steps you will complete as part of your audit:

1. Assess the Health Center’s policies and procedures for managing user access to their electronic health record system. Ask yourself, are there clear policies for assigning and revoking user access rights based on job roles?

2. Review and assess the quality and frequency of security updates to the Health Center’s electronic health record. Did you observe protocols in place for performing updates and applying patches as needed?

3. Assess the encryption methods in place for protecting patient health information. Are you confident that both data at rest and data in transit are sufficiently encrypted using current systems in place?

Your deliverable method can be either in the form of a half-page to full page report or PowerPoint slides that outline your findings from the audit, including any identified compliance issues, an assessment of current security measures, and strategies you are recommending improving current data protection and regulatory compliance.

Note: If you utilize your textbook or any references to support your recommendations, provide a reference list.

Action

Select the Start Assignment button to begin.

Once you have uploaded your file, select Submit Assignment.

Rubric

M1 A Case for Securing Healthcare Data

M1 A Case for Securing Healthcare Data

Criteria

Ratings

Pts

This criterion is linked to a Learning OutcomeParameters

Parameters
Paper Option
-Uses standard double-spacing without extra spaces between bullets or paragraphs
-Minimum length 1/2 page, maximum length 1 page
-Free of grammatical & spelling errors
-Uses APA in-text citations and reference list IF applicable

PowerPoint Option
-No more than 5 bullets per slide
-Keep slides uncluttered so easy to follow
-Notes Section of slides should contain a detailed outline of what slide is presenting (speaker notes)
-Free of grammatical & spelling errors
-Uses APA in-text citations and reference list on a reference slide IF applicable

7 pts

Meets or Exceeds

Student submission clearly encompasses all paper or PowerPoint parameters -Free of grammatical & spelling errors -Uses APA in-text citations and reference list IF applicable

5 pts

In Progress

Student submission mostly meets paper or PowerPoint parameters -1-3 grammatical & spelling errors -Uses some APA in-text citations and reference list IF applicable

2 pts

Little Evidence

Student submission does not clearly meet the paper or PowerPoint parameters -Has 4 or more grammatical & spelling errors -does not use APA in-text citations and reference list IF applicable

0 pts

No Evidence

Student submission clearly does not meet the required Parameters

7 pts

This criterion is linked to a Learning OutcomeAudit Findings

Audit Findings
Compliance Issues
-Clearly identifies any compliance issues

9 pts

Meets or Exceeds

Student submission clearly provides for Audit Findings on Compliance Issues

6 pts

In Progress

Student submission mostly provides the audit findings on compliance issues

3 pts

Little Evidence

Student submission is off topic or does not clearly layout the finding of the audit on compliance issues

0 pts

No Evidence

Student submission does not clearly meet compliance issue audit findings or nothing submitted

9 pts

This criterion is linked to a Learning OutcomeSecurity Measure Assessment

Security Measure
Assessment
*Incorporate applicable CIA triad principles into your assessment.
-Provides clear assessment of current security measures
-Including job role user access controls
CO1

9 pts

Meets or Exceeds

Student submission clearly provides for the Security Measure Assessment by -Having clear assessment of current security measures -Including job role user access controls

6 pts

In Progress

Student submission mostly provides for the Security Measure Assessment by -Having clear assessment of current security measures -Including job role user access controls

3 pts

Little Evidence

Student submission does not clearly provide the Security Measure Assessment by -Having clear assessment of current security measures -Including job role user access controls

0 pts

No Evidence

Student submission does not clearly meet a security measure assessment or nothing submitted

9 pts

This criterion is linked to a Learning OutcomeStrategies

Strategies
*Incorporate the CIA triad principles: Confidentiality, Integrity & Availability into your strategies.
-Recommends strategies to improve the current data protection policies
-Recommends any actions necessary to meet regulatory compliance deficiencies
CO1

10 pts

Meets or Exceeds

Student submission has clear Strategy for Recommendations -to improve current data protection policies -for any actions necessary to meet regulatory compliance deficiencies

7 pts

In Progress

Student submission contains a mostly clear Strategy for Recommendations -to improve current data protection policies -for any actions necessary to meet regulatory compliance deficiencies

4 pts

Little Evidence

Student submission may be slightly off topic or does not clearly provide Strategy for Recommendations -to improve current data protection policies -for any actions necessary to meet regulatory compliance deficiencies

0 pts

No Evidence

Student submission does not clearly outline recommendations of strategies for improving current data protection policies and/or any actions needed to meet regulatory compliance deficiencies or nothing is submitted

10 pts

Total Points: 35

Previous
Next

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Revision Plan for an Ess

Page 2 of 2 Revision Plan for an Essay Task: Choose the Six Source Essay or the Multi-Source Literature Review, and write a revision plan which either discusses the changes that you made from the Six Source Essay to the Multi-Source Literature Review, or outlines the changes you will make

Analyzing a Literature Review from a Scholarly Journal Article

2 This discussion thread is designed to help you see how a synthesis of sources essay, or literature review, is organized.  Please download the article, “Converging Recommendations for Culturally Responsive Literacy Practices: Students with Learning Disabilities, English Language Learners, and Socioculturally Diverse Learners,” by Susan V. Piazza, Shaila Rao, and

Explore Human Resources

 Week 2: Explore Human Resources: Task 1 – Presenting Constructive Feedback to Motivate, Change, and Inspire Week 2: Explore Human Resources: Task 1 – Presenting Constructive Feedback to Motivate, Change, and Inspire 90 Points: Task 1 – Presenting Constructive Feedback to Motivate, Change, and Inspire What you’ll learn · Why

english

We’re sorry but this app doesn’t work properly without JavaScript enabled. Please enable it to continue. MGMT 365 Chapter 5 Fall 2025 Share Thread details Share Embed Report inappropriate content Language: English (US) No results Show related comments Comments by slide Playback speed 1x (normal) Slower Faster 1x Before selecting

Introduction Paragraph

Follow this outline I. Introduction A. Hook: Have you ever bought a shirt that looked great, was super cheap and trendy at first, but then ripped or faded after just one wash? That’s fast fashion. B. Background info: Fast fashion is all about trendy clothes made really fast and sold

Developing Categories for the Literature Review

2 In this discussion topic, we will explore some resources that are designed to help students understand the concept of a  literature review. Please browse these resources and then complete the discussion post below. · the article by Debora F.B. Leite, Maria Auxiliadora Soares Padilha, Jose G. Cecatti, “Approaching Literature Review for

Introduction Paragraph

Outline of Essay    I. Introduction A. Hook: College sports bring in billions through ticket sales, merchandise, and TV deals, yet the athletes themselves rarely see direct financial benefits. B. Background Info: The NCAA currently prevents college athletes from being directly paid, though schools and networks profit heavily. Many athletes

Visual Aid

Attached Why use visual aids? Make ideas clear and understandable 1 Make a speech more interesting 2 Can help an audience remember facts and details 3 Why use visual aids Make long complicated explanations unnecessary 1 Help prove a point 2 Can add to your credibility (if used correctly) 3

FieldWork

(on file) KINESICS: the study of body motion or body behavior. In this assignment, уou will venture out into a рubliс sрaсe (i.e. a сoffee shoр, рark, mall) and observe the рeoрle around уou. Tune out what theу are saуing and then sit baсk and watсh. Take notes on what

Question

Need help with a question Stewart-Steele1 MWP #1: Profile of a Culture or Ethnic Group Weight: 20% of final grade Length and Formatting: 2-3 pages, typed, double-spaced, Black 12-point Times New Roman font, using standard MLA format. Assignment Preparation: Brainstorm about a culture or ethnic group. (Useful for Mind Map

The Six-Source ES

Writing Assignment # 2 The Six-Source Essay: Expanded Synthesis Summary of assignment · Six Source Essay-WA#2-Click on this link! Turnitin™ This assignment will be submitted to Turnitin™. Instructions Instructions You will receive a preliminary grade on your initial draft. The revision is due after receiving instructor feedback and revising the

Preparing for the Six-Source and the Synthesis of Sources

1 Week 4, Discussion 1 — Preparing for the Six-Source Essay and the Synthesis of Sources Essay (Literature Review)   Must post first. Your response to this discussion is  due by this week Friday at 11:59 PM Eastern Standard Time (EST). You are also asked to respond to at least one

W3 1

 Need help with a topic and will share with the right person. 

W3 3

 Need help with a topic and will share with the right person. 

W3 4

 Need help with a topic and will share with the right person. 

W3 2

 Need help with a topic and will share with the right person.