Our Services

Get 15% Discount on your First Order

[rank_math_breadcrumb]

making recommendations to protect patient health information

 making recommendations to protect patient health information 

Module 1: A Case for Securing Healthcare Data

For this assignment, you will need to review the Case Study presented and perform an audit to assess if there are any gaps related to regulations, internal policies and procedures to identify any areas where the organization’s data security is leaving them vulnerable to virtual attacks. You will need to utilize the CIA triad principles to assist you in making recommendations to protect patient health information, along with a strategy to prevent future security breaches from occurring.

 Expand AllPanels Collapse AllPanels


Case Study


Action Plan

Steps you will complete as part of your audit:

1. Assess the Health Center’s policies and procedures for managing user access to their electronic health record system. Ask yourself, are there clear policies for assigning and revoking user access rights based on job roles?

2. Review and assess the quality and frequency of security updates to the Health Center’s electronic health record. Did you observe protocols in place for performing updates and applying patches as needed?

3. Assess the encryption methods in place for protecting patient health information. Are you confident that both data at rest and data in transit are sufficiently encrypted using current systems in place?

Your deliverable method can be either in the form of a half-page to full page report or PowerPoint slides that outline your findings from the audit, including any identified compliance issues, an assessment of current security measures, and strategies you are recommending improving current data protection and regulatory compliance.

Note: If you utilize your textbook or any references to support your recommendations, provide a reference list.

Action

Select the Start Assignment button to begin.

Once you have uploaded your file, select Submit Assignment.

Rubric

M1 A Case for Securing Healthcare Data

M1 A Case for Securing Healthcare Data

Criteria

Ratings

Pts

This criterion is linked to a Learning OutcomeParameters

Parameters
Paper Option
-Uses standard double-spacing without extra spaces between bullets or paragraphs
-Minimum length 1/2 page, maximum length 1 page
-Free of grammatical & spelling errors
-Uses APA in-text citations and reference list IF applicable

PowerPoint Option
-No more than 5 bullets per slide
-Keep slides uncluttered so easy to follow
-Notes Section of slides should contain a detailed outline of what slide is presenting (speaker notes)
-Free of grammatical & spelling errors
-Uses APA in-text citations and reference list on a reference slide IF applicable

7 pts

Meets or Exceeds

Student submission clearly encompasses all paper or PowerPoint parameters -Free of grammatical & spelling errors -Uses APA in-text citations and reference list IF applicable

5 pts

In Progress

Student submission mostly meets paper or PowerPoint parameters -1-3 grammatical & spelling errors -Uses some APA in-text citations and reference list IF applicable

2 pts

Little Evidence

Student submission does not clearly meet the paper or PowerPoint parameters -Has 4 or more grammatical & spelling errors -does not use APA in-text citations and reference list IF applicable

0 pts

No Evidence

Student submission clearly does not meet the required Parameters

7 pts

This criterion is linked to a Learning OutcomeAudit Findings

Audit Findings
Compliance Issues
-Clearly identifies any compliance issues

9 pts

Meets or Exceeds

Student submission clearly provides for Audit Findings on Compliance Issues

6 pts

In Progress

Student submission mostly provides the audit findings on compliance issues

3 pts

Little Evidence

Student submission is off topic or does not clearly layout the finding of the audit on compliance issues

0 pts

No Evidence

Student submission does not clearly meet compliance issue audit findings or nothing submitted

9 pts

This criterion is linked to a Learning OutcomeSecurity Measure Assessment

Security Measure
Assessment
*Incorporate applicable CIA triad principles into your assessment.
-Provides clear assessment of current security measures
-Including job role user access controls
CO1

9 pts

Meets or Exceeds

Student submission clearly provides for the Security Measure Assessment by -Having clear assessment of current security measures -Including job role user access controls

6 pts

In Progress

Student submission mostly provides for the Security Measure Assessment by -Having clear assessment of current security measures -Including job role user access controls

3 pts

Little Evidence

Student submission does not clearly provide the Security Measure Assessment by -Having clear assessment of current security measures -Including job role user access controls

0 pts

No Evidence

Student submission does not clearly meet a security measure assessment or nothing submitted

9 pts

This criterion is linked to a Learning OutcomeStrategies

Strategies
*Incorporate the CIA triad principles: Confidentiality, Integrity & Availability into your strategies.
-Recommends strategies to improve the current data protection policies
-Recommends any actions necessary to meet regulatory compliance deficiencies
CO1

10 pts

Meets or Exceeds

Student submission has clear Strategy for Recommendations -to improve current data protection policies -for any actions necessary to meet regulatory compliance deficiencies

7 pts

In Progress

Student submission contains a mostly clear Strategy for Recommendations -to improve current data protection policies -for any actions necessary to meet regulatory compliance deficiencies

4 pts

Little Evidence

Student submission may be slightly off topic or does not clearly provide Strategy for Recommendations -to improve current data protection policies -for any actions necessary to meet regulatory compliance deficiencies

0 pts

No Evidence

Student submission does not clearly outline recommendations of strategies for improving current data protection policies and/or any actions needed to meet regulatory compliance deficiencies or nothing is submitted

10 pts

Total Points: 35

Previous
Next

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

medium message

Need copy of the art screenprint The Medium Is The Message Marshall McLuhan’s quote that “the medium is the message” helps us understand the frontiers and limits of our tools. Artistic mediums are extensions of our creativity and avenues that help define changes in scale. For example, the introduction of

week4

week4 Week 4 Readings & Resources Week 4 Objectives After successful completion of this week’s module, the student will be able to: · Describe how to resolve issues related to boundaries and multiple relationships and ways to prevent such issues from becoming ethical dilemmas. · Define boundaries and multiple relationships

week3

Week 3 Objectives After successful completion of this week’s module, the student will be able to: · Describe responsibilities in quality and competent record keeping. · Explore issues surrounding online counseling. · Explore responsibilities surrounding gatekeeping. · Describe the issues involved in the Client’s Rights. · Identify and describe ethical

song summary

Consider songs you have heard—and perhaps strongly like or dislike—that make some sort of social commentary An evaluation includes a brief summary of the subject being evaluated, but its central idea is a JUDGEMENT about the subject (is the song’s message good or bad? Do you agree or disagree with

assitant needed E

please see attachments ENG 106: Composition II Learning Unit 2: Instructions Topic Proposal Assignment Instructions Type a one (full) page proposal that discusses the topic you would like to research for the Informative Essay and the Persuasive Essay. Your proposal should include the following: 1. A statement of the narrowed

English Homework

 Several companies are discussed in Ch. 11 on their use of data to better secure their operations. Pick one of these companies and provide a brief summary of the company’s actions and their expected outcomes. 

English composition

  What is your narrowed research topic? The Ethical, Societal, and Scientific Implications of Legalizing Genetic Modification and Cloning in Humans Why have you chosen this topic? How does this topic affect you personally? (It does.) Be specific. I have chosen this topic because genetic modification and cloning have the

2.2 Submit: Professional Practice—Company Overview

In this section, you will develop the company overview. Your first step is to select a company from the list of companies approved for this activity. Instructions are found in the Professional Practice Project document. Your submission should include a proper title page, content, and reference page. Although you are

English Honors Peer-graded Assignment: Task 1: Create a resumé

Assignment Topic: The assignment asks you to create a resumé, taking a supplied example (Jake Adams resume.jpg) as a model but personalizing it with your own choice of biographical information or using the biographical information supplied in the Grace Lopez Personna document. The process of creating this will demonstrate that

mic

  You are working in a laboratory producing new antibiotics for human and veterinary use. One compound with potential value inhibits the action of prokaryotic ribosomes. The compound, however, was shown to inhibit the growth of animal cells in culture. What is one possible explanation for its effect on animal

I need help poster

Final Poster Guidelines Untitled document Final Poster Guidelines The following guidelines are prepared for preparation of the final poster. Poster Format You do not need to submit a hardcopy. I need a digital file. Please send your poster in a readable digital format such as Powerpoint or PDF. The digital

I need help 6tb

#6 Textbook Chapter Discussion Questions The book is called, ¨Health Education (fourth edition) Creating strategies for school and community health.¨ A list of the number of chapter is posted on Canvas under Announcements! At the end of each chapter, there are Discussion Questions to read and ANSWER. Read the discussion

TS2

READ THE ATTACHMENT!!!! PAGES 14 Introduction This performance assessment task focuses on search engine optimization (SEO) and its role in digital marketing strategies. In this task, you will demonstrate your understanding of how insights from SEO can inform digital marketing strategies and planning for the future. Specifically, you will explain

English HOMEWORK

  The Argument for Forgiving Student Loans This course culminates with the composition of a classical argument essay. This essay should be on a topic within education today. It needs to make use of outside resources and rhetorical appeals to defend its thesis. This essay serves as a stepping stone

I need help d9

Class Discussion – Week 9 In Chapter 11, Kriesberg examines the challenges of conflict resolution. Share your interpretation of the challenges outlined by the author and provide insights on the most effective ways to address them. Miruslaba Quezada Mar 3 1:46pm Manage Discussion by Miruslaba Quezada Reply from Miruslaba Quezada

eng 110

Essay Outline Handout 1/2 I. Introduction Possible ideas for the introduction (question, definition, story, quote, etc.): Definition of immigration; Reasons for immigration into the U.S.; Result of immigration on the nation Argumentative Thesis Statement (includes your main points) Immigrants come to America to work because of poverty in their homeland

Finding and Supporting a Thesis

See file attached below for assignment. This week, we’re diving into the essentials of thesis development. We’ll be working with material from the textbook to sharpen your skills in identifying, analyzing, and refining thesis statements. Yes, it’s textbook work, but it’s the foundation for every strong essay you’ll write, so