Our Services

Get 15% Discount on your First Order

[rank_math_breadcrumb]

making recommendations to protect patient health information

 making recommendations to protect patient health information 

Module 1: A Case for Securing Healthcare Data

For this assignment, you will need to review the Case Study presented and perform an audit to assess if there are any gaps related to regulations, internal policies and procedures to identify any areas where the organization’s data security is leaving them vulnerable to virtual attacks. You will need to utilize the CIA triad principles to assist you in making recommendations to protect patient health information, along with a strategy to prevent future security breaches from occurring.

 Expand AllPanels Collapse AllPanels


Case Study


Action Plan

Steps you will complete as part of your audit:

1. Assess the Health Center’s policies and procedures for managing user access to their electronic health record system. Ask yourself, are there clear policies for assigning and revoking user access rights based on job roles?

2. Review and assess the quality and frequency of security updates to the Health Center’s electronic health record. Did you observe protocols in place for performing updates and applying patches as needed?

3. Assess the encryption methods in place for protecting patient health information. Are you confident that both data at rest and data in transit are sufficiently encrypted using current systems in place?

Your deliverable method can be either in the form of a half-page to full page report or PowerPoint slides that outline your findings from the audit, including any identified compliance issues, an assessment of current security measures, and strategies you are recommending improving current data protection and regulatory compliance.

Note: If you utilize your textbook or any references to support your recommendations, provide a reference list.

Action

Select the Start Assignment button to begin.

Once you have uploaded your file, select Submit Assignment.

Rubric

M1 A Case for Securing Healthcare Data

M1 A Case for Securing Healthcare Data

Criteria

Ratings

Pts

This criterion is linked to a Learning OutcomeParameters

Parameters
Paper Option
-Uses standard double-spacing without extra spaces between bullets or paragraphs
-Minimum length 1/2 page, maximum length 1 page
-Free of grammatical & spelling errors
-Uses APA in-text citations and reference list IF applicable

PowerPoint Option
-No more than 5 bullets per slide
-Keep slides uncluttered so easy to follow
-Notes Section of slides should contain a detailed outline of what slide is presenting (speaker notes)
-Free of grammatical & spelling errors
-Uses APA in-text citations and reference list on a reference slide IF applicable

7 pts

Meets or Exceeds

Student submission clearly encompasses all paper or PowerPoint parameters -Free of grammatical & spelling errors -Uses APA in-text citations and reference list IF applicable

5 pts

In Progress

Student submission mostly meets paper or PowerPoint parameters -1-3 grammatical & spelling errors -Uses some APA in-text citations and reference list IF applicable

2 pts

Little Evidence

Student submission does not clearly meet the paper or PowerPoint parameters -Has 4 or more grammatical & spelling errors -does not use APA in-text citations and reference list IF applicable

0 pts

No Evidence

Student submission clearly does not meet the required Parameters

7 pts

This criterion is linked to a Learning OutcomeAudit Findings

Audit Findings
Compliance Issues
-Clearly identifies any compliance issues

9 pts

Meets or Exceeds

Student submission clearly provides for Audit Findings on Compliance Issues

6 pts

In Progress

Student submission mostly provides the audit findings on compliance issues

3 pts

Little Evidence

Student submission is off topic or does not clearly layout the finding of the audit on compliance issues

0 pts

No Evidence

Student submission does not clearly meet compliance issue audit findings or nothing submitted

9 pts

This criterion is linked to a Learning OutcomeSecurity Measure Assessment

Security Measure
Assessment
*Incorporate applicable CIA triad principles into your assessment.
-Provides clear assessment of current security measures
-Including job role user access controls
CO1

9 pts

Meets or Exceeds

Student submission clearly provides for the Security Measure Assessment by -Having clear assessment of current security measures -Including job role user access controls

6 pts

In Progress

Student submission mostly provides for the Security Measure Assessment by -Having clear assessment of current security measures -Including job role user access controls

3 pts

Little Evidence

Student submission does not clearly provide the Security Measure Assessment by -Having clear assessment of current security measures -Including job role user access controls

0 pts

No Evidence

Student submission does not clearly meet a security measure assessment or nothing submitted

9 pts

This criterion is linked to a Learning OutcomeStrategies

Strategies
*Incorporate the CIA triad principles: Confidentiality, Integrity & Availability into your strategies.
-Recommends strategies to improve the current data protection policies
-Recommends any actions necessary to meet regulatory compliance deficiencies
CO1

10 pts

Meets or Exceeds

Student submission has clear Strategy for Recommendations -to improve current data protection policies -for any actions necessary to meet regulatory compliance deficiencies

7 pts

In Progress

Student submission contains a mostly clear Strategy for Recommendations -to improve current data protection policies -for any actions necessary to meet regulatory compliance deficiencies

4 pts

Little Evidence

Student submission may be slightly off topic or does not clearly provide Strategy for Recommendations -to improve current data protection policies -for any actions necessary to meet regulatory compliance deficiencies

0 pts

No Evidence

Student submission does not clearly outline recommendations of strategies for improving current data protection policies and/or any actions needed to meet regulatory compliance deficiencies or nothing is submitted

10 pts

Total Points: 35

Previous
Next

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Character Analysis

Book: Murder on the Orient Express Paper Assignment Details 3 – 5 page essay (not including the cover page and references page) APA formatting Discuss one ( or more) character(s) from the book, Murder on the Orient Express. Do one of the following: 1. Thoroughly analyze one character (ie. Hercule

English homework

Peer Review Workshop: Literary Analysis Essay   Subscribe Follow the same process from the previous peer reviews.  check your grades and feedback to make sure you have been completing the reviews correctly.   Copy the questions below and paste them into your responses.  Answer each question, in detail, to earn full credit for

Literature

Can I please have help with assignment? With this paper, you will analyze a short story of your choice and divulge the hidden meaning(s) found in the text. You may choose any of the essays on this link (or another scholarly work of your choosing):  Short Story ChoicesLinks to an

English homework

PLEASE here is the feedback of the teacher ,PLEASE I BEGGING YOU TO READ THE INSTRUCTION , image1.png image2.png

mus

Identify an historically significant action that was made by someone (an individual artist and/or group) in Twentieth-Century American Popular Music. Describe its genre and place it in the historical context. Objectives: The student is expected to listen and respond critically to music and to articulate an informed, personal reaction in

su db

Answer The Following Discussion Questions: Q1:  As illustrated in the image, there are five psychological domains. Which psychological domain are you most interested in? Why? Explain how the domain contributes to the study of psychology.   STEP 1: First, write a response with at least EIGHT substantial sentences, integrating concepts you

Interpreting Myths Through Metaphor Discussion

 In Chapter Two of World Mythology, Andy Gurevich presents a compelling exploration of how myth and metaphor shape our understanding of the world. He introduces the classical Greek concepts of Logos and Mythos to show the dual pathways of human thought—one grounded in logic and rational analysis, the other in

Analyzing the Key Aspects of Management.

Please see attached for instructions Report: Analyzing the Key Aspects of Management. Objective: This report aims to develop your understanding of the key aspects of management, including managerial functions, the various types of managers, the roles they play, and the skills they need to succeed. You will demonstrate your ability

Midterm Reflection

my overall grade in class is a 88.8 SA 4 Midterm Reflection.html Overview Fixed vs Growth Mindset from Accredited Online Training Purpose Reflection is an opportunity to look back and think about what has occurred in the past and make adjustments for the future. For our class, it is an

Plan and Communicate a Time-Based Task

Plan and Communicate a Time-Based Task SCENARIO: On Monday morning, you arrive at work and discover you have an email from your manager, Sara, about a customer service issue. She is worried because one of the company’s most important clients did not receive their shipment. While she acknowledges it isn’t your

English Homework

Week Four This week you will read a selection of literary works from the Victorian Age to the twentieth century. Student Learning Outcomes Addressed:    · Identify key ideas, significant historical or cultural events, and characteristic perspectives or attitudes expressed in the literature of different periods or regions. · Analyze literary works

Discussion Post help

Vital Signs: HR 76, RR 14 BP 130/98, Temp 100.0 oral, O2 sat-92% Introduction: Maggie is a 27 year old. Filipina single woman, accompanied by an aunt and uncle with whom she lives. Chief Complaint: ” I have schizophrenia and I need my medications ordered.” History of Chief Complaint: The

assigment reflective

assigment Week 4 Reflective Essa(y)    Learning is an ongoing process. We learn by studying, by creating, and by reflecting on what we have done.  This paper may use a first person voice, since it is YOUR reflection. No AI should be used in this essa(y).   In this final essa(y),

English assignment discussion

discussion For this discussion, you will consider your response to your final reflection essa(y) including the source you have found to extend your primary essa(y) themes and ideas.  Initial Post (250 words total for both paragraphs):   First, search the KU Online Library to find a source that supports the

Understanding Mythology and Creation Myths Objective

 This discussion board assignment aligns directly with the Chapter One learning objectives by encouraging students to define and incorporate key vocabulary terms, such as cosmogony, archetype, or monomyth, into their written responses, thereby reinforcing their comprehension and application of foundational terms (Objective 1 – Bloom’s: Remembering, Understanding). By asking students

Check the file

My topic is 4th topic مشاريع مادة األمن الصناعي -270/81 د. خالد العنزي تاريخ التسليم 2520/July/17 Write: 2500-3000 words double-spaced essay: 1- What are the main safety and ergonomic precautions associated with computer use? 2- What are the causes of al-Ahmadi refinery explosion in 2000? 3- What are the main

mu

Assignment Prompt: Identify an historically significant action that was made by someone (an individual artist and/or group) in Twentieth-Century American Popular Music. Describe its genre and place it in the historical context. Objectives: The student is expected to listen and respond critically to music and to articulate an informed, personal