Our Services

Get 15% Discount on your First Order

[rank_math_breadcrumb]

making recommendations to protect patient health information

 making recommendations to protect patient health information 

Module 1: A Case for Securing Healthcare Data

For this assignment, you will need to review the Case Study presented and perform an audit to assess if there are any gaps related to regulations, internal policies and procedures to identify any areas where the organization’s data security is leaving them vulnerable to virtual attacks. You will need to utilize the CIA triad principles to assist you in making recommendations to protect patient health information, along with a strategy to prevent future security breaches from occurring.

 Expand AllPanels Collapse AllPanels


Case Study


Action Plan

Steps you will complete as part of your audit:

1. Assess the Health Center’s policies and procedures for managing user access to their electronic health record system. Ask yourself, are there clear policies for assigning and revoking user access rights based on job roles?

2. Review and assess the quality and frequency of security updates to the Health Center’s electronic health record. Did you observe protocols in place for performing updates and applying patches as needed?

3. Assess the encryption methods in place for protecting patient health information. Are you confident that both data at rest and data in transit are sufficiently encrypted using current systems in place?

Your deliverable method can be either in the form of a half-page to full page report or PowerPoint slides that outline your findings from the audit, including any identified compliance issues, an assessment of current security measures, and strategies you are recommending improving current data protection and regulatory compliance.

Note: If you utilize your textbook or any references to support your recommendations, provide a reference list.

Action

Select the Start Assignment button to begin.

Once you have uploaded your file, select Submit Assignment.

Rubric

M1 A Case for Securing Healthcare Data

M1 A Case for Securing Healthcare Data

Criteria

Ratings

Pts

This criterion is linked to a Learning OutcomeParameters

Parameters
Paper Option
-Uses standard double-spacing without extra spaces between bullets or paragraphs
-Minimum length 1/2 page, maximum length 1 page
-Free of grammatical & spelling errors
-Uses APA in-text citations and reference list IF applicable

PowerPoint Option
-No more than 5 bullets per slide
-Keep slides uncluttered so easy to follow
-Notes Section of slides should contain a detailed outline of what slide is presenting (speaker notes)
-Free of grammatical & spelling errors
-Uses APA in-text citations and reference list on a reference slide IF applicable

7 pts

Meets or Exceeds

Student submission clearly encompasses all paper or PowerPoint parameters -Free of grammatical & spelling errors -Uses APA in-text citations and reference list IF applicable

5 pts

In Progress

Student submission mostly meets paper or PowerPoint parameters -1-3 grammatical & spelling errors -Uses some APA in-text citations and reference list IF applicable

2 pts

Little Evidence

Student submission does not clearly meet the paper or PowerPoint parameters -Has 4 or more grammatical & spelling errors -does not use APA in-text citations and reference list IF applicable

0 pts

No Evidence

Student submission clearly does not meet the required Parameters

7 pts

This criterion is linked to a Learning OutcomeAudit Findings

Audit Findings
Compliance Issues
-Clearly identifies any compliance issues

9 pts

Meets or Exceeds

Student submission clearly provides for Audit Findings on Compliance Issues

6 pts

In Progress

Student submission mostly provides the audit findings on compliance issues

3 pts

Little Evidence

Student submission is off topic or does not clearly layout the finding of the audit on compliance issues

0 pts

No Evidence

Student submission does not clearly meet compliance issue audit findings or nothing submitted

9 pts

This criterion is linked to a Learning OutcomeSecurity Measure Assessment

Security Measure
Assessment
*Incorporate applicable CIA triad principles into your assessment.
-Provides clear assessment of current security measures
-Including job role user access controls
CO1

9 pts

Meets or Exceeds

Student submission clearly provides for the Security Measure Assessment by -Having clear assessment of current security measures -Including job role user access controls

6 pts

In Progress

Student submission mostly provides for the Security Measure Assessment by -Having clear assessment of current security measures -Including job role user access controls

3 pts

Little Evidence

Student submission does not clearly provide the Security Measure Assessment by -Having clear assessment of current security measures -Including job role user access controls

0 pts

No Evidence

Student submission does not clearly meet a security measure assessment or nothing submitted

9 pts

This criterion is linked to a Learning OutcomeStrategies

Strategies
*Incorporate the CIA triad principles: Confidentiality, Integrity & Availability into your strategies.
-Recommends strategies to improve the current data protection policies
-Recommends any actions necessary to meet regulatory compliance deficiencies
CO1

10 pts

Meets or Exceeds

Student submission has clear Strategy for Recommendations -to improve current data protection policies -for any actions necessary to meet regulatory compliance deficiencies

7 pts

In Progress

Student submission contains a mostly clear Strategy for Recommendations -to improve current data protection policies -for any actions necessary to meet regulatory compliance deficiencies

4 pts

Little Evidence

Student submission may be slightly off topic or does not clearly provide Strategy for Recommendations -to improve current data protection policies -for any actions necessary to meet regulatory compliance deficiencies

0 pts

No Evidence

Student submission does not clearly outline recommendations of strategies for improving current data protection policies and/or any actions needed to meet regulatory compliance deficiencies or nothing is submitted

10 pts

Total Points: 35

Previous
Next

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

English

Leslie English 045 Week 2 Part A Questions for Ethical Use of AI 1. Should students use AI in academic writing? Explain why you feel that way. 2. How often do you use AI tools? Give an example of what you use AI tools for. 3. Are you using AI

IB 2 4

 Need help with a topic will share the instructions with right person.  

IB 2 2

 Need help with a topic will share the instructions with right person.  

IB 2 3

 Need help with a topic will share the instructions with right person.  

IB 2 1

Need help with a topic will share the instructions with right person. 

New

One assignment need asap.  In the day and age of technology and social media, there has been mass exposure to information about mental health. Advantages to this include increased awareness and reduced stigma. Disadvantages to this include misinformation, bias, and over-pathologizing typical behaviors. You will likely interact with people who

english

what is most likely the purpose of ” a voyage to the country of the houyhnhnms” in jonathan swift’s gulliver’s travels? A.he is suggesting that high virtues such as intellegence and kindness does not exist B.he is making the point that people should be kinder to horses and other animals

Clifton Strengths Finders Reflection

  Clifton StrengthsFinders Reflection Week 2: Clifton StrengthsFinders Reflection Paper Clifton StrengthsFinders Reflection Paper Based on your results from the CliftonStrengths 2.0 assessment completed in Week 2, evaluate your leadership skillset. You will take what you have learned from your results and provide a detailed reflection application paper. Instructions Complete

Please see attached

Purpose: In this assignment, you will explore how critical thinking contributes to effective leadership. You will analyze the relationship between critical thinking and leadership styles, integrating course materials to assess how developing critical thinking skills enhances leadership practices. By applying these skills, you will better understand how leaders can make

Analytical

See attached S311: The Analytical Essay Learning Activity – Prepare an Analytical Essay Instructions: 1. Analyze and evaluate the major points of your case study for research utilizing the principles of mission command. 2. Use your time to develop a deep understanding of your topic to fully explain your analysis.

English Homework

See Attachments Assignment Directions: Using the information from this week’s reading material, submit an Annotated Bibliography of  five (5) sources from your working bibliography.  Two (2) of the sources must be peer reviewed articles. First, put the source in the correct citation format for your particular field of study, and then write

TASS2C05

READ THE ATTACHMENT!!! B.  Create a team multimedia presentation by doing the following: 1.  Create the section(s) of the multimedia presentation to which you were assigned. 2.  Develop presenter notes to clearly explain the ideas addressed in your assigned slides. 3.  Complete the team multimedia presentation by doing the following:

PP

Create a solution for these problems. 5 ppt READ THE ATTACHMENT!!  C205 Task 2 Section B Completed by: Ronnie Kaye Viviana Arias Thomas Boccia 1. Identify a Significant Teamwork Problem Synopsis: I am an Operations Manager of a line and staff team environment There are 3 teams (2 consisting of

English Homework

As a Volleyball Coach I am interested in studying youth sports coaching and athlete development. Here are my three research questions: How does the leadership style of a youth sports coach impact athlete performance and team culture? What role does positive coaching play in the long-term development and mental well-being

F2

Need help with a topic and will share with the right person. 

Individual Project week 7 and 8

 Individual Project  Two for weeks 7 and 8 2 Transforming Microsoft HR through an Integrated AI-Enabled HRIS Ecosystem Isdory Lyamuya DeVry University HRM530: Human Resources and Technology Dr. Jill Okolita November 9, 2025 Transforming Microsoft HR through an Integrated AI-Enabled HRIS Ecosystem 1. Introduction a. Consulting engagement to evaluate Microsoft

Individual project

 an individual project  2 Comparative Human Resource Management in Singapore and Kuala Lumpur, Malaysia Isdory Lyamuya DeVry University HRM584: Human Resources and Technology Professor: Danielle Camacho November 16, 2025 Comparative Human Resource Management in Singapore and Kuala Lumpur, Malaysia The proposal will entail an analysis of the human resource management

create powerpoint

Need someone to create the powerpoint work already done also need to make sure I done all the work just to check add pictures    In 2007, Jack Nicholson and Morgan Freeman starred in a movie called The Bucket List. They played two older men with terminal illnesses who happened to share