• help@unquite.com
  • +1 302 231 1203

QUESTION'S DESCRIPTION

$ 15
CIS 558 Week 7 Case Study 2 HIPPA and IT Audits

Question Posted By

Online
  • gallantkellly
  • Questions : 147
  • Solutions : 336

Question Description

CIS 558 Week 7 Case Study 2 HIPPA and IT Audits

Case Study 2: HIPAA and IT Audits

Due Week 7 and worth 75 points

Imagine you are a CIO at a medium-sized hospital, and you have been asked by the CEO to provide a case analysis report that will be provided to the senior leadership in the organization. They are concerned about the HIPAA Security and Privacy Rules and its impact on the organization. Unfamiliar with the details of HIPAA, you begin looking at the information provided by the Department of Health and Human Services. Specifically, you are asked to provide an analysis on the summary of the cases.

Section 1. Written Paper

Many organizations have been fined significant amounts for non-compliance with HIPAA. To help ensure that your organization remains in compliance with HIPAA regulations you have been asked to write a three (3-4) page paper in which you:

1a. Create an overview of the HIPAA Security Rule and Privacy Rule. Include an explanation of the resolution process when a case is reported.
1b. Analyze the major types of incidents and breaches that occur based on the cases reported.
1c. Analyze the technical controls and the non-technical controls that are needed to mitigate the identified risks and vulnerabilities.
1d. Analyze and describe the network architecture that is needed within an organization, including a medium-sized hospital, in order to be compliant with HIPAA regulations.
1e. Analyze how a medium-sized hospital is similar to and different from other non-medical organizations in regards to HIPAA compliance.
1f. List the IT audit steps that need to be included in the organization’s overall IT audit plan to ensure compliance with HIPAA rules and regulations.
1g. Use at least four (4) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

Section 2. Network Architecture

2a. Create a network architecture diagram (using Visio or an open-source equivalent to Visio for creating diagrams), based on the description of the network architecture that you defined above for the organization to be compliant with HIPAA regulations.
2b. Include in the diagram the switches, routers, firewalls, IDS/IPS, and any other devices needed for a compliant network architecture

 


Available Solutions
$ 15
CIS 558 Week 7 Case Study 2 HIPPA and IT Audits

Answer Posted By

online
  • gallantkellly
  • Questions : 147
  • Solutions : 336
Solution Description

xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx the xxxx risk xx information xxxxxxxx organizations xxxx don’t xxxxxxx a xxxxxxxx risk xxxxxxxx will xxx be xxxx to xxxx where xxxx stand. xxxxx this xxxxxx may xxxx patently xxxxxxxx it’s xxxxxxxxx many xxxxxxxxxx organizations xxx still xxxxxxxxx about. xx improve xxx efficiency xxx effectiveness xx the xxxxxx care xxxxxxx the xxxxxx Insurance xxxxxxxxxxx and xxxxxxxxxxxxxx Act xx 1996 xxxxxxxx Public xxx 104-191, xxxxxxxx Administrative xxxxxxxxxxxxxx provisions xxxx required xxx to xxxxx national xxxxxxxxx for xxxxxxxxxx health xxxx transactions xxx code xxxxx unique xxxxxx identifiers, xxx security. xxxxxxxxxxx of xxx Privacy xxxx began xxxxx 14, xxxx for xxxx HIPAA xxxxxxx entities. xxxx the xxxxxx for xxxxx Rights xxxxxx on xxxx door, xxxxxx about xxxxx compliance, xx pays xx be xxxxxx And xxx is xxxxxxx to xxxxx providers xxxxxxx from xxxxx to xxxxxx and xxxxxx a xxxx geographical xxxxxxxxxxxxxxxxxxxxxxxxxxx purpose xx the xxxxxxxx is xx create xx overview xx the xxxxx Security xxxx and xxxxxxx Rule xxx analyzing xxx major xxxxx of xxxxxxxxx and xxxxxxxx that xxxxx based xx the xxxxx reported. This xxxxx will xxxx analyze xxx technical xxxxxxxx and xxx non-technical xxxxxxxx that xxx needed xx mitigate xxx identified xxxxx and xxxxxxxxxxxxxxxx and x descriptive xxxxxxx architecture xxxx is xxxxxx within xx organization, xxxxxxxxx a xxxxxxxxxxxx hospital, xx order xx be xxxxxxxxx with xxxxx regulations. Furthermore, xxxx paper xxxx also analyze xxx a xxxxxxxx is xxxxxxx to xxx different xxxx other xxxxxxxxxxxxx in xxxxxxx to xxxxx compliance. xxx final xxxxxxx of xxxx research xxxxx will xxxx the xx audit xxxxx that xxx needed xx be xxxxxxxx in xxx organization’s xxxxxxx IT xxxxx plan xx ensure xxxxxxxxxx with xxxxx rules xxx regulations xxxxxxxx University xxxxxxxxxx 2015).

 

 

Overview xx the xxxxx Security xxxx and xxxxxxx Rule

From x high-level xxxxxxxxxxxx HIPAA xxxxxxxxxxx cover xxxx security xxx privacy xx protected xxxxxx information xxxxxxx and xxxxxx et xxxx 2015). xxxxxxxx and xxxxxxx are xxxxxxxxxxx but xx hand-in-hand. xxx Privacy xxxx emphasize xx the xxxxx of xx individual xx control xxx use xx his xx her xxxxxxxx information. xxxxxxxxx health xxxxxxxxxxx (PHI) xxxxxx not xx disclosed xx used xx others xxxxxxx their xxxxxxx The xxxxxxx rule xxxxxx the xxxxxxxxxxxxxxx of xxx in xxx formats xxxxxxxxx electronic, xxxxx and xxxxx Privacy xx an xxxxxxxxx that xxx information xxxx be xxxxxxxxxxx from xxxxxxxxxxxx disclosure.

The xxxxxxx security xx PHI xx all xxxxxxx is xx element xx the xxxxxxx rule. xxx Security xxxx focuses xx administrative, xxxxxxxxx and xxxxxxxx safeguards xxxxxxxxxxxx as xxxx relate xx electronic xxx (ePHI). xxxxxxxxxx of xxxx data xxxx unauthorized xxxxxxx whether xxxxxxxx or xxxxxxxxx stored xx in xxxxxxxx is xxx part xx the xxxxxxxx rule. xxxxxx care xxxxxxxxx who xxxxxxxx health xxxxxxxxxxx electronically, xxxxxxxxxxxxxxx and xxxxxx plans xxx all xxxxxxx under xxx Privacy xxxxx The xxxxxxxx Rule xx specific xx electronic xxxx It xxxxxx be xxxxx however, xxxx electronic xxx also xxxxxxxx telephone xxxxx response xxx faxback xxxxxxx because xxxx are xxxx as xxxxx and xxxxxx devices xxx computers. xxxxxxxxxx PHI xxxx not xxxxxxx paper-to-paper xxxxx or xxxxx teleconferencing xx messages xxxx on xxxxx mail, xxxxxxx the xxxxxxxxxxx being xxxxxxxxx did xxx exist xx electronic xxxx before xxx transmission. xxx focus xx security xxxx is xx protect xxxx from xxxxxxxxxxxx access xx disclosure, xxxxx the xxxxxxxx rule xxxxxxxx recommendation xx protect xxxxx network xxxxxxxxxxxxxx in xxxxx to xxxxxx data xxxxxxxxxxxxxxxxx

 

Buy Solution !
JOIN OUR NEWLETTER

Be the first to receive exciting news,features and special offers from Minds Blow

Copyrights © 2016 | Unquite.com is a Part of Minds Blow LLC and All Rights Reserved With Minds Blow LLC

Uploading copyrighted material is strictly prohibited. Refer to our DMCA Policy for more information.

This is an online marketplace for tutorials and study guides. All the content is provided by third parties and unquite.com is not liable for the similarity.