Health Information Technology (HIT) is a growing field within health

Health Information Technology (HIT) is a growing field within health services organizations today; additionally, health information security is a major concern among health organizations, as they are required to maintain the security and privacy of health information. The Department of Health and Human Services (HHS) provides extensive information about the Health Insurance Portability and Accountability Act (HIPAA). Visit the HHS Website, at www.hhs.gov/ocr/privacy , for more information about HIPAA requirements. In March 2012, the HHS settled a HIPAA case with the Blue Cross Blue Shield of Tennessee (BCBST) for $1.5 million. Read more about this case at www.hhs.gov/ocr/privacy/hipaa/enforcement/examples/bcbstagrmnt.html . As an IT security manager at a regional health services organization, your CIO has asked for the following: an analysis of this incident, an overview of the HIPAA security requirements necessary to prevent this type of an incident, and a briefing for management on the minimum security requirements to be HIPAA complaint. Section1: Written Paper1. Write a three to five (3-5) page paper in which you: a. Describe the security issues of BCBST in regard to confidentiality, integrity, availability, and privacy based on the information provided in the BCBST case. b. Describe the HIPPA security requirement that could have prevented each security issue identified if it had been enforced.c. Analyze the corrective actions taken by BCBST that were efficient and those that were not adequate.d. Analyze the security issues and the HIPAA security requirements and describe the safeguards that the organization needs to implement in order to mitigate the security risks.  Ensure that you describe the safeguards in terms of administrative, technical, and physical safeguards.e. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.  Your written paper must follow these formatting requirements: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required page length.  Section 2: PowerPoint Presentation2. Create a six to eight (6-8) slide PowerPoint presentation in which you: a.  Provide the following on the main body slides: i. An overview of the security issues at BCBST ii. HIPAA security requirements that could have prevented the incident iii. Positive and negative corrective actions taken by BCBST iv. Safeguards needed to mitigate the security risks Your PowerPoint presentation must follow these formatting requirements: Include a title slide, four to six (4-6) main body slides, and a conclusion sli ...

Health Information Technology (HIT) is a growing field within
health services organizations today; additionally, health
information security is a major concern among health
organizations, as they are required to maintain the security and
privacy of health information. The Department of Health and
Human Services (HHS) provides extensive information about
the Health Insurance Portability and Accountability Act
(HIPAA). Visit the HHS Website, at
www.hhs.gov/ocr/privacy
, for more information about HIPAA requirements. In March
2012, the HHS settled a HIPAA case with the Blue Cross Blue
Shield of Tennessee (BCBST) for $1.5 million. Read more
about this case at
www.hhs.gov/ocr/privacy/hipaa/enforcement/examples/bcbstagr
mnt.html
. As an IT security manager at a regional health services
organization, your CIO has asked for the following: an analysis
of this incident, an overview of the HIPAA security
requirements necessary to prevent this type of an incident, and a
briefing for management on the minimum security requirements
to be HIPAA complaint. Section1: Written Paper1. Write a three
to five (3-5) page paper in which you:
a. Describe the security issues of BCBST in regard to
confidentiality, integrity, availability, and privacy based on the
information provided in the BCBST case. b. Describe the
HIPPA security requirement that could have prevented each
security issue identified if it had been enforced.c. Analyze the
corrective actions taken by BCBST that were efficient and those
that were not adequate.d. Analyze the security issues and the
HIPAA security requirements and describe the safeguards that
the organization needs to implement in order to mitigate the
security risks. Ensure that you describe the safeguards in terms
of administrative, technical, and physical safeguards.e. Use at
least three (3) quality resources in this assignment. Note:
Wikipedia and similar Websites do not qualify as quality
resources.
Your written paper must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size
12), with one-inch margins on all sides; references must follow
APA or school-specific format. Check with your professor for
any additional instructions.
Include a cover page containing the title of the assignment, the
student’s name, the professor’s name, the course title, and the
date. The cover page and the reference page are not included in
the required page length.
Section 2: PowerPoint Presentation2. Create a six to eight (6-8)
slide PowerPoint presentation in which you:
a. Provide the following on the main body slides:
i. An overview of the security issues at BCBST
ii. HIPAA security requirements that could have prevented the
incident
iii. Positive and negative corrective actions taken by BCBST
iv. Safeguards needed to mitigate the security risks
Your PowerPoint presentation must follow these formatting
requirements:
Include a title slide, four to six (4-6) main body slides, and a
conclusion slide.
The specific course learning outcomes associated with this
assignment are:
Summarize the legal aspects of the information security triad:
availability, integrity, and confidentiality.
Use technology and information resources to research legal
issues in information security.
Write clearly and concisely about information security legal
issues and topics using proper writing mechanics and technical
style conventions.

Recomendados

Case Study 1 HIPAA, CIA, and Safeguards This assignment consi.docx von
Case Study 1 HIPAA, CIA, and Safeguards This assignment consi.docxCase Study 1 HIPAA, CIA, and Safeguards This assignment consi.docx
Case Study 1 HIPAA, CIA, and Safeguards This assignment consi.docxwendolynhalbert
2 views3 Folien
This assignment consists of two (2) sections a written paper and .docx von
This assignment consists of two (2) sections a written paper and .docxThis assignment consists of two (2) sections a written paper and .docx
This assignment consists of two (2) sections a written paper and .docxterirasco
2 views4 Folien
This assignment consists of two (2) sections a written paper and a .docx von
This assignment consists of two (2) sections a written paper and a .docxThis assignment consists of two (2) sections a written paper and a .docx
This assignment consists of two (2) sections a written paper and a .docxOllieShoresna
2 views3 Folien
This assignment consists of two (2) sections a written paper and a .docx von
This assignment consists of two (2) sections a written paper and a .docxThis assignment consists of two (2) sections a written paper and a .docx
This assignment consists of two (2) sections a written paper and a .docxgasciognecaren
4 views4 Folien
NO Plagiarism Please!!!This assignment consists of two (2) sec.docx von
NO Plagiarism Please!!!This assignment consists of two (2) sec.docxNO Plagiarism Please!!!This assignment consists of two (2) sec.docx
NO Plagiarism Please!!!This assignment consists of two (2) sec.docxpoulterbarbara
0 views3 Folien
Case Study 1 HIPAA, CIA, and Safeguards Due Week 2 and worth .docx von
Case Study 1 HIPAA, CIA, and Safeguards Due Week 2 and worth .docxCase Study 1 HIPAA, CIA, and Safeguards Due Week 2 and worth .docx
Case Study 1 HIPAA, CIA, and Safeguards Due Week 2 and worth .docxromeliadoan
4 views3 Folien

Más contenido relacionado

Similar a Health Information Technology (HIT) is a growing field within health

Case Study 1 HIPAA, CIA, and SafeguardsThis assignment .docx von
Case Study 1 HIPAA, CIA, and SafeguardsThis assignment .docxCase Study 1 HIPAA, CIA, and SafeguardsThis assignment .docx
Case Study 1 HIPAA, CIA, and SafeguardsThis assignment .docxmoggdede
5 views3 Folien
Cis 438 Enthusiastic Study / snaptutorial.com von
Cis 438 Enthusiastic Study / snaptutorial.comCis 438 Enthusiastic Study / snaptutorial.com
Cis 438 Enthusiastic Study / snaptutorial.comStephenson03
21 views21 Folien
Cis 438 Technology levels--snaptutorial.com von
Cis 438 Technology levels--snaptutorial.comCis 438 Technology levels--snaptutorial.com
Cis 438 Technology levels--snaptutorial.comsholingarjosh61
16 views21 Folien
CIS 324 Success Begins / snaptutorial.com von
CIS 324 Success Begins / snaptutorial.comCIS 324 Success Begins / snaptutorial.com
CIS 324 Success Begins / snaptutorial.comRobinson068
16 views13 Folien
Strayer cis 438 week 2 case study 1 von
Strayer cis 438 week 2 case study 1Strayer cis 438 week 2 case study 1
Strayer cis 438 week 2 case study 1shyaminfo105
7 views7 Folien
Unit Outcomes addressed in this AssignmentContrast the di von
Unit Outcomes addressed in this AssignmentContrast the diUnit Outcomes addressed in this AssignmentContrast the di
Unit Outcomes addressed in this AssignmentContrast the dicorbing9ttj
1 view4 Folien

Similar a Health Information Technology (HIT) is a growing field within health(20)

Case Study 1 HIPAA, CIA, and SafeguardsThis assignment .docx von moggdede
Case Study 1 HIPAA, CIA, and SafeguardsThis assignment .docxCase Study 1 HIPAA, CIA, and SafeguardsThis assignment .docx
Case Study 1 HIPAA, CIA, and SafeguardsThis assignment .docx
moggdede5 views
Cis 438 Enthusiastic Study / snaptutorial.com von Stephenson03
Cis 438 Enthusiastic Study / snaptutorial.comCis 438 Enthusiastic Study / snaptutorial.com
Cis 438 Enthusiastic Study / snaptutorial.com
Stephenson0321 views
Cis 438 Technology levels--snaptutorial.com von sholingarjosh61
Cis 438 Technology levels--snaptutorial.comCis 438 Technology levels--snaptutorial.com
Cis 438 Technology levels--snaptutorial.com
sholingarjosh6116 views
CIS 324 Success Begins / snaptutorial.com von Robinson068
CIS 324 Success Begins / snaptutorial.comCIS 324 Success Begins / snaptutorial.com
CIS 324 Success Begins / snaptutorial.com
Robinson06816 views
Strayer cis 438 week 2 case study 1 von shyaminfo105
Strayer cis 438 week 2 case study 1Strayer cis 438 week 2 case study 1
Strayer cis 438 week 2 case study 1
shyaminfo1057 views
Unit Outcomes addressed in this AssignmentContrast the di von corbing9ttj
Unit Outcomes addressed in this AssignmentContrast the diUnit Outcomes addressed in this AssignmentContrast the di
Unit Outcomes addressed in this AssignmentContrast the di
corbing9ttj1 view
Strayer cis-438-week-2-case-study-1 von infinityend3
Strayer cis-438-week-2-case-study-1Strayer cis-438-week-2-case-study-1
Strayer cis-438-week-2-case-study-1
infinityend37 views
Section 1 Written Paper1. Write a six to eight (6-8) page paper in .docx von rtodd280
Section 1 Written Paper1. Write a six to eight (6-8) page paper in .docxSection 1 Written Paper1. Write a six to eight (6-8) page paper in .docx
Section 1 Written Paper1. Write a six to eight (6-8) page paper in .docx
rtodd2802 views
CIS 502 Week 6 Assignment 2Assignment 2 Critical Infrastructure P.docx von brownliecarmella
CIS 502 Week 6 Assignment 2Assignment 2 Critical Infrastructure P.docxCIS 502 Week 6 Assignment 2Assignment 2 Critical Infrastructure P.docx
CIS 502 Week 6 Assignment 2Assignment 2 Critical Infrastructure P.docx
HIPAA and IT Audits.docx von 4934bk
HIPAA and IT Audits.docxHIPAA and IT Audits.docx
HIPAA and IT Audits.docx
4934bk2 views
According to the text, Critical Infrastructure Protection (CIP) is a.docx von stelzriedemarla
According to the text, Critical Infrastructure Protection (CIP) is a.docxAccording to the text, Critical Infrastructure Protection (CIP) is a.docx
According to the text, Critical Infrastructure Protection (CIP) is a.docx
stelzriedemarla3 views
Case Study 2 Data Breaches and Regulatory RequirementsDue Week 6 .docx von romeliadoan
Case Study 2 Data Breaches and Regulatory RequirementsDue Week 6 .docxCase Study 2 Data Breaches and Regulatory RequirementsDue Week 6 .docx
Case Study 2 Data Breaches and Regulatory RequirementsDue Week 6 .docx
romeliadoan10 views
Assignment Critical Infrastructure ProtectionAccording to the t.docx von lesleyryder69361
Assignment Critical Infrastructure ProtectionAccording to the t.docxAssignment Critical Infrastructure ProtectionAccording to the t.docx
Assignment Critical Infrastructure ProtectionAccording to the t.docx
The National Institute of Standards and Technology (NIST) provides a.docx von mallisonshavon
The National Institute of Standards and Technology (NIST) provides a.docxThe National Institute of Standards and Technology (NIST) provides a.docx
The National Institute of Standards and Technology (NIST) provides a.docx
mallisonshavon2 views
HCIS 420 Technology levels--snaptutorial.com von sholingarjosh139
HCIS 420 Technology levels--snaptutorial.comHCIS 420 Technology levels--snaptutorial.com
HCIS 420 Technology levels--snaptutorial.com
sholingarjosh13914 views
The consumerization of Information Technology (IT) has given rise to.docx von he45mcurnow
The consumerization of Information Technology (IT) has given rise to.docxThe consumerization of Information Technology (IT) has given rise to.docx
The consumerization of Information Technology (IT) has given rise to.docx
he45mcurnow2 views
CSIA 360 CASE STUDY #3 IS THERE A CYBERSECURITY WORKFORCE CRISIS IN STATE GOV... von ViscolKanady
CSIA 360 CASE STUDY #3 IS THERE A CYBERSECURITY WORKFORCE CRISIS IN STATE GOV...CSIA 360 CASE STUDY #3 IS THERE A CYBERSECURITY WORKFORCE CRISIS IN STATE GOV...
CSIA 360 CASE STUDY #3 IS THERE A CYBERSECURITY WORKFORCE CRISIS IN STATE GOV...
ViscolKanady89 views
The National Institute of Standards and Technology (NIST) provides a.docx von dennisa15
The National Institute of Standards and Technology (NIST) provides a.docxThe National Institute of Standards and Technology (NIST) provides a.docx
The National Institute of Standards and Technology (NIST) provides a.docx
dennisa152 views
HI300 Unit 7 AssignmentUnit outcomes addressed in this Assignment.docx von AbramMartino96
HI300 Unit 7 AssignmentUnit outcomes addressed in this Assignment.docxHI300 Unit 7 AssignmentUnit outcomes addressed in this Assignment.docx
HI300 Unit 7 AssignmentUnit outcomes addressed in this Assignment.docx
AbramMartino963 views

Más de jesseniasaddler

List and explain five categories of external risk assessment which.docx von
List and explain five categories of external risk assessment which.docxList and explain five categories of external risk assessment which.docx
List and explain five categories of external risk assessment which.docxjesseniasaddler
34 views1 Folie
Link to SEC 10K report for Nike httpwww.sec.govArchivesedgar.docx von
Link to SEC 10K report for Nike httpwww.sec.govArchivesedgar.docxLink to SEC 10K report for Nike httpwww.sec.govArchivesedgar.docx
Link to SEC 10K report for Nike httpwww.sec.govArchivesedgar.docxjesseniasaddler
12 views4 Folien
List and describe the cloud services providers.Explore typical net.docx von
List and describe the cloud services providers.Explore typical net.docxList and describe the cloud services providers.Explore typical net.docx
List and describe the cloud services providers.Explore typical net.docxjesseniasaddler
2 views1 Folie
List and describe the three levels of international human resource.docx von
List and describe the three levels of international human resource.docxList and describe the three levels of international human resource.docx
List and describe the three levels of international human resource.docxjesseniasaddler
2 views1 Folie
List and describe the six (6) parts of a speech.Describe.docx von
List and describe the six (6) parts of a speech.Describe.docxList and describe the six (6) parts of a speech.Describe.docx
List and describe the six (6) parts of a speech.Describe.docxjesseniasaddler
4 views1 Folie
List 2 characteristics of each period listed below1-2. Renais.docx von
List 2 characteristics of each period listed below1-2. Renais.docxList 2 characteristics of each period listed below1-2. Renais.docx
List 2 characteristics of each period listed below1-2. Renais.docxjesseniasaddler
4 views11 Folien

Más de jesseniasaddler(20)

List and explain five categories of external risk assessment which.docx von jesseniasaddler
List and explain five categories of external risk assessment which.docxList and explain five categories of external risk assessment which.docx
List and explain five categories of external risk assessment which.docx
jesseniasaddler34 views
Link to SEC 10K report for Nike httpwww.sec.govArchivesedgar.docx von jesseniasaddler
Link to SEC 10K report for Nike httpwww.sec.govArchivesedgar.docxLink to SEC 10K report for Nike httpwww.sec.govArchivesedgar.docx
Link to SEC 10K report for Nike httpwww.sec.govArchivesedgar.docx
jesseniasaddler12 views
List and describe the cloud services providers.Explore typical net.docx von jesseniasaddler
List and describe the cloud services providers.Explore typical net.docxList and describe the cloud services providers.Explore typical net.docx
List and describe the cloud services providers.Explore typical net.docx
jesseniasaddler2 views
List and describe the three levels of international human resource.docx von jesseniasaddler
List and describe the three levels of international human resource.docxList and describe the three levels of international human resource.docx
List and describe the three levels of international human resource.docx
jesseniasaddler2 views
List and describe the six (6) parts of a speech.Describe.docx von jesseniasaddler
List and describe the six (6) parts of a speech.Describe.docxList and describe the six (6) parts of a speech.Describe.docx
List and describe the six (6) parts of a speech.Describe.docx
jesseniasaddler4 views
List 2 characteristics of each period listed below1-2. Renais.docx von jesseniasaddler
List 2 characteristics of each period listed below1-2. Renais.docxList 2 characteristics of each period listed below1-2. Renais.docx
List 2 characteristics of each period listed below1-2. Renais.docx
jesseniasaddler4 views
Lisa lights a candle & records its height in inches every hour. The .docx von jesseniasaddler
Lisa lights a candle & records its height in inches every hour. The .docxLisa lights a candle & records its height in inches every hour. The .docx
Lisa lights a candle & records its height in inches every hour. The .docx
jesseniasaddler2 views
Linking or actionThe government opertaion many large parks.Many .docx von jesseniasaddler
Linking or actionThe government opertaion many large parks.Many .docxLinking or actionThe government opertaion many large parks.Many .docx
Linking or actionThe government opertaion many large parks.Many .docx
jesseniasaddler2 views
Linear Regression is a useful method if you want to be able to predi.docx von jesseniasaddler
Linear Regression is a useful method if you want to be able to predi.docxLinear Regression is a useful method if you want to be able to predi.docx
Linear Regression is a useful method if you want to be able to predi.docx
jesseniasaddler3 views
linical Performance Please respond to the followingWhy should cl.docx von jesseniasaddler
linical Performance Please respond to the followingWhy should cl.docxlinical Performance Please respond to the followingWhy should cl.docx
linical Performance Please respond to the followingWhy should cl.docx
jesseniasaddler2 views
Linear Models and FunctionDescribe applications of the Cartesi.docx von jesseniasaddler
Linear Models and FunctionDescribe applications of the Cartesi.docxLinear Models and FunctionDescribe applications of the Cartesi.docx
Linear Models and FunctionDescribe applications of the Cartesi.docx
jesseniasaddler3 views
Limited Liability Companies. John, Lesa, and Trevor form a limited l.docx von jesseniasaddler
Limited Liability Companies. John, Lesa, and Trevor form a limited l.docxLimited Liability Companies. John, Lesa, and Trevor form a limited l.docx
Limited Liability Companies. John, Lesa, and Trevor form a limited l.docx
jesseniasaddler5 views
LIFOEnding InventoryCost of Goods SoldUnitsPer un.docx von jesseniasaddler
LIFOEnding InventoryCost of Goods SoldUnitsPer un.docxLIFOEnding InventoryCost of Goods SoldUnitsPer un.docx
LIFOEnding InventoryCost of Goods SoldUnitsPer un.docx
jesseniasaddler2 views
Lilas brother believes that she places too many orders for screws p.docx von jesseniasaddler
Lilas brother believes that she places too many orders for screws p.docxLilas brother believes that she places too many orders for screws p.docx
Lilas brother believes that she places too many orders for screws p.docx
jesseniasaddler43 views
Life Cycle CostingCopy and Paste this Format when responding (.docx von jesseniasaddler
Life Cycle CostingCopy and Paste this Format when responding (.docxLife Cycle CostingCopy and Paste this Format when responding (.docx
Life Cycle CostingCopy and Paste this Format when responding (.docx
jesseniasaddler2 views
LIFO vs. FIFO The controller of Sagehen Enterprises believes that .docx von jesseniasaddler
LIFO vs. FIFO The controller of Sagehen Enterprises believes that .docxLIFO vs. FIFO The controller of Sagehen Enterprises believes that .docx
LIFO vs. FIFO The controller of Sagehen Enterprises believes that .docx
jesseniasaddler3 views
Library ResearchOne one side of one sheet of paper, do the follo.docx von jesseniasaddler
Library ResearchOne one side of one sheet of paper, do the follo.docxLibrary ResearchOne one side of one sheet of paper, do the follo.docx
Library ResearchOne one side of one sheet of paper, do the follo.docx
jesseniasaddler2 views
Library Research Project  WORD Document with 900 Words and 3 referen.docx von jesseniasaddler
Library Research Project  WORD Document with 900 Words and 3 referen.docxLibrary Research Project  WORD Document with 900 Words and 3 referen.docx
Library Research Project  WORD Document with 900 Words and 3 referen.docx
jesseniasaddler2 views
Library Research AssignmentYou are new member of internal affairs .docx von jesseniasaddler
Library Research AssignmentYou are new member of internal affairs .docxLibrary Research AssignmentYou are new member of internal affairs .docx
Library Research AssignmentYou are new member of internal affairs .docx
jesseniasaddler2 views
Library Research AssignmentUse the library, Internet, and other av.docx von jesseniasaddler
Library Research AssignmentUse the library, Internet, and other av.docxLibrary Research AssignmentUse the library, Internet, and other av.docx
Library Research AssignmentUse the library, Internet, and other av.docx
jesseniasaddler2 views

Último

Structure and Functions of Cell.pdf von
Structure and Functions of Cell.pdfStructure and Functions of Cell.pdf
Structure and Functions of Cell.pdfNithya Murugan
368 views10 Folien
ICS3211_lecture 08_2023.pdf von
ICS3211_lecture 08_2023.pdfICS3211_lecture 08_2023.pdf
ICS3211_lecture 08_2023.pdfVanessa Camilleri
103 views30 Folien
Student Voice von
Student Voice Student Voice
Student Voice Pooky Knightsmith
164 views33 Folien
The basics - information, data, technology and systems.pdf von
The basics - information, data, technology and systems.pdfThe basics - information, data, technology and systems.pdf
The basics - information, data, technology and systems.pdfJonathanCovena1
88 views1 Folie
Google solution challenge..pptx von
Google solution challenge..pptxGoogle solution challenge..pptx
Google solution challenge..pptxChitreshGyanani1
98 views18 Folien
JiscOAWeek_LAIR_slides_October2023.pptx von
JiscOAWeek_LAIR_slides_October2023.pptxJiscOAWeek_LAIR_slides_October2023.pptx
JiscOAWeek_LAIR_slides_October2023.pptxJisc
79 views8 Folien

Último(20)

Structure and Functions of Cell.pdf von Nithya Murugan
Structure and Functions of Cell.pdfStructure and Functions of Cell.pdf
Structure and Functions of Cell.pdf
Nithya Murugan368 views
The basics - information, data, technology and systems.pdf von JonathanCovena1
The basics - information, data, technology and systems.pdfThe basics - information, data, technology and systems.pdf
The basics - information, data, technology and systems.pdf
JonathanCovena188 views
JiscOAWeek_LAIR_slides_October2023.pptx von Jisc
JiscOAWeek_LAIR_slides_October2023.pptxJiscOAWeek_LAIR_slides_October2023.pptx
JiscOAWeek_LAIR_slides_October2023.pptx
Jisc79 views
American Psychological Association 7th Edition.pptx von SamiullahAfridi4
American Psychological Association  7th Edition.pptxAmerican Psychological Association  7th Edition.pptx
American Psychological Association 7th Edition.pptx
SamiullahAfridi482 views
UWP OA Week Presentation (1).pptx von Jisc
UWP OA Week Presentation (1).pptxUWP OA Week Presentation (1).pptx
UWP OA Week Presentation (1).pptx
Jisc74 views
Lecture: Open Innovation von Michal Hron
Lecture: Open InnovationLecture: Open Innovation
Lecture: Open Innovation
Michal Hron96 views
Psychology KS4 von WestHatch
Psychology KS4Psychology KS4
Psychology KS4
WestHatch68 views
Scope of Biochemistry.pptx von shoba shoba
Scope of Biochemistry.pptxScope of Biochemistry.pptx
Scope of Biochemistry.pptx
shoba shoba124 views
The Accursed House by Émile Gaboriau von DivyaSheta
The Accursed House  by Émile GaboriauThe Accursed House  by Émile Gaboriau
The Accursed House by Émile Gaboriau
DivyaSheta158 views
Classification of crude drugs.pptx von GayatriPatra14
Classification of crude drugs.pptxClassification of crude drugs.pptx
Classification of crude drugs.pptx
GayatriPatra1477 views
Drama KS5 Breakdown von WestHatch
Drama KS5 BreakdownDrama KS5 Breakdown
Drama KS5 Breakdown
WestHatch71 views
11.28.23 Social Capital and Social Exclusion.pptx von mary850239
11.28.23 Social Capital and Social Exclusion.pptx11.28.23 Social Capital and Social Exclusion.pptx
11.28.23 Social Capital and Social Exclusion.pptx
mary850239281 views
Community-led Open Access Publishing webinar.pptx von Jisc
Community-led Open Access Publishing webinar.pptxCommunity-led Open Access Publishing webinar.pptx
Community-led Open Access Publishing webinar.pptx
Jisc74 views
Solar System and Galaxies.pptx von DrHafizKosar
Solar System and Galaxies.pptxSolar System and Galaxies.pptx
Solar System and Galaxies.pptx
DrHafizKosar85 views

Health Information Technology (HIT) is a growing field within health

  • 1. Health Information Technology (HIT) is a growing field within health services organizations today; additionally, health information security is a major concern among health organizations, as they are required to maintain the security and privacy of health information. The Department of Health and Human Services (HHS) provides extensive information about the Health Insurance Portability and Accountability Act (HIPAA). Visit the HHS Website, at www.hhs.gov/ocr/privacy , for more information about HIPAA requirements. In March 2012, the HHS settled a HIPAA case with the Blue Cross Blue Shield of Tennessee (BCBST) for $1.5 million. Read more about this case at www.hhs.gov/ocr/privacy/hipaa/enforcement/examples/bcbstagr mnt.html . As an IT security manager at a regional health services organization, your CIO has asked for the following: an analysis of this incident, an overview of the HIPAA security requirements necessary to prevent this type of an incident, and a briefing for management on the minimum security requirements to be HIPAA complaint. Section1: Written Paper1. Write a three to five (3-5) page paper in which you: a. Describe the security issues of BCBST in regard to confidentiality, integrity, availability, and privacy based on the information provided in the BCBST case. b. Describe the HIPPA security requirement that could have prevented each security issue identified if it had been enforced.c. Analyze the corrective actions taken by BCBST that were efficient and those that were not adequate.d. Analyze the security issues and the HIPAA security requirements and describe the safeguards that the organization needs to implement in order to mitigate the security risks. Ensure that you describe the safeguards in terms of administrative, technical, and physical safeguards.e. Use at least three (3) quality resources in this assignment. Note:
  • 2. Wikipedia and similar Websites do not qualify as quality resources. Your written paper must follow these formatting requirements: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required page length. Section 2: PowerPoint Presentation2. Create a six to eight (6-8) slide PowerPoint presentation in which you: a. Provide the following on the main body slides: i. An overview of the security issues at BCBST ii. HIPAA security requirements that could have prevented the incident iii. Positive and negative corrective actions taken by BCBST iv. Safeguards needed to mitigate the security risks Your PowerPoint presentation must follow these formatting requirements: Include a title slide, four to six (4-6) main body slides, and a
  • 3. conclusion slide. The specific course learning outcomes associated with this assignment are: Summarize the legal aspects of the information security triad: availability, integrity, and confidentiality. Use technology and information resources to research legal issues in information security. Write clearly and concisely about information security legal issues and topics using proper writing mechanics and technical style conventions.