NO Plagiarism Please!!!This assignment consists of two (2) sec.docx

NO Plagiarism Please!!! This assignment consists of two (2) sections: a written paper and a PowerPoint presentation. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. Health Information Technology (HIT) is a growing field within health services organizations today; additionally, health information security is a major concern among health organizations, as they are required to maintain the security and privacy of health information. The Department of Health and Human Services (HHS) provides extensive information about the Health Insurance Portability and Accountability Act (HIPAA). Visit the HHS Website, at www.hhs.gov/ocr/privacy, for more information about HIPAA requirements. In March 2012, the HHS settled a HIPAA case with the Blue Cross Blue Shield of Tennessee (BCBST) for $1.5 million. Read more about this case at www.hhs.gov/ocr/privacy/hipaa/enforcement/examples/bcbstagrmnt.html. As an IT security manager at a regional health services organization, your CIO has asked for the following: an analysis of this incident, an overview of the HIPAA security requirements necessary to prevent this type of an incident, and a briefing for management on the minimum security requirements to be HIPAA complaint.      Section1: Written Paper  1. Write a three to five (3-5) page paper in which you:     a. Describe the security issues of BCBST in regard to confidentiality, integrity, availability, and privacy based on the information provided in the BCBST case.     b. Describe the HIPPA security requirement that could have prevented each security issue identified if it had been enforced.    c. Analyze the corrective actions taken by BCBST that were efficient and those that were not adequate.    d. Analyze the security issues and the HIPAA security requirements and describe the safeguards that the organization needs to implement in order to mitigate the security risks.  Ensure that you describe the safeguards in terms of administrative, technical, and physical safeguards.    e. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.     Your written paper must follow these formatting requirements:   •Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; references must follow APA or school-specific format. Check with your professor for any additional instructions.  •Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required page length.    Section 2: PowerPoint Presentation  2.  Create a six to eight (6-8) slide PowerPoint presentation in which you:     a.  Provide the following on the main body slides:      i. An overview of the security issues at BCBST ...

NO Plagiarism Please!!!
This assignment consists of two (2) sections: a written paper
and a PowerPoint presentation. You must submit both sections
as separate files for the completion of this assignment. Label
each file name according to the section of the assignment it is
written for.
Health Information Technology (HIT) is a growing field within
health services organizations today; additionally, health
information security is a major concern among health
organizations, as they are required to maintain the security and
privacy of health information. The Department of Health and
Human Services (HHS) provides extensive information about
the Health Insurance Portability and Accountability Act
(HIPAA). Visit the HHS Website, at www.hhs.gov/ocr/privacy,
for more information about HIPAA requirements. In March
2012, the HHS settled a HIPAA case with the Blue Cross Blue
Shield of Tennessee (BCBST) for $1.5 million. Read more
about this case at
www.hhs.gov/ocr/privacy/hipaa/enforcement/examples/bcbstagr
mnt.html. As an IT security manager at a regional health
services organization, your CIO has asked for the following: an
analysis of this incident, an overview of the HIPAA security
requirements necessary to prevent this type of an incident, and a
briefing for management on the minimum security requirements
to be HIPAA complaint.
Section1: Written Paper 1. Write a three to five (3-5) page
paper in which you:
a. Describe the security issues of BCBST in regard to
confidentiality, integrity, availability, and privacy based on the
information provided in the BCBST case.
b. Describe the HIPPA security requirement that could have
prevented each security issue identified if it had been enforced.
c. Analyze the corrective actions taken by BCBST that were
efficient and those that were not adequate.
d. Analyze the security issues and the HIPAA security
requirements and describe the safeguards that the organization
needs to implement in order to mitigate the security risks.
Ensure that you describe the safeguards in terms of
administrative, technical, and physical safeguards.
e. Use at least three (3) quality resources in this assignment.
Note: Wikipedia and similar Websites do not qualify as quality
resources.
Your written paper must follow these formatting requirements:
•Be typed, double spaced, using Times New Roman font (size
12), with one-inch margins on all sides; references must follow
APA or school-specific format. Check with your professor for
any additional instructions.
•Include a cover page containing the title of the assignment, the
student’s name, the professor’s name, the course title, and the
date. The cover page and the reference page are not included in
the required page length.
Section 2: PowerPoint Presentation 2.
Create a six to eight (6-8) slide PowerPoint presentation in
which you:
a. Provide the following on the main body slides:
i. An overview of the security issues at BCBST
ii. HIPAA security requirements that could have prevented the
incident
iii. Positive and negative corrective actions taken by BCBST
iv. Safeguards needed to mitigate the security risks Your
PowerPoint presentation must follow these formatting
requirements:
•Include a title slide, four to six (4-6) main body slides, and a
conclusion slide.

Recomendados

Case Study 1 HIPAA, CIA, and Safeguards This assignment consi.docx von
Case Study 1 HIPAA, CIA, and Safeguards This assignment consi.docxCase Study 1 HIPAA, CIA, and Safeguards This assignment consi.docx
Case Study 1 HIPAA, CIA, and Safeguards This assignment consi.docxwendolynhalbert
2 views3 Folien
This assignment consists of two (2) sections a written paper and .docx von
This assignment consists of two (2) sections a written paper and .docxThis assignment consists of two (2) sections a written paper and .docx
This assignment consists of two (2) sections a written paper and .docxterirasco
2 views4 Folien
This assignment consists of two (2) sections a written paper and a .docx von
This assignment consists of two (2) sections a written paper and a .docxThis assignment consists of two (2) sections a written paper and a .docx
This assignment consists of two (2) sections a written paper and a .docxOllieShoresna
2 views3 Folien
Case Study 1 HIPAA, CIA, and Safeguards Due Week 2 and worth .docx von
Case Study 1 HIPAA, CIA, and Safeguards Due Week 2 and worth .docxCase Study 1 HIPAA, CIA, and Safeguards Due Week 2 and worth .docx
Case Study 1 HIPAA, CIA, and Safeguards Due Week 2 and worth .docxromeliadoan
4 views3 Folien
This assignment consists of two (2) sections a written paper and a .docx von
This assignment consists of two (2) sections a written paper and a .docxThis assignment consists of two (2) sections a written paper and a .docx
This assignment consists of two (2) sections a written paper and a .docxgasciognecaren
4 views4 Folien
This assignment consists of two (2) sections a written paper.docx von
This assignment consists of two (2) sections a written paper.docxThis assignment consists of two (2) sections a written paper.docx
This assignment consists of two (2) sections a written paper.docxgasciognecaren
2 views3 Folien

Más contenido relacionado

Similar a NO Plagiarism Please!!!This assignment consists of two (2) sec.docx

Strayer cis 438 week 2 case study 1 von
Strayer cis 438 week 2 case study 1Strayer cis 438 week 2 case study 1
Strayer cis 438 week 2 case study 1shyaminfo105
7 views7 Folien
Case Study 1 HIPAA, CIA, and SafeguardsThis assignment .docx von
Case Study 1 HIPAA, CIA, and SafeguardsThis assignment .docxCase Study 1 HIPAA, CIA, and SafeguardsThis assignment .docx
Case Study 1 HIPAA, CIA, and SafeguardsThis assignment .docxmoggdede
5 views3 Folien
CIS 324 Success Begins / snaptutorial.com von
CIS 324 Success Begins / snaptutorial.comCIS 324 Success Begins / snaptutorial.com
CIS 324 Success Begins / snaptutorial.comRobinson068
16 views13 Folien
Cis 438 Enthusiastic Study / snaptutorial.com von
Cis 438 Enthusiastic Study / snaptutorial.comCis 438 Enthusiastic Study / snaptutorial.com
Cis 438 Enthusiastic Study / snaptutorial.comStephenson03
21 views21 Folien
Cis 438 Technology levels--snaptutorial.com von
Cis 438 Technology levels--snaptutorial.comCis 438 Technology levels--snaptutorial.com
Cis 438 Technology levels--snaptutorial.comsholingarjosh61
16 views21 Folien
Strayer cis-438-week-2-case-study-1 von
Strayer cis-438-week-2-case-study-1Strayer cis-438-week-2-case-study-1
Strayer cis-438-week-2-case-study-1infinityend3
7 views7 Folien

Similar a NO Plagiarism Please!!!This assignment consists of two (2) sec.docx(20)

Strayer cis 438 week 2 case study 1 von shyaminfo105
Strayer cis 438 week 2 case study 1Strayer cis 438 week 2 case study 1
Strayer cis 438 week 2 case study 1
shyaminfo1057 views
Case Study 1 HIPAA, CIA, and SafeguardsThis assignment .docx von moggdede
Case Study 1 HIPAA, CIA, and SafeguardsThis assignment .docxCase Study 1 HIPAA, CIA, and SafeguardsThis assignment .docx
Case Study 1 HIPAA, CIA, and SafeguardsThis assignment .docx
moggdede5 views
CIS 324 Success Begins / snaptutorial.com von Robinson068
CIS 324 Success Begins / snaptutorial.comCIS 324 Success Begins / snaptutorial.com
CIS 324 Success Begins / snaptutorial.com
Robinson06816 views
Cis 438 Enthusiastic Study / snaptutorial.com von Stephenson03
Cis 438 Enthusiastic Study / snaptutorial.comCis 438 Enthusiastic Study / snaptutorial.com
Cis 438 Enthusiastic Study / snaptutorial.com
Stephenson0321 views
Cis 438 Technology levels--snaptutorial.com von sholingarjosh61
Cis 438 Technology levels--snaptutorial.comCis 438 Technology levels--snaptutorial.com
Cis 438 Technology levels--snaptutorial.com
sholingarjosh6116 views
Strayer cis-438-week-2-case-study-1 von infinityend3
Strayer cis-438-week-2-case-study-1Strayer cis-438-week-2-case-study-1
Strayer cis-438-week-2-case-study-1
infinityend37 views
Unit Outcomes addressed in this AssignmentContrast the di von corbing9ttj
Unit Outcomes addressed in this AssignmentContrast the diUnit Outcomes addressed in this AssignmentContrast the di
Unit Outcomes addressed in this AssignmentContrast the di
corbing9ttj1 view
HIPAA and IT Audits.docx von 4934bk
HIPAA and IT Audits.docxHIPAA and IT Audits.docx
HIPAA and IT Audits.docx
4934bk2 views
CIS 502 Week 6 Assignment 2Assignment 2 Critical Infrastructure P.docx von brownliecarmella
CIS 502 Week 6 Assignment 2Assignment 2 Critical Infrastructure P.docxCIS 502 Week 6 Assignment 2Assignment 2 Critical Infrastructure P.docx
CIS 502 Week 6 Assignment 2Assignment 2 Critical Infrastructure P.docx
Case Study 2 Federal CIO Council’s Bring Your Own Device (BYOD) Too.docx von DaliaCulbertson719
Case Study 2 Federal CIO Council’s Bring Your Own Device (BYOD) Too.docxCase Study 2 Federal CIO Council’s Bring Your Own Device (BYOD) Too.docx
Case Study 2 Federal CIO Council’s Bring Your Own Device (BYOD) Too.docx
The consumerization of Information Technology (IT) has given rise to.docx von rtodd643
The consumerization of Information Technology (IT) has given rise to.docxThe consumerization of Information Technology (IT) has given rise to.docx
The consumerization of Information Technology (IT) has given rise to.docx
rtodd6432 views
Case Study 2 Federal CIO Council’s Bring Your Own Device (BYOD) Too.docx von moggdede
Case Study 2 Federal CIO Council’s Bring Your Own Device (BYOD) Too.docxCase Study 2 Federal CIO Council’s Bring Your Own Device (BYOD) Too.docx
Case Study 2 Federal CIO Council’s Bring Your Own Device (BYOD) Too.docx
moggdede4 views
According to the text, Critical Infrastructure Protection (CIP) is a.docx von stelzriedemarla
According to the text, Critical Infrastructure Protection (CIP) is a.docxAccording to the text, Critical Infrastructure Protection (CIP) is a.docx
According to the text, Critical Infrastructure Protection (CIP) is a.docx
stelzriedemarla3 views
Information must be original - will be using TURNITIN.com to check i.docx von doylymaura
Information must be original - will be using TURNITIN.com to check i.docxInformation must be original - will be using TURNITIN.com to check i.docx
Information must be original - will be using TURNITIN.com to check i.docx
doylymaura2 views
The consumerization of Information Technology (IT) has given rise to.docx von he45mcurnow
The consumerization of Information Technology (IT) has given rise to.docxThe consumerization of Information Technology (IT) has given rise to.docx
The consumerization of Information Technology (IT) has given rise to.docx
he45mcurnow2 views
Assignment Critical Infrastructure ProtectionAccording to the t.docx von lesleyryder69361
Assignment Critical Infrastructure ProtectionAccording to the t.docxAssignment Critical Infrastructure ProtectionAccording to the t.docx
Assignment Critical Infrastructure ProtectionAccording to the t.docx
HI300 Unit 7 AssignmentUnit outcomes addressed in this Assignment.docx von AbramMartino96
HI300 Unit 7 AssignmentUnit outcomes addressed in this Assignment.docxHI300 Unit 7 AssignmentUnit outcomes addressed in this Assignment.docx
HI300 Unit 7 AssignmentUnit outcomes addressed in this Assignment.docx
AbramMartino963 views
Section 1 Written Paper1. Write a six to eight (6-8) page paper in .docx von rtodd280
Section 1 Written Paper1. Write a six to eight (6-8) page paper in .docxSection 1 Written Paper1. Write a six to eight (6-8) page paper in .docx
Section 1 Written Paper1. Write a six to eight (6-8) page paper in .docx
rtodd2802 views
Assignment 2 critical infrastructure protection von coursesexams1
Assignment 2 critical infrastructure protectionAssignment 2 critical infrastructure protection
Assignment 2 critical infrastructure protection
coursesexams127 views
Case Study 2 Data Breaches and Regulatory RequirementsDue Week 6 .docx von romeliadoan
Case Study 2 Data Breaches and Regulatory RequirementsDue Week 6 .docxCase Study 2 Data Breaches and Regulatory RequirementsDue Week 6 .docx
Case Study 2 Data Breaches and Regulatory RequirementsDue Week 6 .docx
romeliadoan10 views

Más de poulterbarbara

0 3S T R U C T U R E 1 6S T E P B Y S T E P.docx von
0 3S T R U C T U R E 1 6S T E P  B Y  S T E P.docx0 3S T R U C T U R E 1 6S T E P  B Y  S T E P.docx
0 3S T R U C T U R E 1 6S T E P B Y S T E P.docxpoulterbarbara
17 views1 Folie
.  Read the two articles below that discuss why fuel prices fluctu.docx von
.  Read the two articles below that discuss why fuel prices fluctu.docx.  Read the two articles below that discuss why fuel prices fluctu.docx
.  Read the two articles below that discuss why fuel prices fluctu.docxpoulterbarbara
7 views1 Folie
1 Name .docx von
1  Name                                                .docx1  Name                                                .docx
1 Name .docxpoulterbarbara
2 views4 Folien
0 Choose one of the organizations described in the Four Case Studie.docx von
0 Choose one of the organizations described in the Four Case Studie.docx0 Choose one of the organizations described in the Four Case Studie.docx
0 Choose one of the organizations described in the Four Case Studie.docxpoulterbarbara
2 views1 Folie
1 Case Study #23 Is Yahoo!’s Business Model .docx von
1  Case Study #23   Is Yahoo!’s Business Model .docx1  Case Study #23   Is Yahoo!’s Business Model .docx
1 Case Study #23 Is Yahoo!’s Business Model .docxpoulterbarbara
6 views34 Folien
06identifying exceptions and RECOGNIZING WINSWe can .docx von
06identifying exceptions and  RECOGNIZING WINSWe can .docx06identifying exceptions and  RECOGNIZING WINSWe can .docx
06identifying exceptions and RECOGNIZING WINSWe can .docxpoulterbarbara
2 views22 Folien

Más de poulterbarbara(20)

0 3S T R U C T U R E 1 6S T E P B Y S T E P.docx von poulterbarbara
0 3S T R U C T U R E 1 6S T E P  B Y  S T E P.docx0 3S T R U C T U R E 1 6S T E P  B Y  S T E P.docx
0 3S T R U C T U R E 1 6S T E P B Y S T E P.docx
poulterbarbara17 views
.  Read the two articles below that discuss why fuel prices fluctu.docx von poulterbarbara
.  Read the two articles below that discuss why fuel prices fluctu.docx.  Read the two articles below that discuss why fuel prices fluctu.docx
.  Read the two articles below that discuss why fuel prices fluctu.docx
poulterbarbara7 views
0 Choose one of the organizations described in the Four Case Studie.docx von poulterbarbara
0 Choose one of the organizations described in the Four Case Studie.docx0 Choose one of the organizations described in the Four Case Studie.docx
0 Choose one of the organizations described in the Four Case Studie.docx
poulterbarbara2 views
1 Case Study #23 Is Yahoo!’s Business Model .docx von poulterbarbara
1  Case Study #23   Is Yahoo!’s Business Model .docx1  Case Study #23   Is Yahoo!’s Business Model .docx
1 Case Study #23 Is Yahoo!’s Business Model .docx
poulterbarbara6 views
06identifying exceptions and RECOGNIZING WINSWe can .docx von poulterbarbara
06identifying exceptions and  RECOGNIZING WINSWe can .docx06identifying exceptions and  RECOGNIZING WINSWe can .docx
06identifying exceptions and RECOGNIZING WINSWe can .docx
poulterbarbara2 views
1 1 Quantitative Methods Final Assignment MSc C.docx von poulterbarbara
1  1  Quantitative Methods Final Assignment MSc C.docx1  1  Quantitative Methods Final Assignment MSc C.docx
1 1 Quantitative Methods Final Assignment MSc C.docx
poulterbarbara3 views
08creating YOUR GAME PLANNothing will work unle.docx von poulterbarbara
08creating  YOUR GAME PLANNothing will work  unle.docx08creating  YOUR GAME PLANNothing will work  unle.docx
08creating YOUR GAME PLANNothing will work unle.docx
poulterbarbara2 views
0091-4169049501-0001THE JOURNAL OF CRIMINAL LAW & CRIMINOL.docx von poulterbarbara
0091-4169049501-0001THE JOURNAL OF CRIMINAL LAW & CRIMINOL.docx0091-4169049501-0001THE JOURNAL OF CRIMINAL LAW & CRIMINOL.docx
0091-4169049501-0001THE JOURNAL OF CRIMINAL LAW & CRIMINOL.docx
poulterbarbara4 views
.what is the main idea of this ReadingRead Nathaniel Hawthorne’s.docx von poulterbarbara
.what is the main idea of this ReadingRead Nathaniel Hawthorne’s.docx.what is the main idea of this ReadingRead Nathaniel Hawthorne’s.docx
.what is the main idea of this ReadingRead Nathaniel Hawthorne’s.docx
poulterbarbara3 views
.,Discuss power, authority, and violenceDifferentiate between .docx von poulterbarbara
.,Discuss power, authority, and violenceDifferentiate between .docx.,Discuss power, authority, and violenceDifferentiate between .docx
.,Discuss power, authority, and violenceDifferentiate between .docx
poulterbarbara2 views
. Why is understanding the fundamentals of persuasion and argume.docx von poulterbarbara
. Why is understanding the fundamentals of persuasion and argume.docx. Why is understanding the fundamentals of persuasion and argume.docx
. Why is understanding the fundamentals of persuasion and argume.docx
poulterbarbara3 views
.ARTICLE ASSESS & APPLYTitle of ArticleRetrieved f.docx von poulterbarbara
.ARTICLE ASSESS & APPLYTitle of ArticleRetrieved f.docx.ARTICLE ASSESS & APPLYTitle of ArticleRetrieved f.docx
.ARTICLE ASSESS & APPLYTitle of ArticleRetrieved f.docx
poulterbarbara2 views
-Whether sanctions should be imposed on students for using speech th.docx von poulterbarbara
-Whether sanctions should be imposed on students for using speech th.docx-Whether sanctions should be imposed on students for using speech th.docx
-Whether sanctions should be imposed on students for using speech th.docx
poulterbarbara2 views
09-15 PRACTICAL EXERCISE PE 4-04-1 TITL.docx von poulterbarbara
09-15 PRACTICAL EXERCISE PE 4-04-1             TITL.docx09-15 PRACTICAL EXERCISE PE 4-04-1             TITL.docx
09-15 PRACTICAL EXERCISE PE 4-04-1 TITL.docx
poulterbarbara3 views
0Running Head NON-VERBAL COMMUNICATIONS 10NON-VERBAL C.docx von poulterbarbara
0Running Head NON-VERBAL COMMUNICATIONS 10NON-VERBAL C.docx0Running Head NON-VERBAL COMMUNICATIONS 10NON-VERBAL C.docx
0Running Head NON-VERBAL COMMUNICATIONS 10NON-VERBAL C.docx
poulterbarbara2 views
. Briefly explain how biological approaches might explain antisocial.docx von poulterbarbara
. Briefly explain how biological approaches might explain antisocial.docx. Briefly explain how biological approaches might explain antisocial.docx
. Briefly explain how biological approaches might explain antisocial.docx
poulterbarbara4 views
-look for a known restaurant (chain) or Food and Beverage related bu.docx von poulterbarbara
-look for a known restaurant (chain) or Food and Beverage related bu.docx-look for a known restaurant (chain) or Food and Beverage related bu.docx
-look for a known restaurant (chain) or Food and Beverage related bu.docx
poulterbarbara2 views
-Assignment instructions and requirements-The Assignment mu.docx von poulterbarbara
-Assignment instructions and requirements-The Assignment mu.docx-Assignment instructions and requirements-The Assignment mu.docx
-Assignment instructions and requirements-The Assignment mu.docx
poulterbarbara2 views
... all men are created equal ... they are endowed by their Cre.docx von poulterbarbara
... all men are created equal ... they are endowed by their Cre.docx... all men are created equal ... they are endowed by their Cre.docx
... all men are created equal ... they are endowed by their Cre.docx
poulterbarbara4 views

Último

11.30.23A Poverty and Inequality in America.pptx von
11.30.23A Poverty and Inequality in America.pptx11.30.23A Poverty and Inequality in America.pptx
11.30.23A Poverty and Inequality in America.pptxmary850239
181 views18 Folien
Ask The Expert! Nonprofit Website Tools, Tips, and Technology.pdf von
 Ask The Expert! Nonprofit Website Tools, Tips, and Technology.pdf Ask The Expert! Nonprofit Website Tools, Tips, and Technology.pdf
Ask The Expert! Nonprofit Website Tools, Tips, and Technology.pdfTechSoup
62 views28 Folien
MIXING OF PHARMACEUTICALS.pptx von
MIXING OF PHARMACEUTICALS.pptxMIXING OF PHARMACEUTICALS.pptx
MIXING OF PHARMACEUTICALS.pptxAnupkumar Sharma
125 views35 Folien
Berry country.pdf von
Berry country.pdfBerry country.pdf
Berry country.pdfMariaKenney3
80 views12 Folien
NodeJS and ExpressJS.pdf von
NodeJS and ExpressJS.pdfNodeJS and ExpressJS.pdf
NodeJS and ExpressJS.pdfArthyR3
50 views17 Folien
Creative Restart 2023: Leonard Savage - The Permanent Brief: Unearthing unobv... von
Creative Restart 2023: Leonard Savage - The Permanent Brief: Unearthing unobv...Creative Restart 2023: Leonard Savage - The Permanent Brief: Unearthing unobv...
Creative Restart 2023: Leonard Savage - The Permanent Brief: Unearthing unobv...Taste
62 views21 Folien

Último(20)

11.30.23A Poverty and Inequality in America.pptx von mary850239
11.30.23A Poverty and Inequality in America.pptx11.30.23A Poverty and Inequality in America.pptx
11.30.23A Poverty and Inequality in America.pptx
mary850239181 views
Ask The Expert! Nonprofit Website Tools, Tips, and Technology.pdf von TechSoup
 Ask The Expert! Nonprofit Website Tools, Tips, and Technology.pdf Ask The Expert! Nonprofit Website Tools, Tips, and Technology.pdf
Ask The Expert! Nonprofit Website Tools, Tips, and Technology.pdf
TechSoup 62 views
NodeJS and ExpressJS.pdf von ArthyR3
NodeJS and ExpressJS.pdfNodeJS and ExpressJS.pdf
NodeJS and ExpressJS.pdf
ArthyR350 views
Creative Restart 2023: Leonard Savage - The Permanent Brief: Unearthing unobv... von Taste
Creative Restart 2023: Leonard Savage - The Permanent Brief: Unearthing unobv...Creative Restart 2023: Leonard Savage - The Permanent Brief: Unearthing unobv...
Creative Restart 2023: Leonard Savage - The Permanent Brief: Unearthing unobv...
Taste62 views
JRN 362 - Lecture Twenty-Two von Rich Hanley
JRN 362 - Lecture Twenty-TwoJRN 362 - Lecture Twenty-Two
JRN 362 - Lecture Twenty-Two
Rich Hanley39 views
INT-244 Topic 6b Confucianism von S Meyer
INT-244 Topic 6b ConfucianismINT-244 Topic 6b Confucianism
INT-244 Topic 6b Confucianism
S Meyer49 views
Monthly Information Session for MV Asterix (November) von Esquimalt MFRC
Monthly Information Session for MV Asterix (November)Monthly Information Session for MV Asterix (November)
Monthly Information Session for MV Asterix (November)
Esquimalt MFRC213 views
Payment Integration using Braintree Connector | MuleSoft Mysore Meetup #37 von MysoreMuleSoftMeetup
Payment Integration using Braintree Connector | MuleSoft Mysore Meetup #37Payment Integration using Braintree Connector | MuleSoft Mysore Meetup #37
Payment Integration using Braintree Connector | MuleSoft Mysore Meetup #37
Six Sigma Concept by Sahil Srivastava.pptx von Sahil Srivastava
Six Sigma Concept by Sahil Srivastava.pptxSix Sigma Concept by Sahil Srivastava.pptx
Six Sigma Concept by Sahil Srivastava.pptx
Sahil Srivastava51 views
EILO EXCURSION PROGRAMME 2023 von info33492
EILO EXCURSION PROGRAMME 2023EILO EXCURSION PROGRAMME 2023
EILO EXCURSION PROGRAMME 2023
info33492208 views

NO Plagiarism Please!!!This assignment consists of two (2) sec.docx

  • 1. NO Plagiarism Please!!! This assignment consists of two (2) sections: a written paper and a PowerPoint presentation. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. Health Information Technology (HIT) is a growing field within health services organizations today; additionally, health information security is a major concern among health organizations, as they are required to maintain the security and privacy of health information. The Department of Health and Human Services (HHS) provides extensive information about the Health Insurance Portability and Accountability Act (HIPAA). Visit the HHS Website, at www.hhs.gov/ocr/privacy, for more information about HIPAA requirements. In March 2012, the HHS settled a HIPAA case with the Blue Cross Blue Shield of Tennessee (BCBST) for $1.5 million. Read more about this case at www.hhs.gov/ocr/privacy/hipaa/enforcement/examples/bcbstagr mnt.html. As an IT security manager at a regional health services organization, your CIO has asked for the following: an analysis of this incident, an overview of the HIPAA security requirements necessary to prevent this type of an incident, and a briefing for management on the minimum security requirements to be HIPAA complaint. Section1: Written Paper 1. Write a three to five (3-5) page paper in which you: a. Describe the security issues of BCBST in regard to
  • 2. confidentiality, integrity, availability, and privacy based on the information provided in the BCBST case. b. Describe the HIPPA security requirement that could have prevented each security issue identified if it had been enforced. c. Analyze the corrective actions taken by BCBST that were efficient and those that were not adequate. d. Analyze the security issues and the HIPAA security requirements and describe the safeguards that the organization needs to implement in order to mitigate the security risks. Ensure that you describe the safeguards in terms of administrative, technical, and physical safeguards. e. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Your written paper must follow these formatting requirements: •Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; references must follow APA or school-specific format. Check with your professor for any additional instructions. •Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required page length. Section 2: PowerPoint Presentation 2. Create a six to eight (6-8) slide PowerPoint presentation in
  • 3. which you: a. Provide the following on the main body slides: i. An overview of the security issues at BCBST ii. HIPAA security requirements that could have prevented the incident iii. Positive and negative corrective actions taken by BCBST iv. Safeguards needed to mitigate the security risks Your PowerPoint presentation must follow these formatting requirements: •Include a title slide, four to six (4-6) main body slides, and a conclusion slide.