Strayer cis 438 week 2 case study 1

Strayer CIS 438 Week 2 Case Study 1: HIPAA, CIA, and Safeguards NEW To purchase this material click below link http://www.assignmentcloud.com/cis-438-strayer/cis-438-week-2-case-study-1-hipaa-cia-and-safeguards-new For more classes visit www.assignmentcloud.com CIS 438 Week 2 Case Study 1: HIPAA, CIA, and Safeguards Case Study 1: HIPAA, CIA, and Safeguards Due Week 2 and worth 120 points

Strayer CIS 438 Week 2 Case Study 1:
HIPAA, CIA, and Safeguards NEW
To purchase this material click below link
http://www.assignmentcloud.com/cis-438-
strayer/cis-438-week-2-case-study-1-hipaa-
cia-and-safeguards-new
For more classes visit
www.assignmentcloud.com
CIS 438 Week 2 Case Study 1: HIPAA, CIA,
and Safeguards
Case Study 1: HIPAA, CIA, and Safeguards
Due Week 2 and worth 120 points
This assignment consists of two (2)
sections: a written paper and a
PowerPoint presentation. You must
submit both sections as separate files for
the completion of this assignment. Label
each file name according to the section of
the assignment it is written for.
Health Information Technology (HIT) is a
growing field within health services
organizations today; additionally, health
information security is a major concern
among health organizations, as they are
required to maintain the security and
privacy of health information. The
Department of Health and Human Services
(HHS) provides extensive information
about the Health Insurance Portability and
Accountability Act (HIPAA). Visit the HHS
Website, at www.hhs.gov/ocr/privacy, for
more information about HIPAA
requirements. In March 2012, the HHS
settled a HIPAA case with the Blue Cross
Blue Shield of Tennessee (BCBST) for $1.5
million. Read more about this case at
www.hhs.gov/ocr/privacy/hipaa/enforce
ment/examples/bcbstagrmnt.html. As an
IT security manager at a regional health
services organization, your CIO has asked
for the following: an analysis of this
incident, an overview of the HIPAA
security requirements necessary to
prevent this type of an incident, and a
briefing for management on the minimum
security requirements to be HIPAA
complaint.
Section1: Written Paper
1. Write a three to five (3-5) page paper in
which you:
a. Describe the security issues of BCBST in
regard to confidentiality, integrity,
availability, and privacy based on the
information provided in the BCBST case.
b. Describe the HIPPA security
requirement that could have prevented
each security issue identified if it had been
enforced.
c. Analyze the corrective actions taken by
BCBST that were efficient and those that
were not adequate.
d. Analyze the security issues and the
HIPAA security requirements and describe
the safeguards that the organization needs
to implement in order to mitigate the
security risks. Ensure that you describe
the safeguards in terms of administrative,
technical, and physical safeguards.
e. Use at least three (3) quality resources
in this assignment. Note: Wikipedia and
similar Websites do not qualify as quality
resources.
Your written paper must follow these
formatting requirements:
•Be typed, double spaced, using Times
New Roman font (size 12), with one-inch
margins on all sides; references must
follow APA or school-specific format.
Check with your professor for any
additional instructions.
•Include a cover page containing the title
of the assignment, the student’s name, the
professor’s name, the course title, and the
date. The cover page and the reference
page are not included in the required page
length.
Section 2: PowerPoint Presentation
2. Create a six to eight (6-8) slide
PowerPoint presentation in which you:
a. Provide the following on the main body
slides:
i. An overview of the security issues at
BCBST
ii. HIPAA security requirements that could
have prevented the incident
iii. Positive and negative corrective
actions taken by BCBST
iv. Safeguards needed to mitigate the
security risks
Your PowerPoint presentation must
follow these formatting requirements:
•Include a title slide, four to six (4-6) main
body slides, and a conclusion slide.
The specific course learning outcomes
associated with this assignment are:
•Summarize the legal aspects of the
information security triad: availability,
integrity, and confidentiality.
•Use technology and information
resources to research legal issues in
information security.
•Write clearly and concisely about
information security legal issues and
topics using proper writing mechanics and
technical style conventions.

Más contenido relacionado

Similar a Strayer cis 438 week 2 case study 1(20)

HIPAA and IT Audits.docxHIPAA and IT Audits.docx
HIPAA and IT Audits.docx
4934bk2 views

Último(20)

A Day At 07.45 Using A CodeA Day At 07.45 Using A Code
A Day At 07.45 Using A Code
Ashley Lott55 views
ANATOMY AND PHYSIOLOGY UNIT 1 { PART-1}ANATOMY AND PHYSIOLOGY UNIT 1 { PART-1}
ANATOMY AND PHYSIOLOGY UNIT 1 { PART-1}
DR .PALLAVI PATHANIA102 views
Streaming Quiz 2023.pdfStreaming Quiz 2023.pdf
Streaming Quiz 2023.pdf
Quiz Club NITW77 views
231112 (WR) v1  ChatGPT OEB 2023.pdf231112 (WR) v1  ChatGPT OEB 2023.pdf
231112 (WR) v1 ChatGPT OEB 2023.pdf
WilfredRubens.com67 views
Chemistry of sex hormones.pptxChemistry of sex hormones.pptx
Chemistry of sex hormones.pptx
RAJ K. MAURYA93 views
Lecture: Open InnovationLecture: Open Innovation
Lecture: Open Innovation
Michal Hron68 views
Scope of Biochemistry.pptxScope of Biochemistry.pptx
Scope of Biochemistry.pptx
shoba shoba104 views
discussion post.pdfdiscussion post.pdf
discussion post.pdf
jessemercerail57 views
ICS3211_lecture_week72023.pdfICS3211_lecture_week72023.pdf
ICS3211_lecture_week72023.pdf
Vanessa Camilleri175 views
Class 10 English  lesson plansClass 10 English  lesson plans
Class 10 English lesson plans
Tariq KHAN149 views
Universe revised.pdfUniverse revised.pdf
Universe revised.pdf
DrHafizKosar79 views
Narration  ppt.pptxNarration  ppt.pptx
Narration ppt.pptx
Tariq KHAN57 views
Narration lesson plan.docxNarration lesson plan.docx
Narration lesson plan.docx
Tariq KHAN84 views
STYP infopack.pdfSTYP infopack.pdf
STYP infopack.pdf
Fundacja Rozwoju Społeczeństwa Przedsiębiorczego125 views

Strayer cis 438 week 2 case study 1

  • 1. Strayer CIS 438 Week 2 Case Study 1: HIPAA, CIA, and Safeguards NEW To purchase this material click below link http://www.assignmentcloud.com/cis-438- strayer/cis-438-week-2-case-study-1-hipaa- cia-and-safeguards-new For more classes visit www.assignmentcloud.com CIS 438 Week 2 Case Study 1: HIPAA, CIA, and Safeguards Case Study 1: HIPAA, CIA, and Safeguards Due Week 2 and worth 120 points
  • 2. This assignment consists of two (2) sections: a written paper and a PowerPoint presentation. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. Health Information Technology (HIT) is a growing field within health services organizations today; additionally, health information security is a major concern among health organizations, as they are required to maintain the security and privacy of health information. The Department of Health and Human Services (HHS) provides extensive information about the Health Insurance Portability and Accountability Act (HIPAA). Visit the HHS Website, at www.hhs.gov/ocr/privacy, for more information about HIPAA
  • 3. requirements. In March 2012, the HHS settled a HIPAA case with the Blue Cross Blue Shield of Tennessee (BCBST) for $1.5 million. Read more about this case at www.hhs.gov/ocr/privacy/hipaa/enforce ment/examples/bcbstagrmnt.html. As an IT security manager at a regional health services organization, your CIO has asked for the following: an analysis of this incident, an overview of the HIPAA security requirements necessary to prevent this type of an incident, and a briefing for management on the minimum security requirements to be HIPAA complaint. Section1: Written Paper 1. Write a three to five (3-5) page paper in which you:
  • 4. a. Describe the security issues of BCBST in regard to confidentiality, integrity, availability, and privacy based on the information provided in the BCBST case. b. Describe the HIPPA security requirement that could have prevented each security issue identified if it had been enforced. c. Analyze the corrective actions taken by BCBST that were efficient and those that were not adequate. d. Analyze the security issues and the HIPAA security requirements and describe the safeguards that the organization needs to implement in order to mitigate the security risks. Ensure that you describe the safeguards in terms of administrative, technical, and physical safeguards. e. Use at least three (3) quality resources in this assignment. Note: Wikipedia and
  • 5. similar Websites do not qualify as quality resources. Your written paper must follow these formatting requirements: •Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; references must follow APA or school-specific format. Check with your professor for any additional instructions. •Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required page length. Section 2: PowerPoint Presentation 2. Create a six to eight (6-8) slide PowerPoint presentation in which you:
  • 6. a. Provide the following on the main body slides: i. An overview of the security issues at BCBST ii. HIPAA security requirements that could have prevented the incident iii. Positive and negative corrective actions taken by BCBST iv. Safeguards needed to mitigate the security risks Your PowerPoint presentation must follow these formatting requirements: •Include a title slide, four to six (4-6) main body slides, and a conclusion slide. The specific course learning outcomes associated with this assignment are:
  • 7. •Summarize the legal aspects of the information security triad: availability, integrity, and confidentiality. •Use technology and information resources to research legal issues in information security. •Write clearly and concisely about information security legal issues and topics using proper writing mechanics and technical style conventions.