security proposal

timer Asked: Nov 10th, 2016

Question description

please follow task guide lines

HT102 Spring, 2016:Revised Case Study 5-44 Electronic Health Records Security Plan PLAZA COLLEGE Case Study 5-44 Electronic Health Records Security Plan Student: ____________________________ Date: __________________ Domain II: Information Protection: Access, Disclosure, Archival, Privacy and Security Subdomain II.B1: Data Privacy, Confidentiality & Security Competency: Apply confidentiality, privacy and security measures and policies and procedures for internal and external use and exchange to protect electronic health information (BL3); Curricular Considerations: Internal and external standards, regulations and initiatives (State and federal privacy and security laws); Patient verification (Medical identity theft), Data security concepts, processes and monitoring. Subdomain II.B2: Data Privacy, Confidentiality & Security Competency: Apply retention and destruction policies for health information (BL3); Curricular Consideration: E-Discovery; Data storage and retrieval. Subdomain II.B3: Data Privacy, Confidentiality & Security Competency: Apply system security policies according to departmental and organizational data/information standard (BL3) Curricular Consideration: Security processes and policies (data/information standards). TASKS: Given a scenario, design a security proposal, an executive summary and a cover letter to the Chief Information Officer (CIO), addressing issues of what security measures should be taken by your facility to maintain confidentiality, data integrity, prevention of loss of data and policies and procedures needed to be compliant with HIPAA and HITECH, as they transition to an Electronic Health Record, HER, system. This proposal must also include information on necessary retention and destruction policies needed on health information. Objectives: ● Discuss the elements of a data security program, including policies and procedures and monitoring (BL3) ● Identify the greatest threats to the security of health information and methods for minimizing the threats to data security (BL3) ● Identify the primary components of the security provisions of HIPAA and the HITECH Act (BL3) Standards: Time: 90 minutes; Accuracy: 70% Tasks Points Cover letter: appropriate format, no spelling/grammar/punctuation errors ____/10 Executive Summary: no spelling/grammar/punctuation errors ____/10 Proposed Security Measures: 5.0 points each  Physical security of hardware  Data Security  Confidentiality 1 HT102 Spring, 2016:Revised Case Study 5-44 Electronic Health Records Security Plan         Access Disaster Recovery Backups Business Continuity Planning Penalties for Violating Policies Appointment of Chief Security Officer Employee Training Methods Total for this part: ____/50 Identify Requirements of HIPAA/HITECH for Compliance ___/15 Policies and procedures: Retention and Destruction ___/15 Total points ____/100 Instructor: __________________________________ 2 Date: _____________

Tutor Answer

(Top Tutor) Studypool Tutor
School: Boston College
Studypool has helped 1,244,100 students
flag Report DMCA
Similar Questions
Hot Questions
Related Tags
Study Guides

Brown University

1271 Tutors

California Institute of Technology

2131 Tutors

Carnegie Mellon University

982 Tutors

Columbia University

1256 Tutors

Dartmouth University

2113 Tutors

Emory University

2279 Tutors

Harvard University

599 Tutors

Massachusetts Institute of Technology

2319 Tutors

New York University

1645 Tutors

Notre Dam University

1911 Tutors

Oklahoma University

2122 Tutors

Pennsylvania State University

932 Tutors

Princeton University

1211 Tutors

Stanford University

983 Tutors

University of California

1282 Tutors

Oxford University

123 Tutors

Yale University

2325 Tutors