Case Study

User Generated

ngynivwnl464

Writing

Description

Task 1:

Find an article that pertains to a security breach and write a 2 page summary explaining that article.

Task 2:

We look at case that has happened to the general public - Equifax data breach!!

Highlight at least three policies that you feel were violated in this case and address the policies that need to be in place to prevent those violations from occurring in the future. Make sure to include enough detail that it could be amended to an existing policy and clear enough that any/all employees know what the new policy addresses.

Part 1:

Write 2-3 paragraphs at the beginning of your paper explaining the three issues you want to address and why. Follow APA guidelines for paper format and make sure to check spelling/grammar prior to submitting.

Part 2:

Write your mini-security policy following the template in textbook addressing the three issues you identified.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running Head: CASE STUDY, TASKS

1

Case Study, Tasks
Name
Course
Tutor
Date

CASE STUDY, TASKS

2

TASK 1
It has been reported that the last decade has seen an increase in the number of security
breaches in the United States, with a special focus on the healthcare industry, which is said to
have incurred the highest costs as a result. This is on the basis of the assumption that other
industries have not yet disclosed detailed reports on the scope, as well as, as the characteristics
pertaining to the circumstances surrounding the breaches. Following the U.S. Department of
Health and Human Services’ online database evaluation, information on entities that have
experienced breaches, while operating under the Health Insurance Portability and Accountability
Act (HIPAA) is available. This is to say that even the government agencies are prone to
breaches, as much as the private companies are. Protected health information needs to remain
protected. This information is protected under the Health Information Technology for Economic
and Clinical Health Act of 2009. However, hackers still manage to gain access to this
information through disclosure, acquisition, access, or even use of the information. The
individuals that are affected by these breaches may be at great risk.
A number as big as 500 is quite significant when it comes to the number of people affected
by a breach. On this note, therefore, a report will need to be written. The report must be detailed,
and should, therefore, include information on external vendor involvement, the breach source
and type, the affected entity’s state and name, and the number of the records that have been
affected in the process. The reports are conducted on the online platform. According to reports
written between 2010 and 2013, 82.1% of all reports account for breaches involving 500 or more
affected people. Given the similar characteristics in some of the reports and the differences in
others, categorical grouping was done based on IT or hacking incidents, theft, disclosure or
access that is unauthorized, data disposal that is improper, and others. The media-enabling forms

CASE STUDY, TASKS

3

were either paper, electronic or others. Annual data comparison was conducted through linear
regression analysis and x2. The records taken into account in the study, between 2010 and 2013,
amounted to 949. A portion of the breaches, specificall...


Anonymous
Just the thing I needed, saved me a lot of time.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags