SlideShare a Scribd company logo
1 of 7
Straver CIS 438 Week 2 Case Study 1:
HIPAA. CIA, and Safeguards NEW
To purchase this material click below link
http://www.assignmentcloud.com/cis-438-
strayer/cis-438-week-2-case-study-1-hipaa-
cia-and-safeguards-new
For more classes visit
www.assignmentcloud.com
www.assignmentcloud.com/
CIS 438 Week 2 Case Study 1: HIPAA, CIA,
and Safeguards
Case Study 1: HIPAA, CIA, and Safeguards
Due Week 2 and worth 120 points
This assignment consists of two (2)
sections: a written paper and a
PowerPoint presentation. You must
submit both sections as separate files for
the completion of this assignment. Label
each file name according to the section of
the assignment it is written for.
Health Information Technology (HIT) is a
growing field within health services
organizations today; additionally, health
information security is a major concern
among health organizations, as they are
required to maintain the security and
privacy of health information. The
Department of Health and Human Services
(HHS) provides extensive information
about the Health Insurance Portability and
Accountability Act (HIPAA). Visit the HHS
Website, at www.hhs.gov/ocr/privacy, for
more information about HIPAA
requirements. In March 2012, the HHS
settled a HIPAA case with the Blue Cross
Blue Shield of Tennessee (BCBST) for $1.5
million. Read more about this case at
www.hhs.gov/ocr/privacy/hipaa/enforce
ment/examples/bcbstagrmnt.html. As an
IT security manager at a regional health
services organization, your CIO has asked
for the following: an analysis of this
incident, an overview of the HIPAA
briefing for management on the minimum
security requirements to be HIPAA
complaint.
Section1: Written Paper
1. Write a three to five (3-5) page paper in
which you:
a. Describe the security issues of BCBST in
regard to confidentiality, integrity,
availability, and privacy based on the
information provided in the BCBST case.
b. Describe the HIPPA security
requirement that could have prevented
each security issue identified if it had
been
enforced.
c. Analyze the corrective actions taken byBCBST that were efficient and those that
-^^wrieiiffcdiquate. i^<o
-co^/
d. Analyze the security issues and the
HIPAA security requirements and
describe the safeguards that the
organization needs to implement in order
to mitigate the security risks. Ensure that
you describe the safeguards in terms of
administrative, technical, and physical
safeguards.
e. Use at least three (3) quality
resources in this assignment. Note:
Wikipedia and
similar Websites do not qualify as quality
resources.
Your written paper must follow these
formatting requirements:
•Be typed, double spaced, using Times
New Roman font (size 12), with one-inch
margins on all sides; references must
follow APA or school-specific format.
Check with your professor for any
additional instructions.
ww^as^i^^iii^^iclo^^d.C
Qm/
•Include a cover page containing the title
of the assignment, the student's name, the
professor's name, the course title, and the
date. The cover page and the reference
page are not included in the required page
length.
Section 2: PowerPoint Presentation
2. Create a six to eight (6-8) slide
PowerPoint presentation in which you:
a. Provide the following on the main body
slides:
i. An overview of the security issues at
BCBST
ii. HIPAA security requirements that
could have prevented the incident
iii. Positive and negative corrective
actions taken by BCBST
iv. Safeguards needed to mitigate the
WWW.aSSisecurlty risks
Your PowerPoint presentation must
follow these formatting requirements:
•Include a title slide, four to six (4-6) main
body slides, and a conclusion slide.
The specific course learning outcomes
associated with this assignment are:
•Summarize the legal aspects of the
information security triad: availability,
integrity, and confidentiality.
•Use technology and information
resources to research legal issues in
information security.
•Write clearly and concisely about
information security legal issues and
topics using proper writing mechanics and
technical style conventions.
www.assiainmentcloua.com/

More Related Content

Similar to Strayer cis-438-week-2-case-study-1

Strayer cis-438-week-9-assignment-4
Strayer cis-438-week-9-assignment-4Strayer cis-438-week-9-assignment-4
Strayer cis-438-week-9-assignment-4infinityend3
 
Strayer cis-438-week-10-term-paper-security-regulation-compliance
Strayer cis-438-week-10-term-paper-security-regulation-complianceStrayer cis-438-week-10-term-paper-security-regulation-compliance
Strayer cis-438-week-10-term-paper-security-regulation-complianceinfinityend3
 
Assignment 2 critical infrastructure protection
Assignment 2 critical infrastructure protectionAssignment 2 critical infrastructure protection
Assignment 2 critical infrastructure protectioncoursesexams1
 
Strayer cis-438-week-6-case-study-2-data-breaches-and-regulatory-requirements...
Strayer cis-438-week-6-case-study-2-data-breaches-and-regulatory-requirements...Strayer cis-438-week-6-case-study-2-data-breaches-and-regulatory-requirements...
Strayer cis-438-week-6-case-study-2-data-breaches-and-regulatory-requirements...infinityend3
 
Strayer cis-542-week-6-assignment-2-electronic-h assignment-2
Strayer cis-542-week-6-assignment-2-electronic-h assignment-2Strayer cis-542-week-6-assignment-2-electronic-h assignment-2
Strayer cis-542-week-6-assignment-2-electronic-h assignment-2shyaminfo18
 
Cis 502 assignment 1 week 2 – strayer new
Cis 502 assignment 1 week 2 – strayer newCis 502 assignment 1 week 2 – strayer new
Cis 502 assignment 1 week 2 – strayer newLindaAdams2017
 
Cis 550-week-9-case-study-7
Cis 550-week-9-case-study-7Cis 550-week-9-case-study-7
Cis 550-week-9-case-study-7shyaminfo18
 
CSIA 360 CASE STUDY #3 IS THERE A CYBERSECURITY WORKFORCE CRISIS IN STATE GOV...
CSIA 360 CASE STUDY #3 IS THERE A CYBERSECURITY WORKFORCE CRISIS IN STATE GOV...CSIA 360 CASE STUDY #3 IS THERE A CYBERSECURITY WORKFORCE CRISIS IN STATE GOV...
CSIA 360 CASE STUDY #3 IS THERE A CYBERSECURITY WORKFORCE CRISIS IN STATE GOV...ViscolKanady
 
Strayer cis-438-week-4-assignment-2
Strayer cis-438-week-4-assignment-2Strayer cis-438-week-4-assignment-2
Strayer cis-438-week-4-assignment-2infinityend3
 

Similar to Strayer cis-438-week-2-case-study-1 (9)

Strayer cis-438-week-9-assignment-4
Strayer cis-438-week-9-assignment-4Strayer cis-438-week-9-assignment-4
Strayer cis-438-week-9-assignment-4
 
Strayer cis-438-week-10-term-paper-security-regulation-compliance
Strayer cis-438-week-10-term-paper-security-regulation-complianceStrayer cis-438-week-10-term-paper-security-regulation-compliance
Strayer cis-438-week-10-term-paper-security-regulation-compliance
 
Assignment 2 critical infrastructure protection
Assignment 2 critical infrastructure protectionAssignment 2 critical infrastructure protection
Assignment 2 critical infrastructure protection
 
Strayer cis-438-week-6-case-study-2-data-breaches-and-regulatory-requirements...
Strayer cis-438-week-6-case-study-2-data-breaches-and-regulatory-requirements...Strayer cis-438-week-6-case-study-2-data-breaches-and-regulatory-requirements...
Strayer cis-438-week-6-case-study-2-data-breaches-and-regulatory-requirements...
 
Strayer cis-542-week-6-assignment-2-electronic-h assignment-2
Strayer cis-542-week-6-assignment-2-electronic-h assignment-2Strayer cis-542-week-6-assignment-2-electronic-h assignment-2
Strayer cis-542-week-6-assignment-2-electronic-h assignment-2
 
Cis 502 assignment 1 week 2 – strayer new
Cis 502 assignment 1 week 2 – strayer newCis 502 assignment 1 week 2 – strayer new
Cis 502 assignment 1 week 2 – strayer new
 
Cis 550-week-9-case-study-7
Cis 550-week-9-case-study-7Cis 550-week-9-case-study-7
Cis 550-week-9-case-study-7
 
CSIA 360 CASE STUDY #3 IS THERE A CYBERSECURITY WORKFORCE CRISIS IN STATE GOV...
CSIA 360 CASE STUDY #3 IS THERE A CYBERSECURITY WORKFORCE CRISIS IN STATE GOV...CSIA 360 CASE STUDY #3 IS THERE A CYBERSECURITY WORKFORCE CRISIS IN STATE GOV...
CSIA 360 CASE STUDY #3 IS THERE A CYBERSECURITY WORKFORCE CRISIS IN STATE GOV...
 
Strayer cis-438-week-4-assignment-2
Strayer cis-438-week-4-assignment-2Strayer cis-438-week-4-assignment-2
Strayer cis-438-week-4-assignment-2
 

More from infinityend3

Strayer cis-505-week-3-assignment-2-requirements-for-the-corporate-computing-...
Strayer cis-505-week-3-assignment-2-requirements-for-the-corporate-computing-...Strayer cis-505-week-3-assignment-2-requirements-for-the-corporate-computing-...
Strayer cis-505-week-3-assignment-2-requirements-for-the-corporate-computing-...infinityend3
 
Strayer cis-505-week-2-assignment-1-standards-research
Strayer cis-505-week-2-assignment-1-standards-researchStrayer cis-505-week-2-assignment-1-standards-research
Strayer cis-505-week-2-assignment-1-standards-researchinfinityend3
 
Strayer cis-505-all-assignments
Strayer cis-505-all-assignmentsStrayer cis-505-all-assignments
Strayer cis-505-all-assignmentsinfinityend3
 
Strayer cis-499-week-5-project-deliverable-3-database-and-data-warehousing-de...
Strayer cis-499-week-5-project-deliverable-3-database-and-data-warehousing-de...Strayer cis-499-week-5-project-deliverable-3-database-and-data-warehousing-de...
Strayer cis-499-week-5-project-deliverable-3-database-and-data-warehousing-de...infinityend3
 
Strayer cis-499-week-2-project-deliverable-1
Strayer cis-499-week-2-project-deliverable-1Strayer cis-499-week-2-project-deliverable-1
Strayer cis-499-week-2-project-deliverable-1infinityend3
 
Strayer cis-498-week-2-project-deliverable-1-project-plan-inception-new
Strayer cis-498-week-2-project-deliverable-1-project-plan-inception-newStrayer cis-498-week-2-project-deliverable-1-project-plan-inception-new
Strayer cis-498-week-2-project-deliverable-1-project-plan-inception-newinfinityend3
 
Strayer cis-438-week-7-assignment-3-intellectual-property-laws-and-security-m...
Strayer cis-438-week-7-assignment-3-intellectual-property-laws-and-security-m...Strayer cis-438-week-7-assignment-3-intellectual-property-laws-and-security-m...
Strayer cis-438-week-7-assignment-3-intellectual-property-laws-and-security-m...infinityend3
 
Strayer cis-438-week-3-assignment-1-privacy
Strayer cis-438-week-3-assignment-1-privacyStrayer cis-438-week-3-assignment-1-privacy
Strayer cis-438-week-3-assignment-1-privacyinfinityend3
 
Strayer cis-417-week-10-term-paper-investigating-data-theft
Strayer cis-417-week-10-term-paper-investigating-data-theftStrayer cis-417-week-10-term-paper-investigating-data-theft
Strayer cis-417-week-10-term-paper-investigating-data-theftinfinityend3
 
Strayer cis-417-week-8-assignment-4-data
Strayer cis-417-week-8-assignment-4-dataStrayer cis-417-week-8-assignment-4-data
Strayer cis-417-week-8-assignment-4-datainfinityend3
 
Strayer cis-417-week-7-case-study-3
Strayer cis-417-week-7-case-study-3Strayer cis-417-week-7-case-study-3
Strayer cis-417-week-7-case-study-3infinityend3
 
Strayer cis-417-week-6-assignment-3-securing-the-scene-new
Strayer cis-417-week-6-assignment-3-securing-the-scene-newStrayer cis-417-week-6-assignment-3-securing-the-scene-new
Strayer cis-417-week-6-assignment-3-securing-the-scene-newinfinityend3
 
Strayer cis-417-week-4-assignment-2
Strayer cis-417-week-4-assignment-2Strayer cis-417-week-4-assignment-2
Strayer cis-417-week-4-assignment-2infinityend3
 
Strayer cis-417-week-3-case-study-1-btk-new
Strayer cis-417-week-3-case-study-1-btk-newStrayer cis-417-week-3-case-study-1-btk-new
Strayer cis-417-week-3-case-study-1-btk-newinfinityend3
 
Strayer cis-417-week-2-assignment-1
Strayer cis-417-week-2-assignment-1Strayer cis-417-week-2-assignment-1
Strayer cis-417-week-2-assignment-1infinityend3
 
Stayer cis-443-week-10-term-paper
Stayer cis-443-week-10-term-paperStayer cis-443-week-10-term-paper
Stayer cis-443-week-10-term-paperinfinityend3
 
Stayer cis-443-week-9-case-study-2
Stayer cis-443-week-9-case-study-2Stayer cis-443-week-9-case-study-2
Stayer cis-443-week-9-case-study-2infinityend3
 
Stayer cis-443-week-8-assignment-4
Stayer cis-443-week-8-assignment-4Stayer cis-443-week-8-assignment-4
Stayer cis-443-week-8-assignment-4infinityend3
 
Stayer cis-443-week-7-assignment-3
Stayer cis-443-week-7-assignment-3Stayer cis-443-week-7-assignment-3
Stayer cis-443-week-7-assignment-3infinityend3
 
Stayer cis-443-week-6-assignment-2
Stayer cis-443-week-6-assignment-2Stayer cis-443-week-6-assignment-2
Stayer cis-443-week-6-assignment-2infinityend3
 

More from infinityend3 (20)

Strayer cis-505-week-3-assignment-2-requirements-for-the-corporate-computing-...
Strayer cis-505-week-3-assignment-2-requirements-for-the-corporate-computing-...Strayer cis-505-week-3-assignment-2-requirements-for-the-corporate-computing-...
Strayer cis-505-week-3-assignment-2-requirements-for-the-corporate-computing-...
 
Strayer cis-505-week-2-assignment-1-standards-research
Strayer cis-505-week-2-assignment-1-standards-researchStrayer cis-505-week-2-assignment-1-standards-research
Strayer cis-505-week-2-assignment-1-standards-research
 
Strayer cis-505-all-assignments
Strayer cis-505-all-assignmentsStrayer cis-505-all-assignments
Strayer cis-505-all-assignments
 
Strayer cis-499-week-5-project-deliverable-3-database-and-data-warehousing-de...
Strayer cis-499-week-5-project-deliverable-3-database-and-data-warehousing-de...Strayer cis-499-week-5-project-deliverable-3-database-and-data-warehousing-de...
Strayer cis-499-week-5-project-deliverable-3-database-and-data-warehousing-de...
 
Strayer cis-499-week-2-project-deliverable-1
Strayer cis-499-week-2-project-deliverable-1Strayer cis-499-week-2-project-deliverable-1
Strayer cis-499-week-2-project-deliverable-1
 
Strayer cis-498-week-2-project-deliverable-1-project-plan-inception-new
Strayer cis-498-week-2-project-deliverable-1-project-plan-inception-newStrayer cis-498-week-2-project-deliverable-1-project-plan-inception-new
Strayer cis-498-week-2-project-deliverable-1-project-plan-inception-new
 
Strayer cis-438-week-7-assignment-3-intellectual-property-laws-and-security-m...
Strayer cis-438-week-7-assignment-3-intellectual-property-laws-and-security-m...Strayer cis-438-week-7-assignment-3-intellectual-property-laws-and-security-m...
Strayer cis-438-week-7-assignment-3-intellectual-property-laws-and-security-m...
 
Strayer cis-438-week-3-assignment-1-privacy
Strayer cis-438-week-3-assignment-1-privacyStrayer cis-438-week-3-assignment-1-privacy
Strayer cis-438-week-3-assignment-1-privacy
 
Strayer cis-417-week-10-term-paper-investigating-data-theft
Strayer cis-417-week-10-term-paper-investigating-data-theftStrayer cis-417-week-10-term-paper-investigating-data-theft
Strayer cis-417-week-10-term-paper-investigating-data-theft
 
Strayer cis-417-week-8-assignment-4-data
Strayer cis-417-week-8-assignment-4-dataStrayer cis-417-week-8-assignment-4-data
Strayer cis-417-week-8-assignment-4-data
 
Strayer cis-417-week-7-case-study-3
Strayer cis-417-week-7-case-study-3Strayer cis-417-week-7-case-study-3
Strayer cis-417-week-7-case-study-3
 
Strayer cis-417-week-6-assignment-3-securing-the-scene-new
Strayer cis-417-week-6-assignment-3-securing-the-scene-newStrayer cis-417-week-6-assignment-3-securing-the-scene-new
Strayer cis-417-week-6-assignment-3-securing-the-scene-new
 
Strayer cis-417-week-4-assignment-2
Strayer cis-417-week-4-assignment-2Strayer cis-417-week-4-assignment-2
Strayer cis-417-week-4-assignment-2
 
Strayer cis-417-week-3-case-study-1-btk-new
Strayer cis-417-week-3-case-study-1-btk-newStrayer cis-417-week-3-case-study-1-btk-new
Strayer cis-417-week-3-case-study-1-btk-new
 
Strayer cis-417-week-2-assignment-1
Strayer cis-417-week-2-assignment-1Strayer cis-417-week-2-assignment-1
Strayer cis-417-week-2-assignment-1
 
Stayer cis-443-week-10-term-paper
Stayer cis-443-week-10-term-paperStayer cis-443-week-10-term-paper
Stayer cis-443-week-10-term-paper
 
Stayer cis-443-week-9-case-study-2
Stayer cis-443-week-9-case-study-2Stayer cis-443-week-9-case-study-2
Stayer cis-443-week-9-case-study-2
 
Stayer cis-443-week-8-assignment-4
Stayer cis-443-week-8-assignment-4Stayer cis-443-week-8-assignment-4
Stayer cis-443-week-8-assignment-4
 
Stayer cis-443-week-7-assignment-3
Stayer cis-443-week-7-assignment-3Stayer cis-443-week-7-assignment-3
Stayer cis-443-week-7-assignment-3
 
Stayer cis-443-week-6-assignment-2
Stayer cis-443-week-6-assignment-2Stayer cis-443-week-6-assignment-2
Stayer cis-443-week-6-assignment-2
 

Recently uploaded

On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxPooja Bhuva
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxannathomasp01
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsSandeep D Chaudhary
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptxJoelynRubio1
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxPooja Bhuva
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
latest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answerslatest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answersdalebeck957
 
Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111GangaMaiya1
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsNbelano25
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 

Recently uploaded (20)

On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
latest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answerslatest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answers
 
Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 

Strayer cis-438-week-2-case-study-1

  • 1. Straver CIS 438 Week 2 Case Study 1: HIPAA. CIA, and Safeguards NEW To purchase this material click below link http://www.assignmentcloud.com/cis-438- strayer/cis-438-week-2-case-study-1-hipaa- cia-and-safeguards-new For more classes visit www.assignmentcloud.com www.assignmentcloud.com/ CIS 438 Week 2 Case Study 1: HIPAA, CIA, and Safeguards Case Study 1: HIPAA, CIA, and Safeguards Due Week 2 and worth 120 points
  • 2. This assignment consists of two (2) sections: a written paper and a PowerPoint presentation. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. Health Information Technology (HIT) is a growing field within health services organizations today; additionally, health information security is a major concern among health organizations, as they are required to maintain the security and privacy of health information. The Department of Health and Human Services (HHS) provides extensive information about the Health Insurance Portability and Accountability Act (HIPAA). Visit the HHS Website, at www.hhs.gov/ocr/privacy, for more information about HIPAA
  • 3. requirements. In March 2012, the HHS settled a HIPAA case with the Blue Cross Blue Shield of Tennessee (BCBST) for $1.5 million. Read more about this case at www.hhs.gov/ocr/privacy/hipaa/enforce ment/examples/bcbstagrmnt.html. As an IT security manager at a regional health services organization, your CIO has asked for the following: an analysis of this incident, an overview of the HIPAA briefing for management on the minimum security requirements to be HIPAA complaint. Section1: Written Paper 1. Write a three to five (3-5) page paper in which you:
  • 4. a. Describe the security issues of BCBST in regard to confidentiality, integrity, availability, and privacy based on the information provided in the BCBST case. b. Describe the HIPPA security requirement that could have prevented each security issue identified if it had been enforced. c. Analyze the corrective actions taken byBCBST that were efficient and those that -^^wrieiiffcdiquate. i^<o -co^/ d. Analyze the security issues and the HIPAA security requirements and describe the safeguards that the organization needs to implement in order to mitigate the security risks. Ensure that you describe the safeguards in terms of administrative, technical, and physical safeguards. e. Use at least three (3) quality resources in this assignment. Note: Wikipedia and
  • 5. similar Websites do not qualify as quality resources. Your written paper must follow these formatting requirements: •Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; references must follow APA or school-specific format. Check with your professor for any additional instructions. ww^as^i^^iii^^iclo^^d.C Qm/ •Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required page length. Section 2: PowerPoint Presentation 2. Create a six to eight (6-8) slide PowerPoint presentation in which you:
  • 6. a. Provide the following on the main body slides: i. An overview of the security issues at BCBST ii. HIPAA security requirements that could have prevented the incident iii. Positive and negative corrective actions taken by BCBST iv. Safeguards needed to mitigate the WWW.aSSisecurlty risks Your PowerPoint presentation must follow these formatting requirements: •Include a title slide, four to six (4-6) main body slides, and a conclusion slide. The specific course learning outcomes associated with this assignment are:
  • 7. •Summarize the legal aspects of the information security triad: availability, integrity, and confidentiality. •Use technology and information resources to research legal issues in information security. •Write clearly and concisely about information security legal issues and topics using proper writing mechanics and technical style conventions. www.assiainmentcloua.com/