SlideShare a Scribd company logo
1 of 3
Assignment Content
Your company is a security service contractor that consults with
businesses in the U.S. that require assistance in complying with
HIPAA. You advertise a proven track record in providing
information program security management, information security
governance programs, risk management programs, and
regulatory and compliance recommendations. You identify
vulnerabilities, threats, and risks for clients with the end goal of
securing and protecting applications and systems within their
organization.
Your client is Health Coverage Associates, a health insurance
exchange in California and a healthcare covered entity. The
Patient Protection and Affordable Care Act (ACA) enables
individuals and small businesses to purchase health insurance at
federally subsidized rates. In the past 6 months, they have
experienced:
A malware attack (i.e., SQL Injection) on a critical software
application that processed and stored client protected health
information (PHI) that allowed access to PHI stored within the
database
An internal mistake by an employee that allowed PHI to be
emailed to the wrong recipient who was not authorized to have
access to the PHI
An unauthorized access to client accounts through cracking of
weak passwords via the company’s website login
Health Coverage Associates would like you to
develop
a security management plan that would address the required
safeguards to protect the confidentiality, integrity, and
availability of sensitive data from the attacks listed above and
protect their assets from the vulnerabilities that allowed the
attacks to occur.
Write
a 1- to 2-page high-level executive summary of the legal and
regulatory compliance requirements for Health Coverage
Associates executives. The summary should provide
Accurate information on the HIPAA requirements for securing
PHI
FISMA and HIPAA requirements for a security plan
Scope of the work you will perform to meet the Health
Coverage Associates’ requests
Compile
a 1-to 2-page list of at least 10 of the CIS controls that provide
key alignment with the administrative (policies), physical
(secured facilities), and technical safeguards required under
HIPAA to protect against the attacks listed above. Include
corresponding NIST controls mapped to the selected CIS
controls.
Write
a 1- to 2-page concise outline of the contents of the security
management plan. Include
Policies Health Coverage Associates will need to manage,
protect, and provide access to PHI
The recommended risk management framework Health Coverage
Associates should adopt
Key elements Health Coverage Associates should include in its
plan of actions and milestones
Cite
all sources using APA guidelines.

More Related Content

Similar to Assignment ContentYour company is a security service contr.docx

Overview Imagine you are the information security officer at a.docx
Overview Imagine you are the information security officer at a.docxOverview Imagine you are the information security officer at a.docx
Overview Imagine you are the information security officer at a.docx
sdfghj21
 
Organization and Management of a Health Care Facility.docx
Organization and Management of a Health Care Facility.docxOrganization and Management of a Health Care Facility.docx
Organization and Management of a Health Care Facility.docx
stirlingvwriters
 
Technology Assessment and Government Regulations You are the.docx
Technology Assessment and Government Regulations You are the.docxTechnology Assessment and Government Regulations You are the.docx
Technology Assessment and Government Regulations You are the.docx
rudybinks
 

Similar to Assignment ContentYour company is a security service contr.docx (20)

HIPAA Compliance Testing In Software Applications.pdf
HIPAA Compliance Testing In Software Applications.pdfHIPAA Compliance Testing In Software Applications.pdf
HIPAA Compliance Testing In Software Applications.pdf
 
Mbm Hipaa Hitech Ss Compliance Risk Assessment
Mbm Hipaa Hitech Ss Compliance Risk AssessmentMbm Hipaa Hitech Ss Compliance Risk Assessment
Mbm Hipaa Hitech Ss Compliance Risk Assessment
 
Understanding the Importance of HIPAA Compliance in Medical Billing Software.pdf
Understanding the Importance of HIPAA Compliance in Medical Billing Software.pdfUnderstanding the Importance of HIPAA Compliance in Medical Billing Software.pdf
Understanding the Importance of HIPAA Compliance in Medical Billing Software.pdf
 
HIPAA-Compliant App Development Guide for the Healthcare Industry.pdf
HIPAA-Compliant App Development Guide for the Healthcare Industry.pdfHIPAA-Compliant App Development Guide for the Healthcare Industry.pdf
HIPAA-Compliant App Development Guide for the Healthcare Industry.pdf
 
Understanding HIPAA
Understanding HIPAAUnderstanding HIPAA
Understanding HIPAA
 
how to really implement hipaa presentation
how to really implement hipaa presentationhow to really implement hipaa presentation
how to really implement hipaa presentation
 
HIPAA Security Risk Assessment
HIPAA Security Risk Assessment HIPAA Security Risk Assessment
HIPAA Security Risk Assessment
 
The Importance of HIPAA Compliance in Digital Healthcare Solutions.pptx
The Importance of HIPAA Compliance in Digital Healthcare Solutions.pptxThe Importance of HIPAA Compliance in Digital Healthcare Solutions.pptx
The Importance of HIPAA Compliance in Digital Healthcare Solutions.pptx
 
Healthcare Compliance: HIPAA and HITRUST
Healthcare Compliance: HIPAA and HITRUSTHealthcare Compliance: HIPAA and HITRUST
Healthcare Compliance: HIPAA and HITRUST
 
A brief introduction to hipaa compliance
A brief introduction to hipaa complianceA brief introduction to hipaa compliance
A brief introduction to hipaa compliance
 
Health care compliance webinar may 10 2017
Health care compliance webinar may 10 2017Health care compliance webinar may 10 2017
Health care compliance webinar may 10 2017
 
Simple Steps to HIPAA Compliance
Simple Steps to HIPAA ComplianceSimple Steps to HIPAA Compliance
Simple Steps to HIPAA Compliance
 
Keeping Your Business HIPAA-Compliant
Keeping Your Business HIPAA-CompliantKeeping Your Business HIPAA-Compliant
Keeping Your Business HIPAA-Compliant
 
Overview Imagine you are the information security officer at a.docx
Overview Imagine you are the information security officer at a.docxOverview Imagine you are the information security officer at a.docx
Overview Imagine you are the information security officer at a.docx
 
Organization and Management of a Health Care Facility.docx
Organization and Management of a Health Care Facility.docxOrganization and Management of a Health Care Facility.docx
Organization and Management of a Health Care Facility.docx
 
HealthCare Compliance - HIPAA and HITRUST
HealthCare Compliance - HIPAA and HITRUSTHealthCare Compliance - HIPAA and HITRUST
HealthCare Compliance - HIPAA and HITRUST
 
The Importance of HIPAA Compliance in ensuring the Privacy and Security of PHI!
The Importance of HIPAA Compliance in ensuring the Privacy and Security of PHI!The Importance of HIPAA Compliance in ensuring the Privacy and Security of PHI!
The Importance of HIPAA Compliance in ensuring the Privacy and Security of PHI!
 
HIPAA-Compliant Healthcare App.pdf
HIPAA-Compliant Healthcare App.pdfHIPAA-Compliant Healthcare App.pdf
HIPAA-Compliant Healthcare App.pdf
 
Technology Assessment and Government Regulations You are the.docx
Technology Assessment and Government Regulations You are the.docxTechnology Assessment and Government Regulations You are the.docx
Technology Assessment and Government Regulations You are the.docx
 
Demystifying HIPAA Certification: Your Path to Compliance
Demystifying HIPAA Certification: Your Path to ComplianceDemystifying HIPAA Certification: Your Path to Compliance
Demystifying HIPAA Certification: Your Path to Compliance
 

More from lesleyryder69361

Assignment Details A 12-year-old boy was caught in the act of sexual.docx
Assignment Details A 12-year-old boy was caught in the act of sexual.docxAssignment Details A 12-year-old boy was caught in the act of sexual.docx
Assignment Details A 12-year-old boy was caught in the act of sexual.docx
lesleyryder69361
 
Assignment detailed instructions Write a three-page (minimum of 7.docx
Assignment detailed instructions Write a three-page (minimum of 7.docxAssignment detailed instructions Write a three-page (minimum of 7.docx
Assignment detailed instructions Write a three-page (minimum of 7.docx
lesleyryder69361
 
Assignment detailed instructions Write a three-page (minimum of 750.docx
Assignment detailed instructions Write a three-page (minimum of 750.docxAssignment detailed instructions Write a three-page (minimum of 750.docx
Assignment detailed instructions Write a three-page (minimum of 750.docx
lesleyryder69361
 
Assignment DescriptionYou are the lead human–computer intera.docx
Assignment DescriptionYou are the lead human–computer intera.docxAssignment DescriptionYou are the lead human–computer intera.docx
Assignment DescriptionYou are the lead human–computer intera.docx
lesleyryder69361
 
Assignment DescriptionManagement is worried, after consultin.docx
Assignment DescriptionManagement is worried, after consultin.docxAssignment DescriptionManagement is worried, after consultin.docx
Assignment DescriptionManagement is worried, after consultin.docx
lesleyryder69361
 
Assignment description from the syllabusEach member of the matc.docx
Assignment description from the syllabusEach member of the matc.docxAssignment description from the syllabusEach member of the matc.docx
Assignment description from the syllabusEach member of the matc.docx
lesleyryder69361
 

More from lesleyryder69361 (20)

Assignment details written in the attachmentsYou need to choose an.docx
Assignment details written in the attachmentsYou need to choose an.docxAssignment details written in the attachmentsYou need to choose an.docx
Assignment details written in the attachmentsYou need to choose an.docx
 
Assignment Details A high school girl has been caught shoplifting at.docx
Assignment Details A high school girl has been caught shoplifting at.docxAssignment Details A high school girl has been caught shoplifting at.docx
Assignment Details A high school girl has been caught shoplifting at.docx
 
Assignment Details A 12-year-old boy was caught in the act of sexual.docx
Assignment Details A 12-year-old boy was caught in the act of sexual.docxAssignment Details A 12-year-old boy was caught in the act of sexual.docx
Assignment Details A 12-year-old boy was caught in the act of sexual.docx
 
Assignment Details (350 WORDS)The last quarter of the 20th c.docx
Assignment Details (350 WORDS)The last quarter of the 20th c.docxAssignment Details (350 WORDS)The last quarter of the 20th c.docx
Assignment Details (350 WORDS)The last quarter of the 20th c.docx
 
Assignment Details (300 words and references)Collaborati.docx
Assignment Details (300 words and references)Collaborati.docxAssignment Details (300 words and references)Collaborati.docx
Assignment Details (300 words and references)Collaborati.docx
 
Assignment Details (2-3 pages) Research information about cu.docx
Assignment Details (2-3 pages) Research information about cu.docxAssignment Details (2-3 pages) Research information about cu.docx
Assignment Details (2-3 pages) Research information about cu.docx
 
Assignment Details (250 - 300 words)Now that the research .docx
Assignment Details (250 - 300 words)Now that the research .docxAssignment Details (250 - 300 words)Now that the research .docx
Assignment Details (250 - 300 words)Now that the research .docx
 
Assignment detailed instructions Write a three-page (minimum of 7.docx
Assignment detailed instructions Write a three-page (minimum of 7.docxAssignment detailed instructions Write a three-page (minimum of 7.docx
Assignment detailed instructions Write a three-page (minimum of 7.docx
 
Assignment detailed instructions Write a three-page (minimum of 750.docx
Assignment detailed instructions Write a three-page (minimum of 750.docxAssignment detailed instructions Write a three-page (minimum of 750.docx
Assignment detailed instructions Write a three-page (minimum of 750.docx
 
Assignment Description 400 wordsOne of the more important me.docx
Assignment Description 400 wordsOne of the more important me.docxAssignment Description 400 wordsOne of the more important me.docx
Assignment Description 400 wordsOne of the more important me.docx
 
Assignment DescriptionYou work for a small community hospita.docx
Assignment DescriptionYou work for a small community hospita.docxAssignment DescriptionYou work for a small community hospita.docx
Assignment DescriptionYou work for a small community hospita.docx
 
Assignment description The tourism industry represents about .docx
Assignment description The tourism industry represents about .docxAssignment description The tourism industry represents about .docx
Assignment description The tourism industry represents about .docx
 
Assignment DescriptionYou will prepare and deliver a speech .docx
Assignment DescriptionYou will prepare and deliver a speech .docxAssignment DescriptionYou will prepare and deliver a speech .docx
Assignment DescriptionYou will prepare and deliver a speech .docx
 
Assignment DescriptionYou are to write an essay in which you .docx
Assignment DescriptionYou are to write an essay in which you .docxAssignment DescriptionYou are to write an essay in which you .docx
Assignment DescriptionYou are to write an essay in which you .docx
 
Assignment DescriptionYou are the lead human–computer intera.docx
Assignment DescriptionYou are the lead human–computer intera.docxAssignment DescriptionYou are the lead human–computer intera.docx
Assignment DescriptionYou are the lead human–computer intera.docx
 
Assignment DescriptionYou are now ready to start representin.docx
Assignment DescriptionYou are now ready to start representin.docxAssignment DescriptionYou are now ready to start representin.docx
Assignment DescriptionYou are now ready to start representin.docx
 
Assignment DescriptionManagement is worried, after consultin.docx
Assignment DescriptionManagement is worried, after consultin.docxAssignment DescriptionManagement is worried, after consultin.docx
Assignment DescriptionManagement is worried, after consultin.docx
 
Assignment DescriptionEgo Integrity PresentationImagine .docx
Assignment DescriptionEgo Integrity PresentationImagine .docxAssignment DescriptionEgo Integrity PresentationImagine .docx
Assignment DescriptionEgo Integrity PresentationImagine .docx
 
Assignment DescriptionCultural Group Exploration Assignment .docx
Assignment DescriptionCultural Group Exploration Assignment .docxAssignment DescriptionCultural Group Exploration Assignment .docx
Assignment DescriptionCultural Group Exploration Assignment .docx
 
Assignment description from the syllabusEach member of the matc.docx
Assignment description from the syllabusEach member of the matc.docxAssignment description from the syllabusEach member of the matc.docx
Assignment description from the syllabusEach member of the matc.docx
 

Recently uploaded

Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Recently uploaded (20)

Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learning
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
latest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answerslatest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answers
 

Assignment ContentYour company is a security service contr.docx

  • 1. Assignment Content Your company is a security service contractor that consults with businesses in the U.S. that require assistance in complying with HIPAA. You advertise a proven track record in providing information program security management, information security governance programs, risk management programs, and regulatory and compliance recommendations. You identify vulnerabilities, threats, and risks for clients with the end goal of securing and protecting applications and systems within their organization. Your client is Health Coverage Associates, a health insurance exchange in California and a healthcare covered entity. The Patient Protection and Affordable Care Act (ACA) enables individuals and small businesses to purchase health insurance at federally subsidized rates. In the past 6 months, they have experienced: A malware attack (i.e., SQL Injection) on a critical software application that processed and stored client protected health information (PHI) that allowed access to PHI stored within the database An internal mistake by an employee that allowed PHI to be emailed to the wrong recipient who was not authorized to have access to the PHI An unauthorized access to client accounts through cracking of
  • 2. weak passwords via the company’s website login Health Coverage Associates would like you to develop a security management plan that would address the required safeguards to protect the confidentiality, integrity, and availability of sensitive data from the attacks listed above and protect their assets from the vulnerabilities that allowed the attacks to occur. Write a 1- to 2-page high-level executive summary of the legal and regulatory compliance requirements for Health Coverage Associates executives. The summary should provide Accurate information on the HIPAA requirements for securing PHI FISMA and HIPAA requirements for a security plan Scope of the work you will perform to meet the Health Coverage Associates’ requests Compile a 1-to 2-page list of at least 10 of the CIS controls that provide key alignment with the administrative (policies), physical (secured facilities), and technical safeguards required under HIPAA to protect against the attacks listed above. Include corresponding NIST controls mapped to the selected CIS controls. Write
  • 3. a 1- to 2-page concise outline of the contents of the security management plan. Include Policies Health Coverage Associates will need to manage, protect, and provide access to PHI The recommended risk management framework Health Coverage Associates should adopt Key elements Health Coverage Associates should include in its plan of actions and milestones Cite all sources using APA guidelines.