Solved by verified expert:what is medical identify theft and how can prepare for it.
him6511_plan_b_assignment.pdf
Unformatted Attachment Preview
Department of Healthcare Informatics and Information Management
GRADUATE PROGRAM
HIM 6511 – Health Information Security Systems
Assignment 2: Training, Education, and Awareness
(Based upon the readings for Module 7)
30 Points
Background:
The CISSP Prep Guide states:
“Security awareness is often an overlooked element of security management,
because most of a security practitioner’s time is spent on controls, intrusion
detection, risk assessment, and proactively or reactively administering security.
It should not be that way, however. People are the weakest link in a security
chain because they are not trained or generally aware of what security is all
about.”
As subject matter experts, information security officers and privacy officials are
often tasked to develop the content to an organization’s security and privacy
training and awareness program. Also, periodic reminders are an implementation
specification within HIPAA’s Security Rule.
Assignment Requirements:
I. Identify a healthcare privacy and security-related problem and develop a 1
page problem statement.
II. Conduct a comprehensive literature search and write a literature review citing
sources in APA style (~10 pages).
III. Design a “solution” (which can be anything from an awareness campaign to a
software application implementation) that could be implemented within a
healthcare organization that would address the problem. Your final product
should include the following:
•
•
•
•
Problem statement (identifies problem and background information)
Literature review (summarizes the literature)
Project description (outlines the objectives of your solution)
Methodology (discusses the techniques or processes used in designing
your solution)
• Results (overview of the solution, how the solution addresses the
identified problem, limitations of the solution, challenges,
recommendations for success)
•
One of the end-products must be a privacy and/or security training and
awareness program that outlines the training approach (i.e. method of
delivery, evaluation, etc.), including a presentation that you, or
someone else at your organization, can use for training purposes. The
presentation should include instructor notes or talking points.
•
The end-product should also identify 3-5 measures that could be used
to evaluate the solution’s impact on privacy/security within the
organization, such as number of audits conducted, number of trainings
held, etc.
…
Purchase answer to see full
attachment
You will get a plagiarism-free paper and you can get an originality report upon request.
All the personal information is confidential and we have 100% safe payment methods. We also guarantee good grades
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more