Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Security and Privacy Implications of the HITECH Act

-Idaho Falls Health System consists of four hospitals and six healthcare clinics that cover three rural counties. The CEO of the health system has joined forces with several of his peers to purchase the services of a local IT shop, Trustworthy Computing. Trustworthy Computing has been hired to provide health information exchange services that are part of the HITECH Act's meaningful use financial incentive program. Mary Miller, the owner of Trustworthy Computing, was thrilled to win the contract to provide secure health information exchange services and immediately set about hiring additional technical staff and equipment to prepare to engage in this work. Mary hired Roger Murphy, who recently completed an undergraduate certification program in information security, to manage the project. Roger is the nephew of the Idaho Fall Health System's CEO and was hired on the CEO's recommendation.

Roger immediately set about working with the internal IT staff to develop connectivity among the partners in the health exchange agreement. Three weeks into the project, the network manager of Health Right, one of the partners, discovered that a vulnerability in the Idaho Falls Health System network has resulted in a breach of patient information. The breach has impacted Health Right and all of the other partners in the health exchange agreement.

Use the study materials and engage in any additional research needed to fill in knowledge gaps. Write a 2-3 page paper that covers the following:

-Evaluate how the criteria related to security, privacy, and health information exchange that are covered in the HITECH Act come into play in this scenario.

-Analyze the components of this scenario to determine the liability for each of the partners engaged in this health information exchange agreement.

-Develop recommendations for how healthcare partners can mitigate the risk that may occur in meeting the meaningful use health information exchange criteria.

Assignment Requirements
- Written communication: Written communication is free of errors that detract from the overall message.
- APA formatting: Resources and citations are formatted according to APA (6th edition) style and formatting.
- Length of paper: 2-3 pages, excluding the references page.
- Font and font size: Times New Roman, 12 point.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M92406016
  • Price:- $30

Priced at Now at $30, Verified Solution

Have any Question?


Related Questions in Computer Engineering

You are the security manager for a mid-sized company 3000

You are the security manager for a mid-sized company (3,000 to 5,000 employees). Your company has determined that confidentiality (or privacy) and data integrity are the security services you must provide to your work fo ...

Need a use case diagram for a case studythe case studypaul

Need a use case diagram for a case study: The case study Paul is the Director of IT Services for a consulting firm Avant. The firm has been growing fast since it was launched in 2010. With over 100 employees and hundreds ...

Suppose you have a data file exampledat with two columns

Suppose you have a data file example.dat with two columns that contain bivariate data. Let's call these two variables X and Y. Write a MATLAB script (accompanied by explanations) that will use the data from the file to d ...

Question several social networks like facebook or linkedin

Question : Several social networks like Facebook or LinkedIn are able to accurately recommend people you may want to become friends with or connect to. Explain what graph algorithm is relevant for producing this kind of ...

Susans special sauces is a company that produces a variety

Susan's Special Sauces is a company that produces a variety of condiments, salad dressings and sauces. Susan, the company owner, wants to distribute her product overseas and recently purchased a building on the outskirts ...

Recall that the op-code and operand are represented in

Recall that the op-code and operand are represented in memory by HEX numbers (e.g., LDAA $3000 will show in memory as $B6, $30, and $00). Write a short program to use the commands LDAA and STAA to load and store a value ...

Question suppose direction is an integer angle between 0

Question : Suppose direction is an integer angle between 0 and 359 degrees. You turn by a given angle and update the direction as direction = (direction + turn) % 360; In which situation do you get the wrong result? How ...

Scenario you have been asked to develop a company policy on

Scenario: You have been asked to develop a company policy on what should be done in the event of a data breach, such as unauthorized access to your company's customer database. What sort of process would you use to devel ...

Can someone help me identify how intrustion detection

Can someone help me identify how Intrustion detection system and intrusion prevent system can help protect confidentiality, integrity and availability

Question suppose the distance between two ends of an

Question : Suppose the distance between two ends of an Ethernet LAN with a transmission rate of R bps is d meters. Can you derive a formula to find the minimum frame size, L, needed for an Ethernet packet? Using this for ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As