Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

Security and Privacy Implications of the HITECH Act

Idaho Falls Health System consists of four hospitals and six healthcare clinics that cover three rural counties. The CEO of the health system has joined forces with several of his peers to purchase the services of a local IT shop, Trustworthy Computing.

Trustworthy Computing has been hired to provide health information exchange services that are part of the HITECH Act's meaningful use financial incentive program.

Mary Miller, the owner of Trustworthy Computing, was thrilled to win the contract to provide secure health information exchange services and immediately set about hiring additional technical staff and equipment to prepare to engage in this work.

Mary hired Roger Murphy, who recently completed an undergraduate certification program in information security, to manage the project. Roger is the nephew of the Idaho Fall Health System's CEO and was hired on the CEO's recommendation.

Roger immediately set about working with the internal IT staff to develop connectivity among the partners in the health exchange agreement.

Three weeks into the project, the network manager of Health Right, one of the partners, discovered that a vulnerability in the Idaho Falls Health System network has resulted in a breach of patient information. The breach has impacted Health Right and all of the other partners in the health exchange agreement.

Use the study materials and engage in any additional research needed to fill in knowledge gaps. Write a 2-3 page paper that covers the following:

Evaluate how the criteria related to security, privacy, and health information exchange that are covered in the HITECH Act come into play in this scenario.

Analyze the components of this scenario to determine the liability for each of the partners engaged in this health information exchange agreement.

Develop recommendations for how healthcare partners can mitigate the risk that may occur in meeting the meaningful use health information exchange criteria.

Assignment Requirements

Written communication: Written communication is free of errors that detract from the overall message.

APA formatting: Resources and citations are formatted according to APA (6th edition) style and formatting.

Length of paper: 2-3 pages, excluding the references page.

Font and font size: Times New Roman, 12 point.

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M93076418

Have any Question?


Related Questions in Management Information System

With respect to tm4c123 arm cortex m4 processor1 how many

With respect to TM4C123 ARM Cortex M4 Processor 1) How many machine cycles are required to process first line of ISR after an interrupt occurs? What are the other benefits of NVIC to process interrupt more efficiently? 2 ...

Discussion read new trends in cybersecurity by chang from

Discussion : Read "New Trends in Cybersecurity," by Chang, from IT Professional (2013). Review "NIST Cybersecurity Framework Aims to Improve Critical Infrastructure," by Mustard, from Power (2014). Compare and contrast t ...

Answer the following questions in not less than 150 words

Answer the following questions in not less than 150 words each. Make sure the document is APA formatted. Minimum two (2) sources - at least one (1) from a peer reviewed journal. 1. Describe the strategies and tactics a n ...

Assignmentif you have not done so already please review the

Assignment If you have not done so already, please review the Module Overview, read the required readings, and watch the lectures/presentations. These are three short essay questions. Answers can be found in the text. (D ...

Question write a 1- to 2-page paper on cloud computing

Question : Write a 1- to 2-page paper on cloud computing services, paying particular attention to cloud storage, security, and application services. Begin with a brief history of cloud computing, and relate your paper to ...

Read assess the risk by zurier from sc magazine for it

Read "Assess the Risk," by Zurier, from SC Magazine: For IT Security Professionals (2015). The first step in the creation of an effective risk-management system is understanding the types of risks an organization may fac ...

Software engineeringsuppose you are writing software for a

Software Engineering: Suppose you are writing software for a radio station that manages its playlists. The program will generate candidate playlists from a record library automatically and station personnel can then chec ...

Question social engineering techniques are often used to

Question : Social Engineering techniques are often used to trick users into giving out important information. List two of the recommendations from the OER readings for avoiding social engineering attacks and briefly desc ...

Background kirk 2016 designed his text to help understand

Background: Kirk (2016) designed his text to help understand the four steps involved in working with data. Kirk (2016) discusses the following working with data steps: Data acquisition, data examination, data transformat ...

Instructionsin this final assignment you will develop a

Instructions In this final assignment, you will develop a paper that reviews some of the main topics covered in the course. Compose an essay to address the elements listed below. Identify the components of an information ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As