Read and Review Chapter 10 that is attached below Pay special attention to the topics relating to workforce security, information access management, security awareness and training, and security incident procedures. Based on these areas, define at least four different specific threats to our informa

    September 16, 2022

Read and Review Chapter 10 that is attached belowPay special attention to the topics relating to workforce security, information access management, security awareness and training, and security incident procedures.Based on these areas, define at least four different specific threats to our information security (beyond the example given), plus a way of managing or mitigating that threat and a plan for response in case the information does become breached by that threat type. Complete a table such as the following as part of your essay. The completed table needs to show the ability to apply the principles named in a real-life scenario. Your assignment should be at least three pages long. The first row has been completed as an example.Type of standard or threat Method to reduce threat Response plan if threat is encounteredAccess Establishment and modification: The facility considers how access to EPHI is established and modified. Each system user has a unique ID and password assigned by the institution. Passwords are not shared and must be changed every 90 days to prevent unauthorized access.Employees are trained in appropriate access and password usage. Employee shared their ID and password with fellow employee who forgot theirs:1. The relevant user?s ID and password are immediately disabled upon issue discovery. A new user ID will be established for that user.2. The staff member is disciplined and given official warning to never share passwords.3. System use and audit logs for that user are reviewed by IT and HIM manager.4. Repeated breach will result in employee dismissalChapter 10 Privacy and Security of Health RecordsLearning OutcomesAfter completing this chapter, you should be able to:? List HIPAA transactions and uniform identifiers? Understand HIPAA privacy and security concepts? Apply HIPAA privacy policy in a medical facility? Discuss HIPAA security requirements and safeguards? Follow security policy guidelines in a medical facility? Explain electronic signaturesUnderstanding HIPAAIn Chapter 11 we will discuss various ways the Internet is being used for healthcare, including various implementations of EHR on the Internet, Internet-based personal health records (PHR), and remote access. In Chapter 12 we will explore the relationship of the EHR data to the determination of codes required for medical billing. Before moving to those topics it is prudent to understand HIPAA. HIPAA is an acronym for the Health Insurance Portability and Accountability Act, passed by Congress in 1996.The HIPAA law was inte

Trust your assignments to an essay writing service with the fastest delivery time and fully original content.

Verified