biology question and need guidance to help me learn.
Scenario:
Consider yourself in the role of a consultant in the area of health information technology security and privacy. You have been hired to assess the information security of a 200 bed hospital that has recently implemented a comprehensive electronic health record system and is also participating in a state-wide health information exchange. You may make up any details needed to complete the deliverables as long as they are believable. You will create a checksheet or checklist and any other needed documents to perform a review to determine the risk of the system security. Once you have compiled your information, you will develop a PowerPoint that could be presented to administrative representatives of the hospital detailing results of assessment (fictional but believable), and your recommendations. You will also develop a security awareness presentation to be given to members of the workforce and a sample security plan.
Deliverables:
– Detailed checksheet or checklist and any other documents needed for a risk assessment of system security.
– PowerPoint presentation that could be given to administrative representatives of the hospital detailing results of assessment (fictional but believable), and recommendations.
– Security awareness presentation to be given to members of the workforce.This may also be in a PowerPoint presentation – if you combine presentations, make sure you separate the two presentations.
– Sample security plan.
– List of relevant resources (10-15), to include citation (APA) or hyperlink along with a brief explanation of information included in the resource. Include an APA-style cover page.
Remember, you are leaders and professionals, and your work product must demonstrate your professionalism. Do not submit a product that would not represent you in the best light possible.
All of your deliverables should be in one PDF file.
Resources for Project:
ONC’s Privacy and Security Site: http://www.healthit.gov/providers-professionals/ehr-privacy-security/resources
HIMSS Privacy and Security: https://www.himss.org/sites/hde/files/d7/HIMSSorg/Content/files/PrivacySecurity/CS04_Cloud_Security_Top10_Intro.pdf
HIMSS Cybersecurity and Privacy: https://www.himss.org/resources/cybersecurity-healthcare
NCSAM Toolkit: https://www.cisa.gov/sites/default/files/publications/CAM22_PublicToolkit_FINAL_OCC_CSD_DIR_508c.pdf
NIST Health IT Portal: http://www.nist.gov/health-it-portal.cfm
CDC select agents compliance guidance: Security_Plan_Guidance.pdf
Requirements: 10
We are a professional custom writing website. If you have searched a question and bumped into our website just know you are in the right place to get help in your coursework.
Yes. We have posted over our previous orders to display our experience. Since we have done this question before, we can also do it for you. To make sure we do it perfectly, please fill our Order Form. Filling the order form correctly will assist our team in referencing, specifications and future communication.
1. Click on the “Place order tab at the top menu or “Order Now” icon at the bottom and a new page will appear with an order form to be filled.
2. Fill in your paper’s requirements in the "PAPER INFORMATION" section and click “PRICE CALCULATION” at the bottom to calculate your order price.
3. Fill in your paper’s academic level, deadline and the required number of pages from the drop-down menus.
4. Click “FINAL STEP” to enter your registration details and get an account with us for record keeping and then, click on “PROCEED TO CHECKOUT” at the bottom of the page.
5. From there, the payment sections will show, follow the guided payment process and your order will be available for our writing team to work on it.
Need this assignment or any other paper?
Click here and claim 25% off
Discount code SAVE25