NOTE: Instead of the Discussion Board question this
week, you will complete another assignment.
Assessment: 100%
Overview:
Health care organizations must strictly comply with the Health Insurance
Portability and Accountability Act (HIPAA) Privacy and Security rules that require
organizations to have proper security controls for handling personal information
referred to as “protected health information,” or PHI. This includes security
controls for the IT infrastructure handling PHI. List THREE risks, threats, and
vulnerabilities that can violate HIPAA privacy and security requirements?
What to submit for a grade?
1. Using MS Word, create a table like the one below. Change your page layout to landscape. Save the file with a good file name. Upload to the
course web site.
Health Insurance Portability and Accountability Act (HIPAA) Privacy and Security
Risks Threats Vulnerabilities Why
List a risk to
HIPPA.
List a threat that is
associated with the
risk to HIPPA.
List a
vulnerability
associated with
the threat.
Explain why this
vulnerability can
be a problem.
Your statements
should be clear
and to the point
for senior
management to
understand. Do
not assume
anything.
Repeat the
process
Repeat the process Repeat the process Repeat the process
Repeat the
process
Repeat the process Repeat the process Repeat the process