Paper instructions:
Assume that you have been hired as a Chief Information Security Officer (CISO) by a local healthcare organization which has no health information privacy and security policy yet. Thus, your assignment is to formulate a health information privacy and security policy for the organization in accordance with the HIPAA and HITECH Privacy and Security Rules. Before the development of the privacy and security policy document, your supervisor advises you to review the HIPPA and HITECH Privacy and Security regulations the organization is required to comply with. In this assignment, address the following:
Outline of the specific policy you propose,
The consequences of noncompliance with the applicable laws, and
Measures to assure the correct application of Privacy and Security Rules. Make sure to consider all perspectives of the access controls.
Feel free to use graphics and/or diagrams in your submission for illustration or support your viewpoint.
Include a title page and reference page.
Use appropriate APA-formatting.
Use at least 2-3 credible sources of information as references and submitted by Tuesday mid-night. Specifically, you must cite 5-6 recent sources (5 years old or less), with at least 2-3 scholarly, credible academic (i.e. peer-reviewed) sources of information, as references.)
Assignment – Creating a H.I.T. Security Policy: PLEASE, SEE & USE THE DOCUMENT TITLED “DrAndohs _IFSM_305_WEEK#4_GUIDANCE_DOCUMENT_TEMPLATE” posted below under “WEEK 4 ACTIVITIES; Week 4 Assignment”.
Outline of the specific policy you propose,
The consequences of noncompliance with the applicable laws, and
Measures to assure the correct application of Privacy and Security Rules. Make sure to consider all perspectives of the access controls.
Feel free to use graphics and/or diagrams in your submission for illustration or support your viewpoint.
Include a title page and reference page.
Use appropriate APA-formatting.
Use at least 2-3 credible sources of information as references and submitted by Tuesday mid-night. Specifically, you must cite 5-6 recent sources (5 years old or less), with at least 2-3 scholarly, credible academic (i.e. peer-reviewed) sources of information, as references.)
Assignment – Creating a H.I.T. Security Policy: PLEASE, SEE & USE THE DOCUMENT TITLED “DrAndohs _IFSM_305_WEEK#4_GUIDANCE_DOCUMENT_TEMPLATE” posted below under “WEEK 4 ACTIVITIES; Week 4 Assignment”.
For a custom paper on the above topic or any other topic, place your order now! What Awaits you:
• High Quality custom-written papers
• 100% Privacy and Confidentiality
• Timely delivery guarantee