Please follow directions given on uploaded document. Also, please include an introduction and conclusion for security proposal. Each security measure should have its own section. It needs to be very detailed. Executive Summary needs to get the attention of the person reading it. Also, it needs to include what is going to be the best selling points of the security proposal. Executive summary part should only be 1-2 pages.HT102
Winter, 2016
Case Study 5-44 Electronic Health Records Security Plan
Case Study 5-44 Electronic Health Records Security Plan
Student: ____________________________
Date: __________________
Subdomain: Data Security
Knowledge Clusters: Data security concepts (BL3); Data integrity concepts (BL4); Data
integrity and security processes and monitoring (BL3); System architecture and design
(BL3); Screen design (BL4), Data retrieval and maintenance (BL4)
Objectives: By the end of this course, students will be able to
● Discuss the elements of a data security program, including policies and procedures
and monitoring. (BL3)
● Identify the greatest threats to the security of health information and methods for
minimizing the threats to data security. (BL3)
● Identify the primary components of the security provisions of HIPAA and the HITECH
Act. (BL3)
Instructions: Given the scenario from Case Study 5-44, you must design a security
proposal along with an executive summary and a cover letter to the Chief Information
Officer (CIO). This proposal needs to address the issue of what security measures
should be taken by your facility to maintain confidentiality, data integrity and prevent loss
of data as they make the transition to an Electronic Health Record (EHR) system. This
is to be done using information from class lectures, research from reliable sources, and
readings from the textbooks.
Standards: Time: 90 minutes; Accuracy: 75%
Cover letter: appropriate format, no spelling/grammar/punctuation errors
Executive Summary: no spelling/grammar/punctuation errors
Proposed Security Measures: 6.5 points each
 Physical security of hardware
 Data Security
 Confidentiality
 Access
 Disaster Recovery
 Backups
 Business Continuity Planning
 Penalties for Violating Policies
 Appointment of Chief Security Officer
 Employee Training Methods
 Total for this part:
Total points
(Student MUST address all measures listed above to earn full credit)
Instructor: __________________________________
Date: _____________

Purchase answer to see full

Why Choose Us

  • 100% non-plagiarized Papers
  • 24/7 /365 Service Available
  • Affordable Prices
  • Any Paper, Urgency, and Subject
  • Will complete your papers in 6 hours
  • On-time Delivery
  • Money-back and Privacy guarantees
  • Unlimited Amendments upon request
  • Satisfaction guarantee

How it Works

  • Click on the “Place Order” tab at the top menu or “Order Now” icon at the bottom and a new page will appear with an order form to be filled.
  • Fill in your paper’s requirements in the "PAPER DETAILS" section.
  • Fill in your paper’s academic level, deadline, and the required number of pages from the drop-down menus.
  • Click “CREATE ACCOUNT & SIGN IN” to enter your registration details and get an account with us for record-keeping and then, click on “PROCEED TO CHECKOUT” at the bottom of the page.
  • From there, the payment sections will show, follow the guided payment process and your order will be available for our writing team to work on it.