Health Data Breach Response Plan Assignment

Added on - 16 Sep 2019

  • 10

    pages

  • 2530

    words

  • 32

    views

  • 0

    downloads

Showing pages 1 to 3 of 10 pages
HEALTH DATA BREACH RESPONSE PLAN
Executive SummaryThe following report is a proposed plan to be submitted to the CEO regarding the detection ofhealth data breach and neutralize the same. It has included the plan that has been formulated bythe Chief Privacy officer or CPO of the USA Managed Care Organization or USA MCO to dealwith any cyber security related threat in future. This has included the Identification of databreaches in health care organizations along with the steps to do the same. It has also discussedthe annual schedule to conduct training regarding data safety and different people that will beinvolved in it. It has also mentioned the contents of training and the resources to be used toachieve the same. This has been followed by the incorporation of Health Insurance Portabilityand Accountability Act in the proposed plan and the agenda that includes the incorporation of theresponsibilities that are to be held by every single person to stop health care data breach.
Table of ContentsIntroduction......................................................................................................................................4Identification of Data Breaches in a Healthcare organization.........................................................4Annual Schedule for Conducting Risk Analysis.............................................................................5Data security checklist for risk analysis..........................................................................................6Resources to be used to notify data breach......................................................................................7Incorporation of HIPAA standards in the proposed plan................................................................7Agenda for incorporating individual’s role.....................................................................................7Conclusion.......................................................................................................................................7Reference List..................................................................................................................................8
desklib-logo
You’re reading a preview
card-image

To View Complete Document

Become a Desklib Library Member.
Subscribe to our plans

Unlock This Document