logo

Detecting and Closing Gateways of Security Breaches

   

Added on  2019-09-16

10 Pages2569 Words610 Views
 | 
 | 
 | 
HEALTH DATA BREACH RESPONSE PLAN
Detecting and Closing Gateways of Security Breaches_1

Executive Summary The following report is a proposed plan to be submitted to the CEO regarding the detection ofhealth data breach and neutralize the same. It has included the plan that has been formulated bythe Chief Privacy officer or CPO of the USA Managed Care Organization or USA MCO to dealwith any cyber security related threat in future. This has included the Identification of databreaches in health care organizations along with the steps to do the same. It has also discussedthe annual schedule to conduct training regarding data safety and different people that will beinvolved in it. It has also mentioned the contents of training and the resources to be used toachieve the same. This has been followed by the incorporation of Health Insurance Portabilityand Accountability Act in the proposed plan and the agenda that includes the incorporation of theresponsibilities that are to be held by every single person to stop health care data breach.
Detecting and Closing Gateways of Security Breaches_2

Table of ContentsIntroduction......................................................................................................................................4Identification of Data Breaches in a Healthcare organization.........................................................4Annual Schedule for Conducting Risk Analysis.............................................................................5Data security checklist for risk analysis..........................................................................................6Resources to be used to notify data breach......................................................................................7Incorporation of HIPAA standards in the proposed plan................................................................7Agenda for incorporating individual’s role.....................................................................................7Conclusion.......................................................................................................................................7Reference List..................................................................................................................................8
Detecting and Closing Gateways of Security Breaches_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents