Realtime Writers
  • Home
  • Writers
  • FAQ
  • Blog
  • My Account
  • Order Now
  • Menu Menu

A routine audit of an electronic health record (EHR) system

July 28, 2024/0 Comments/in Uncategorized /by Admin

Introduction _____________________________________

As an information security professional, you are responsible for ensuring preventive information security controls are in place. Such controls include implementing organizational and security policies, processes, and other forms of preventive security measures. Given the information in the scenario below, you have been asked to create employee policies for the company and ensure the policies comply with the minimum requirements of the national or international standards in these areas. These policies will be published to the entire organization in the employee handbook or the HR portal.

Scenario ________________________________________

During a routine audit of an electronic health record (EHR) system, a major healthcare provider discovered three undocumented accounts that appeared to have access to the entire clinical and financial health record within the system. Further investigation revealed that these accounts were accessing records around the clock via remote access to the healthcare system’s network. Three remote access accounts appeared to have been set up at least six months prior to the creation date of the first account in the EHR. Additionally, the accounts in the EHR were originally established as standard user accounts approximately two months ago and escalated to full access over the course of two weeks. System controls are verified to be in effect that limit access for each account to no more than 300 records per day. Over the course of the past two months it is estimated that more than 37,000 but no more than 50,000 records could have been accessed. Reports are being run to determine which patient accounts were accessed, but the reports will take more than two weeks to identify the record identification numbers and then take longer than 60 days to compile the usernames and addresses. An audit of other systems that contain sensitive information revealed no other unauthorized access. Audit files that would normally identify the creator of the accounts overwrite themselves after two weeks in the systems that provide remote access and the EHR. No one in senior management has any reason to suspect that it was an inside job, but based on the short duration for log retention, there is no way to eliminate that possibility either.

Requirements ________________________________________

Your submission must be your original work. No more than a combined total of 30% of the submission and no more than a 10% match to any one individual source can be directly quoted or closely paraphrased from sources, even if cited correctly. An originality report is provided when you submit your task that can be used as a guide. You must use the rubric to direct the creation of your submission because it provides detailed criteria that will be used to evaluate your work. Each requirement below may be evaluated by more than one rubric aspect. The rubric aspect titles may contain hyperlinks to relevant portions of the course. A. Describe three of the security faults in this scenario that caused a security breach. B. After researching the national and international standards, create three policy statements that apply to the entire organization, comply with a national or international standard, and might have prevented the security breaches identified in part A. 1. Justify how each organizational policy statement in part B complies with a specific nationally or internationally recognized standard (e.g., HIPAA, HiTech, PCI-DSS, ISO/IEC, NIST) and could plausibly be enforced at the company. Note: The policy statements should match the baseline requirements of the standards for organizational compliance. C. Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized. Rubric

Share this entry
  • Share on WhatsApp
  • Link to Instagram
https://realtimewriters.com/wp-content/uploads/2025/01/Realtime-Writers-Transparent_white-bg.png 0 0 Admin https://realtimewriters.com/wp-content/uploads/2025/01/Realtime-Writers-Transparent_white-bg.png Admin2024-07-28 12:49:532024-07-28 12:49:53A routine audit of an electronic health record (EHR) system
0 replies

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply Cancel reply

You must be logged in to post a comment.

Calculate the Price

Deadline
Type of paper
Academic level
Pages
Plagiarism report FREE
Unlimited revisions FREE
Unlimited sources FREE
Title pageFREE
FormattingFREE

$0.00

Secure Payment

IntaSend Secure Payments (PCI-DSS Compliant) Secured by IntaSend Payments

Writing Services

  • Essays
  • Research Papers
  • Assignments
  • Course Work
  • Thesis

We Accept

  • PayPal
  • Visa
  • Mastercard
  • Apple Pay
  • Google Pay

© 2025 Realtime Writers | All Rights Reserved

Chemistry Web research Promotional Methods of Healthcare System Scroll to top

This site uses cookies. By continuing to browse the site, you are agreeing to our use of cookies.

AcceptRejectSettings

Cookie and Privacy Settings



How we use cookies

We may request cookies to be set on your device. We use cookies to let us know when you visit our websites, how you interact with us, to enrich your user experience, and to customize your relationship with our website.

Click on the different category headings to find out more. You can also change some of your preferences. Note that blocking some types of cookies may impact your experience on our websites and the services we are able to offer.

Essential Website Cookies

These cookies are strictly necessary to provide you with services available through our website and to use some of its features.

Because these cookies are strictly necessary to deliver the website, refuseing them will have impact how our site functions. You always can block or delete cookies by changing your browser settings and force blocking all cookies on this website. But this will always prompt you to accept/refuse cookies when revisiting our site.

We fully respect if you want to refuse cookies but to avoid asking you again and again kindly allow us to store a cookie for that. You are free to opt out any time or opt in for other cookies to get a better experience. If you refuse cookies we will remove all set cookies in our domain.

We provide you with a list of stored cookies on your computer in our domain so you can check what we stored. Due to security reasons we are not able to show or modify cookies from other domains. You can check these in your browser security settings.

Other external services

We also use different external services like Google Webfonts, Google Maps, and external Video providers. Since these providers may collect personal data like your IP address we allow you to block them here. Please be aware that this might heavily reduce the functionality and appearance of our site. Changes will take effect once you reload the page.

Google Webfont Settings:

Google Map Settings:

Google reCaptcha Settings:

Vimeo and Youtube video embeds:

Privacy Policy

You can read about our cookies and privacy settings in detail on our Privacy Policy Page.

Privacy Policy
Accept Reject

WhatsApp