discussion #2

profilemarish1

Securing Health Care Information Systems"  Please respond to the following:

  • From the e-Activity, give your opinion as to whether or not the new procedures that the hospital implemented efficiently resolve the issues in this case. Next, suggest an additional procedure that the hospital could utilize in order to secure patient privacy regarding medical condition and treatment plan. Justify your response.
  • Identify the key threats (e.g., internal, external, intentional, and unintentional, etc.) to the security of health care information. Select the single most significant threat, and suggest one (1) way to minimize the threat that you have chosen. Provide a rationale to support your suggestion.
    • 8 years ago
    • 5
    Answer(1)

    Purchase the answer to view it

    blurred-text
    • attachment
      secure_health_care_information_system.docx