• Home
  • Blog
  • CIST 1602 Health Care Information Systems Unauthorized Access Discussion

CIST 1602 Health Care Information Systems Unauthorized Access Discussion

0 comments

I’m working on a cyber security multi-part question and need an explanation and answer to help me learn.

You are a security professional for a large, private health care organization. Users have access to file and application servers, as well as data storage facilities that contain customer health information and personally identifiable information (PII). 

  1. Your manager asks you to write a report, detailing relevant user access policies. He needs you to research a generic template and use that as a starting point from which to move forward.
    1. Research existing policy templates and examples from organizations of a similar type.
    2. Based on your research, write a summary detailing at least three relevant user access policies. Include explanations for why you chose these policies.
    3. Provide citations for your sources.
  2. Your manager has been asked to provide the latest version of the organization’s incident response policy. To his knowledge, no policy exists. He has asked you to research and create an incident response policy.
    1. Look for at least two incident response policies for organizations of a similar type to your organization.
    2. Based on your research, create an initial draft of a high-level incident response policy for your organization. Consider Health Insurance Portability and Accountability Act (HIPAA) and other health care–related compliance requirements. Include justification of the content you included in the draft policy.

About the Author

Follow me


{"email":"Email address invalid","url":"Website address invalid","required":"Required field missing"}