StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

HHS Cybersecurity Recommendation - Essay Example

Cite this document
Summary
This paper 'HHS Cybersecurity Recommendation' tells us that as a faithful representative of the Department of Health and Human Services (HHS) senior management and a cybersecurity project manager, I have located key areas in regards to security that needs to be addressed with immediate effect.  …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.9% of users find it useful

Extract of sample "HHS Cybersecurity Recommendation"

  1. We suggest that HHS must improve the method of enforcing privacy and security laws. To achieve this objective the secretary of HHS must assign security rule enforcement to the office for civil rights.
  2. As a result of a change in privacy and security laws the HHS was expected to publish the new information on the minimum vital rules by the year 2010 in August (Ghosh & Turrini, 2010). We propose that the HHS should design a model on how the intended audience should know about any change in minimum necessary rules on time through mass media tools.
  3. The HITECH Act change lead to the elimination of duplicate rule enforcement.  Before the office for civil rights enforced the privacy and security rules, the Medicare and Medicaid services enforced them and they are part of the HHS. We recommend that the HHS should come up with a single office to enforce both rules to increase efficiency.
  4. The HITECH Act altered the penalty structure. According to Grama (2011), the new law was effective on February 17, 2009, that established the penalties range from $100 to $50,000 for each violation and a maximum of $1.5million in a year (p. 181). We recommend that the HHS should review the nature of the violation to decide the right amount to be fined.
  5. It is illegal for a person to secure or reveal the PHI in violation of HIPAA and is subject to criminal liability (Ghosh & Turrini, 2010). We propose that the HHS should create a procedure on how investigations could be conducted to determine the covered entities that violate the HIPAA privacy and security rules.
  6. HIPAA form the foundation for PHI security and privacy protections and different States are allowed to create their own rules and laws that give more security protection than HIPAA. According to Grama (2011), the HHS must ensure that the covered bodies comply with both laws (p.174). We recommend that the HHS comes up with a system that can determine which law gives more patient rights and that means that it covered entities should adhere to. Nevertheless, the HHS should also ensure that any State law that is against HIPAA Act is not allowed in covered entities.
  7. Our team discovered that there was a weakness in the information security system that was caused by internal and external threats. According to Mouratidis & Giorgini (2006), the HHS should use vulnerable information to keep track of possible attacks and develop countermeasures (p.121).  We recommend this approach to help the department have solutions to make the information system operate properly when disrupted in the future.
  8. Our team also realized that the staff did not have the appropriate education. We recommend that staff should be enrolled in training to understand the concepts and their relations to ensure they are well adopted and implemented.
  9. The cybersecurity department's goal and objective are to give HHS top management with the devices to effectively oversee the compliance of HIPAA privacy and security laws to safeguard its status.
Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Memorandum for HHS Senior Management, From: Cybersecurity Program Essay - 1”, n.d.)
Memorandum for HHS Senior Management, From: Cybersecurity Program Essay - 1. Retrieved from https://studentshare.org/information-technology/1658937-memorandum-for-hhs-senior-management-from-cybersecurity-program-manager-subject-hhs-cybersecurity-recommendation
(Memorandum for HHS Senior Management, From: Cybersecurity Program Essay - 1)
Memorandum for HHS Senior Management, From: Cybersecurity Program Essay - 1. https://studentshare.org/information-technology/1658937-memorandum-for-hhs-senior-management-from-cybersecurity-program-manager-subject-hhs-cybersecurity-recommendation.
“Memorandum for HHS Senior Management, From: Cybersecurity Program Essay - 1”, n.d. https://studentshare.org/information-technology/1658937-memorandum-for-hhs-senior-management-from-cybersecurity-program-manager-subject-hhs-cybersecurity-recommendation.
  • Cited: 0 times

CHECK THESE SAMPLES OF HHS Cybersecurity Recommendation

Cybercrime: Law Enforcement and E-Government Transnational Issues

This paper ''Law Enforcement and E-Government Transnational Issues'' discusses cybersecurity laws, regulations, and legal concepts applicable to managerial decision-making concerning industry, transnational crime, and government.... Key concepts affecting cybersecurity consist of attacker methods and incentives, malicious code techniques, threat vectors and exploitation trends.... This research paper discusses cybersecurity laws, regulations, and legal concepts applicable to managerial decision making concerning industry, transnational crime, and government....
7 Pages (1750 words) Research Paper

Cyber Security Policy Initiatives

The present paper under the title "Cyber Security Policy Initiatives" concerns the policy of cyber security.... It is mentioned that a number of measures can be taken to help protect information and systems from cyber attacks.... ... ... ... The system of technologies, procedure, and observance which are structured for protecting networks, systems, applications and important information from attacks, harm or entrance from unauthorized as well as unrecognized sources is what is known as Cyber security....
11 Pages (2750 words) Research Paper

The Suitability of Cybercrime Laws to Meet New Realities of the Internet

One of such major recommendation that has been provided by the law is that, the president of the USA has the mandate to declare "cyber-emergency" (Kaplan n.... he cybersecurity Act of 2009 - S.... According to section 2 of this law, titled findings, the failure of the USA to protect its cyber space is one of the urgent national security problems that are facing the country (cybersecurity n....
4 Pages (1000 words) Essay

Dissecting a Cyberwarfare Weapon

From the paper "Dissecting a Cyberwarfare Weapon" it is clear that the government officials should use the authority bestowed on them by the people to merge with the private sector so as to comprehensively offer cybersecurity that can respond to cyber-attacks.... ... ... ... In order to prevent future crimes, the military and national security agencies should put into policy cyber warfare as a national security concern....
7 Pages (1750 words) Essay

Law Enforcement and E-Government Transnational Issues

The author of the "Cybercrime: Law Enforcement and E-Government Transnational Issues" paper discuss cybersecurity laws, regulations, and legal concepts applicable to managerial decision making concerning the industry, transnational crime, and government.... Sensitive government information leaked from the WikiLeaks cables, an illustration of cybersecurity issues.... Issues that continue to challenge and thus calling for the United States' government cybersecurity intervention include the growing integration of mobile devices technology into perilous information infrastructure....
7 Pages (1750 words) Coursework

Critical Annotated Bibliography on Cybersecurity

The author of this paper "Critical Annotated Bibliography on cybersecurity" discusses the literature concerning the problems of cybersecurity, criminal and fraudulent motivations, the security implications in information communication, critically analyzing the bibliography.... In the context of cybersecurity, the government of the US has focused on the seven crucial areas including risk management, incident management, privacy and information sharing, international engagement, supply chain security, research and development, innovation, education, and awareness....
6 Pages (1500 words) Annotated Bibliography

Cyber Ethics for Business

In the present global era, cybersecurity is of great importance for businesses and individuals.... In the present global era, cybersecurity is of great importance for businesses and individuals.... In the present global era, cybersecurity is of great importance for businesses and individuals.... With regard to individuals, privacy, smartphones, Facebook, and cybersecurity issues will be analyzed.... In addition, cybercrime legislation and government responses to the cybersecurity problem will be scrutinized....
9 Pages (2250 words) Essay

Cyber-Security Issues

The assignment "Cyber-Security Issues" focuses on the critical analysis of the student's ideas on the issues concerning cybersecurity.... The devastating cyber-attack of Equifax was a result of Apache Struts vulnerability that affected about 143 million customers.... ... ... ... In this attack, hackers stole private information about customers such as passwords, credit card numbers, etc....
13 Pages (3250 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us