Nobody downloaded yet

Memorandum for HHS Senior Management, From: Cybersecurity Program Manager, Subject: HHS Cybersecurity Recommendation - Essay Example

Comments (0) Cite this document
Summary
As a faithful representative of the Department of Health and Human Services (HHS) senior management and a cybersecurity project manager, I have located key areas in regards to security that needs to be addressed with immediate effect. The proposals made in this memorandum…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER94.7% of users find it useful

Extract of sample "Memorandum for HHS Senior Management, From: Cybersecurity Program Manager, Subject: HHS Cybersecurity Recommendation"

Download file to see previous pages The HHS assigned the task to the office for civil rights and it applies both rules and protects people from discrimination in social services programs. However, the HITECH Act changed most of the oversight and enforcement roles of HIPAA (Grama, 2011). We suggest that HHS must improve the method of enforcing privacy and security laws. In order to achieve this objective the secretary of HHS must assign security rule enforcement to the office for civil rights.
3. As a result of change in privacy and security laws the HHS was expected to publish the new information on the minimum vital rules by the year 2010 in August (Ghosh & Turrini, 2010). We propose that the HHS should design a model on how the intended audience should know about any change in minimum necessary rules on time through mass media tools.
4. The HITECH Act change lead to elimination of duplicate rule enforcement. Before the office for civil rights enforced the privacy and security rules, the Medicare and Medicaid services enforced them and they are part of the HHS. We recommend that the HHS should come up with a single office to enforce both rules to increase efficiency.
5. The HITECH Act altered the penalty structure. According to Grama (2011), the new law was effective in February 17, 2009 that established the penalties range from $100 to $50,000 for each violation and a maximum of $1.5million in a year (p. 181). We recommend that the HHS should review the nature of violation to decide the right amount to be fined.
6. It is illegal for a person to secure or reveal the PHI in violation to HIPAA and is subject to criminal liability (Ghosh & Turrini, 2010). We propose that the HHS should create a procedure on how investigations could be conducted to determine the covered entities that violate the HIPAA privacy and security rules.
7. HIPAA form the foundation for PHI security and privacy protections and different States are allowed to create their own rules and laws ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Memorandum for HHS Senior Management, From: Cybersecurity Program Essay - 1”, n.d.)
Memorandum for HHS Senior Management, From: Cybersecurity Program Essay - 1. Retrieved from https://studentshare.org/information-technology/1658937-memorandum-for-hhs-senior-management-from-cybersecurity-program-manager-subject-hhs-cybersecurity-recommendation
(Memorandum for HHS Senior Management, From: Cybersecurity Program Essay - 1)
Memorandum for HHS Senior Management, From: Cybersecurity Program Essay - 1. https://studentshare.org/information-technology/1658937-memorandum-for-hhs-senior-management-from-cybersecurity-program-manager-subject-hhs-cybersecurity-recommendation.
“Memorandum for HHS Senior Management, From: Cybersecurity Program Essay - 1”, n.d. https://studentshare.org/information-technology/1658937-memorandum-for-hhs-senior-management-from-cybersecurity-program-manager-subject-hhs-cybersecurity-recommendation.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Memorandum for HHS Senior Management, From: Cybersecurity Program Manager, Subject: HHS Cybersecurity Recommendation

Cybersecurity

...application client. A person named Philip Zimmermann received a huge private threat in developing PGP as well as enabling its accessibility to the people across the globe beside the powerful needs of the United States Government. However, PGP History started with the invention of this algorithm by the Philip Zimmermann during the year 1991. Zimmermann, working rapidly to hit the rules and regulations, developed the Pretty Good Privacy (PGP) encryptions system formed on the basis of RSA public-key security management and cryptography algorithm. After that Zimmermann presented a PGP version 1.0 as free of cost software. After that Kelly Goen provided the PGP application against a number of bulletin board applications, plus...
5 Pages(1250 words)Essay

Cybersecurity

...("Cybersecurity assurance program," 2012). In this way, Adagia Telecom had relatively lax cybersecurity measures in place. One prominent area that Adagia did not have in place was proper control over automated telecommunications processes. While this factor is generally a major element in oil and gas, and manufacturing industries, it’s clear that it is equally important for Adagia Telecom; the lack of adequate compliance in this region greatly contributed to the organization’s cyber vulnerability, as malware was able to infect these automated systems (Heiman 2012). One of the greatest challenges with private industry is an unwillingness to disclose cyber-attacks, as it could impact...
3 Pages(750 words)Coursework

Cybersecurity

...? Cyber Security Table of Contents Introduction 3 Significant Cyber Security Vulnerability and Aassociated Threats in Mobile Computing 4 Physical Vulnerability 4 System Vulnerability 5 Network Access Vulnerability 6 The Threats Associated With Mobile Computing 7 The Policies And Procedures That Can Manage The Vulnerability And Threats In Mobile Computing 9 Effects Of Policies And Procedure On Customer Satisfaction 12 Conclusion 13 References 14 Introduction Cyber security can be defined as the process of ensuring protection of any computer related system, software based program along with data against unlawful use, transfer, disclosure, destruction or modification either deliberate or unintentional. Cyber attacks can emerge... from the...
8 Pages(2000 words)Coursework

Cybersecurity

...serve IBM to increase its customer protection (Office of the Information and Privacy Commissioner, n.d.). For Microsoft The organization needs to create internal reporting programs or mechanisms as a possible change in order to safeguard the personal information of the customers within the context of privacy policy issues. In this regard, an effective internal reporting program generally covers the fields such as handling as well as managing the personal information of the customers or the clients and properly organizing the guidelines relating to internet usage. Besides, the other important areas include maintaining the internal systems in the form of better accessing towards different...
7 Pages(1750 words)Coursework

Cybersecurity

...? CrypTool Labs 2 (School) This particular report will include the responses to the questions regarding the first two labs that utilize the CrypTool software. Keywords: CrypTool, analysis, software, cryptography, labs Lab Part 1: Introduction to Cryptography Using CrypTool Q1. Which tool or technique from the above list would be most effective for a cryptanalyst to use to decipher a text encrypted with the Caesar cipher, and why? The text used for the purpose of this lab is the first few paragraphs of Douglas Adam’s Hitchhiker’s Guide to the Galaxy, along with additional text stating this is where the sample text was pulled from. The N-gram list of Caesar encryption of the document itself would be the most effective... CrypTool Labs 2...
4 Pages(1000 words)Coursework

Cybersecurity

...Question 3 Vulnerability is a fault in a system that an attacker/hacker uses to reduce the security of the information inthe system. Microsoft XP is known to be vulnerable to several threats; some of them include the following: Microsoft windows XP do not allot adequate memory for SMTP control replies hence allowing hackers to be able to read parts of e-mail messages through the use STARTTL commands. This is known as SMTP memory allowance vulnerability. (Vetterling, 2002) Windows XP is vulnerable in HTTP services where an attacker who notices this flaw can win an absolute control of computer system and be able to manipulate the already installed programs and do any other thing to the system with full user rights....
1 Pages(250 words)Coursework

Cybersecurity

...the virus to be emailed to 50 recipients in the user’s address book which created an exponential increase in the virus-infected messages. Erdbrink (2012) reports how countries such as Iran have spent massive resources in controlling and preventing viruses. Anti-virus programs combat these viruses and keep the system and network safe from virus attacks. References Aksoy, P. & DeNardis, L. (2008). Information Technology in Theory. Canada, UK: Thomas Learning Inc. Erdbrink, T. (2012, May 29). Iran confirms attack by virus that collects information. The New York Times. Retrieved 2 October 2012 from www.nytimes.com Ivanova, P. (2006). Cybercrime and cybersecurity. International Journal of Information...
1 Pages(250 words)Coursework

Cybersecurity

...Cybersecurity Your Topic 3 - Some mental health and criminal justice professionals contend that hacking is an"addiction," and causes obsessive, risk taking behavior in a manner similar to illegal narcotics - hackers hack to "get high" from the thrill of breaking into a system and getting away with it. Should policymakers look towards treatment, rather than incarceration, as the disposition of hacker cases? Why or why not? The study conducted by Solmaz, Bell and Saygili (2011) is interesting. At first, after reading the article, there seems to be a dilemma between hacking as a form of addiction, which requires treatment to just simply being a criminal case. But going through further to their findings, it became clearer...
2 Pages(500 words)Coursework

Cybersecurity

.... Symmetric methods may be the most suitable for securing movie videos from unlawful viewing while kept on servers in the cloud. A sender may use a key to program a message into cipher text. The receiver may employ the identical key to decipher it. This will permit only individuals who have authorization to the movie videos to view them. (Delfs & Knebl, 2007). Question 2 Yes. The American government can employ a cloud-based model to enhance its operations. This is because applications of cloud technology do not rely on on-site staff or agency servers. A cloud-based computing model is beneficial in several ways. One, it will reduce governmental cost. Payments are made incrementally. Two, the government can save more...
2 Pages(500 words)Coursework

Cybersecurity

..., long term and short term objectives. My general objective at the moment is the acquirement of additional knowledge that would serve me in my career operations. Taking cyber security classes would increase my basis of knowledge in IT and related subjects thus allowing me to not only expand my area of expertise, but improve on the existing ones as well. The overall objective mentioned above can be seen as the leading long term objective in my academic path. I am aware that this would require my whole concentration on the achievement of these objectives in order to progress in this particular aim. I believe that my previous experiences, however, will serve me in successfully achieving this endeavor. My previous studies in...
2 Pages(500 words)Personal Statement
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Memorandum for HHS Senior Management, From: Cybersecurity Program Manager, Subject: HHS Cybersecurity Recommendation for FREE!

Contact Us