Risk Analysis for Dr. Smith

Risk analysis and management is one of the first steps health care providers should take to protect patients’ electronic protected health information (ePHI). In week 3, you developed an implementation plan for Dr. Jim Smith’s office, which has been used to help them successfully implement an EHR system. In this assignment, you will conduct a risk analysis for his office and identify measures to mitigate risks associated with its health information system.  Requirements:  1. Identify six threats or vulnerabilities, including natural, human, and environmental threats as well as technical and non-technical vulnerabilities.  2. For each threat or vulnerability, using a scale of low, medium, high, rate (1) its likelihood of occurrence and (2) its impacts on ePHI. Please provide explanations of your ratings and discuss how the threat/vulnerability can affect ePHI.  3. Based on ratings of threat/vulnerability likelihoods and impacts, use the following chart to rate the level (low, medium, high) of each risk associated with ePHI.  Low  Likelihood  Medium High Low-Risk Low Risk Low-Risk Low Risk  Medium Risk  Medium Risk  Low Risk  Medium Risk  High Risk  Impact  Low Medium High  4. For each risk, identify administrative safeguards, physical safeguards, and technical safeguards that Dr. Smith’s office can employ to mitigate it.  As we don’t have much information about Dr. Smith’s office in this instruction, feel free to make reasonable assumptions about its current status in your report.  Resources:  â€¢ you can find an introduction of risk analysis in the following video: https://www.youtube.com/watch?time_continue=450&v=hNUBMLVr9z4  â€¢ You can find the definitions and categories of threats, vulnerabilities, and risks on the following webpage: https://www.hhs.gov/hipaa/for-professionals/security/guidance/guidance-risk- analysis/index.html?language=es  â€¢ The textbook, especially page 308-311, provides a guideline of risk analysis and management as well as examples of vulnerabilities and their mitigation strategies.  Formats:    â€¢ The total length is 2-3 pages (single spaced; 12 font), with 1/3-1/2 page for each threat or vulnerability, including its description, likelihood and impact assessments, and protection safeguards. References list is excluded from the page count.  â€¢ Provide appropriate sub-titles.  â€¢ A complete list of references should be included at the end of your paper, following APA  format.  â€¢ Plagiarism is not acceptable and should be avoided.

"Looking for a Similar Assignment? Order now and Get a Discount!

Our guarantees
1. High-Class Quality.
‘Will you write my paper for me that meets all requirements?’ This question is frequently asked by many students, and we always answer in the affirmative. Our main goal is to deliver a perfectly written paper the meets high writing standards. We don’t rest unless you are satisfied with our work. If you hire a paper writer online, we guarantee you that you get 100% original and plagiarism-free assignments of high quality.
2. Complete Anonymity.
We value your privacy and use modern encryption systems to protect you online. We don’t collect any personal or payment details and provide all our customers with 100% anonymity. ‘Can you write a paper for me so that I could stay anonymous?’ Of course, we can! We are here to help you, not to cause problems.
3. Fast Delivery.
We completely understand how strict deadlines maybe when it comes to writing your paper. Even if your paper is due tomorrow morning, you can always rely on us. Our writers meet all set deadlines unequivocally. This rule is ironclad! The offered range is wide and starts from 6 hours to 2 weeks. Which one to choose is totally up to you. For our part, we guarantee that our writers will deliver your order on time.