Premium Essay

Is4680 Lab 8

In:

Submitted By Aaron29
Words 270
Pages 2
Aaron Douglas 09428009 IS4680

Unit 1 Assignment 1: Compliance Laws

I believe the correct law that will work for my organization is the HIPPA compliance law. This law stands for Health Insurance Portability and Accountability Act. This law fits for what our organization needs to give auditors the table they need. The HIPPA law will also provide employees and citizens to maintain and get health insurance coverage in the case of any serious health problems. Also it improves efficiency and effectiveness of the American health care system. It will combat waste, fraud, and abuse in both health insurance and the delivery of health care overall so everyone is treated fairly. The requirements that will help our organization are:

* Title I; Health Care Access, Portability, and Renewability * Title II; Preventing Health Care Fraud and Abuse, Administrative, Simplification, and Medical Liability Reform. * Title III; Tax-Related Health Provisions * Title IV; Application and Enforcement of Group Health Plan Requirements * Title V; Revenue Offsets

These requirements will give the auditors what they need to do so that way we can get our goals accomplished on our end. Title I offers protection of health insurance coverage without regard to pre-existing conditions to those who lose or change jobs, locations. Title II provides requirements for the privacy and security of health information from fraud and hackers. This is often referred to as Administrative Simplification. The broader law calls for the following; Standardization of electronic data, patients, administrative, and financial data as well as the use of unique health identifiers. Security standards and controls to protect the confidentiality and integrity of individually identifiable health

Similar Documents

Premium Essay

Research

...Unit 8 Lab 8: Auditing the Remote Access Domain for Compliance Larry Sanchez IS4680 5/12/2014 Remote Access Domain, when using this you are access resources that our outside you organizational resources to access your organizations network. A lot of this accessing of resources compromises of sensitive data. This makes it a lot more accessible to attackers or hackers due to the perimeter of the network being so far extended and the attackers or hackers could be able to find a breach in the network perimeter. Having a weak VPN that has no layers of security can and will give hackers or attackers the window of opportunity that they need to get to our network. We need to watch what kind of software that our user's are using. If our remote users are using different software than what we have at our company headquarters than there could be a possible risk. The software can be suspicious, especially if the user downloaded it from the Internet. the software in question could lead to incoming viruses and worms that can affect our network. This can create holes in the security that has been set up. Configuration settings can lead a user to let in viruses and worms also. If the remote user does know how to set up their configuration settings on their machines than anything that they send or receive can be a potential risk, threat, and vulnerability to our network. Once an employee takes their laptop home they are no longer protected by the organizations firewalls. This can...

Words: 716 - Pages: 3

Premium Essay

Test

...ITT Technical Institute IS3340 Windows Security Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 60 (30 Theory Hours, 30 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisite: NT2580 Introduction to Information Security or equivalent Course Description: This course examines security implementations for a variety of Windows platforms and applications. Areas of study include analysis of the security architecture of Windows systems. Students will identify and examine security risks and apply tools and methods to address security issues in the Windows environment. Windows Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program:    IS4799 NT2799 IS4670 ISC Capstone Project Capstone ProjectCybercrime Forensics NSA    NT2580 NT2670  Introduction to  Information Security IS4680 IS4560 NT2580 NT2670 Email and Web Services Hacking and Introduction to  Security Auditing for Compliance Countermeasures Information Security Email and Web Services      NT1230 NT1330 Client-Server Client-Server  Networking I Networking II  IS3230 IS3350 NT1230 NT1330  Issues Client-Server Client-Server  SecurityContext in Legal Access Security Networking I Networking II   NT1110...

Words: 2305 - Pages: 10

Premium Essay

Audit

...Student Lab Manual © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LL NOT FOR SALE OR DISTRIBUT © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION Student Lab Manual © Jones & Bartlett Learning, LLC © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LL NOT FOR SALE OR DISTRIBUT Auditing IT Infrastructures for Compliance © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION IS4680 © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LL NOT FOR SALE OR DISTRIBUT © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett©Learning, LLC Learning, LLC, an Ascend Learning Company Bartlett Current Version Date: 11/21/2011 © Jones & Learning, LLC Copyright 2013 by Jones & Bartlett www.jblearning.com! NOT FOR SALE OR DISTRIBUTION ...

Words: 30948 - Pages: 124