Preview

Week 4 Lab Delphi Method Chris Wiginton

Satisfactory Essays
Open Document
Open Document
311 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Week 4 Lab Delphi Method Chris Wiginton
Chris Wiginton
1/19/14
IS-3110 Week 4 Lab/Homework
Health Care Risk Assessment (Delphi Method) Foremost in compiling a health care risk assessment will be to ensure all methodologies take into account compliance of the U.S. Health Insurance Portability and Accountability Act (HIPAA) of 1996. The healthcare provider must comply with the HIPAA Privacy and Security Rules in order to avoid penalties. Using the Delphi method a group of selected Subject Matter Experts (SMEs) can define the scope of the risk analysis. The SMEs will identify potential threats and vulnerabilities, determine the likelihood and impact of the threats and analyze and recommend security measures and determine risk levels. High emphasis will be placed in determining potential risks and vulnerabilities to the confidentiality, availability and integrity of all Electronic Personal Health Information (EPHI) that this office creates, receives, maintains, or transmits.
The Delphi method is a great tool for creating a risk assessment. The Delphi method will encourage the teams or groups of subject matter experts to remain anonymous if needed and provide diverse opinions based on the expertise of each individual or group. Having anonymous input will allow for controlled feedback in which the responses from the members are summarized and then given back to individuals or groups. The responses of each member are presented to every other member without identifying who provided these responses. Each member will then be asked to consider their responses in relation to the responses of everyone else. Based on this, they will be asked to respond to the subject again. This method will be used until there is a consensus.
While the Delphi method could be time consuming the outcome will provide a cohesive and well defined risk assessment. Using the Delphi method could be very beneficial for ensuring all aspects of risks and vulnerabilities have been addressed and that compliance with HIPPA guidelines is

You May Also Find These Documents Helpful

  • Satisfactory Essays

    |Risk assessments must be carried out on any activity that has significant associated hazards. A group approach to risk | | |…

    • 400 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    We identified several risks and have assessed them in order to determine which of those risks have the highest impact on the project. Below we have listed four of our highest impact risks and have supplied a recommendation for that risk:…

    • 1116 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Identify risks that could lead to an information security breach, Identify vulnerabilities in system security, software operation, network design or employee procedures that could lead to a network failure.…

    • 339 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    RAR Template 07112007 3

    • 5647 Words
    • 25 Pages

    The Centers for Disease Control and Prevention (CDC) recognizes the best, most up-to-date health information is without value unless it is pertinent and accessible to the people it is meant to serve. Lockheed Martin Information Technology has been tasked to conduct a risk assessment of the <System Name and Acronym> for the purpose of certification and accreditation (C&A) of <System Name> under DHHS Information Security Program Policy. This Risk Assessment Report, in conjunction with the System Security Plan, assesses the use of resources and controls to eliminate and/or manage vulnerabilities that are exploitable by threats internal and external to CDC. The successful completion of the C&A process results in a formal Authorization to Operate of <System Name>.…

    • 5647 Words
    • 25 Pages
    Powerful Essays
  • Good Essays

    2. How do you align the results of the qualitative risk assessment to risk mitigation?…

    • 960 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Unit 6 Assignment 2

    • 878 Words
    • 4 Pages

    The problem of risk assessment is an extremely complex one. When a risk assessment process is started, this process has to analyze several aspects in parallel.…

    • 878 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    HIPAA allows patients’ health information to be disclosed under some circumstances, such as 1) to meet law requirements; 2) for reporting of abuse, neglect, and domestic violence; 3) for monitoring of healthcare operations; 4) to be presented as evidence in legal proceedings; 5) for assistance with police investigation; 6) for medical examinations and funerals; 7) for organ donation; 8) for research; 9) to avoid a significant threat to health or safety; 10) for workers’ compensation payments; 11) to execute government…

    • 81 Words
    • 1 Page
    Powerful Essays
  • Good Essays

    The Health Insurance Portability and Accountability Act (HIPAA), became law in 1996. It requires health care providers, insurance companies and others involved in health care transactions to provide security on any system containing personal health information, store and transmit that information according to standardized rules, and place an automatic audit on files to help keep track of who should have access to them and whether those access rules have been violated. HIPAA complaints and violations that aren't fixed quickly are subject to a fine of between $100 per incident or a maximum of $25,000 per year for violation of a specific rule.…

    • 783 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    To establish a comprehensive, proactive risk assessment process to evaluate the potential adverse impact of direct and indirect patient care processes, buildings, grounds, equipment, occupants, and internal physical systems on the safety and health of patients, staff, and other people coming to ABC. This proactive risk assessment process is used to identify, rate, and prioritize risks and or hazards. Based on this risk assessment, policies, procedures, and controls may be put into place to manage the risks as appropriate to the organization, with the intent of reducing them to the lowest possible level.…

    • 1678 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    evaluate the risks and decide whether existing precautions are enough or whether more should be done…

    • 1188 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    person centred risk

    • 3092 Words
    • 13 Pages

    Traditional methods of risk assessment are full of charts and scoring systems, but the person, their objectives, dreams and life seem to get lost somewhere in the pages of tick boxes and statistics.…

    • 3092 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    building services essay

    • 1054 Words
    • 5 Pages

    D1 justify the contents of a risk assessment, in terms of available control measures and what is ‘reasonably practicable’…

    • 1054 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Tony and his team identified some risks the first month of the Recreation and Wellness Intranet Project. However, all they did was document them in a list. They never ranked them or developed any response strategies. Since several problems have been occurring on the project, such as key team members leaving the company, users being uncooperative, and team members not providing good status information, Tony has decided to be more proactive in managing risks. He also wants to address positive as well as negative risks.…

    • 666 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Transportation and Logistics

    • 19170 Words
    • 77 Pages

    We would like to thank the panellists who took part in the Delphi survey that underpins this report. For confidentiality reasons their names will not be mentioned. We would also like to thank Thorsten Neumann, chairman of TAPA EMEA, for his support and opening up his network of security experts for this research. We would like to express our appreciation for the expertise provided by the below listed individuals: Dan Antonio, Jochen Schmidt and Otto Vermeulen.…

    • 19170 Words
    • 77 Pages
    Powerful Essays
  • Powerful Essays

    Padini Report

    • 2873 Words
    • 8 Pages

    Before this new system have been implement, we are aware of the risks of this system and the effect of it to the organization. However,we also need to come up with the recommendations of reducing the risks.…

    • 2873 Words
    • 8 Pages
    Powerful Essays