Fill in Order Details

  • Submit paper details for free using our simple order form

Make Payment Securely

  • Add funds to your account. There are no upfront payments. The writer will only be paid once you have approved your paper

Writing Process

  • The best qualified expert writer is assigned to work on your order
  • Your paper is written to standard and delivered as per your instructions

Download your paper

  • Download the completed paper from your online account or your email
  • You can request a plagiarism and quality report along with your paper

HELP NEEDED

Course Project: TITLE

Objective | Project Requirements | Guidelines | Milestones | Grading Rubrics | Best Practices

Objective

Back to Top

The objective of the course project is to tie together all the TCOs in a comprehensive manner, while giving students the chance to take on the role of Privacy Officer.

Project Requirements

Back to Top

For your course project, you will play the role of a Privacy Officer. You have been asked by management to develop the content of an organization’s security and privacy training and awareness program. You will select privacy and security topics that need to be communicated to all workforce members, and you will develop a plan. In addition, you will create a presentation to introduce your proposal.

Hospital Background

Medical Center of DeVry is a leading healthcare organization specializing in pediatric healthcare and has an expanded network of physicians and pediatric specialists. It is the beginning of the fiscal budgetary year, and all assessments, improvement projects, and proposals are due within the next 30 days. As Privacy Officer, you will have to create a privacy and security plan. This process will consist of three components: an assessment of the organization, a training and awareness program, and a communication plan.

The purpose of the assessment is to review the current condition and the effectiveness of your privacy and security program in order to move forward with HIPAA’s privacy and security requirements.

Once the assessment is complete, you will use the results to make a decision about improvement tools, and you will create a training and awareness plan. The purpose of the training and awareness plan is to bring awareness to the organization for a collaborative effort in improving the privacy and security of the facility. The plan will, preferably, focus on areas that need special attention, such as issues related to HIPAA compliance, including physical safeguards.

Once both the assessment and the training and awareness plan are complete, you will then need to develop communication tools to convey to the rest of the organization.

Assessment Findings

You completed your assessment and found that several policies are out of date or are missing critical elements. You submitted a plan to management, and management has approved your proposed actions to implement two new policies, to create two reporting tools to ensure easy compliance with the new policies, and to train employees on the new policies and tools. Following the directions below, create the new policies, reporting tools, and inform staff of training. Once you have completed these three elements, compile all the information into a fifteen minute presentation that you will give to management discussing your overall findings, policies, tools, and the training conducted.

Required Elements

A. Policies

Based on your review, you determined that specific polices related to incident reporting and physical safeguards need revising. Develop two separate policies, using the template below, to address the following topics.

  1. Incident Reporting
    • Address what types of incidents should be reported to include:
      1. Inappropriate use of a computer
      2. Release of information to patients and outside agencies or individuals without authorization
    • Address the expectations for reporting to include:
      1. Time Frame in which employees need to report
      2. How employees will report
    • Outline the procedures for reporting incidents to include:
      1. Who receives complaints
      2. How complaints are investigated
      3. How notification to affected individuals occurs
  2. Physical Safeguards
    • Securing workstations to include:
      1. Auto lock feature
      2. Securing equipment, such as laptops
    • Record disposal to include:
      1. Electronic media such as hard drives and CDs
      2. Paper documents
  3. Use the following template:


Image Description

Policy Name

Last Updated <Today’s Date>

Purpose: (what the policy is addressing)

Requirements (What are the processes to follow and who do they apply to?)

Procedures: (What steps does the organization need to follow to ensure the requirements are met)

Special Circumstnaces: (Is there any issue where the policy may not apply)

Press the ESC key to close the image description and return to lecture.

B. Reporting Tools

After completing the policies and procedures, you determine that it will be useful to develop some new tools to reinforce compliance of the revised policies and procedures.

Your reporting tools should consist of the following:

  1. An incident reporting form that includes the following elements:
    • Date of incident;
    • Type of complaint or incident;
    • Complaint details; and 
    • Staff questioned or involved.
  2. A checklist for security staff to use for audits and compliance that includes the following elements:
    • Document disposal;
    • Media disposal; and 
    • Unsecured workstations.

C. Communication Tools

Communicate the new policies and tools to employees of the organization. This will be helpful in training employees in order to have direction on privacy and security efforts for the year.

Your two communication tools could be in the following format:

  1. A flyer, brochure, intranet announcement, e-mail, handout, poster, or other form of communication.

In addition, your communication tools need to address:

  1. Why training is being provided;
  2. Dates of training; and
  3. Location of training.

D. Presentation

You now have to prepare a presentation of your findings and overall evaluation of the privacy and security program for the executive leaders. The presentation should be 15 minutes in length, with approximately 15-20 slides. Your presentation should include privacy and security plan details such as

  • the purpose of plan;
  • what your assessment revealed, that is, problems identified;
  • the policies created;
  • the reporting tools developed; and
  • the communication tools.

Guidelines

Back to Top

  • Projects must follow APA formatting, including 12-point font, double spaced lines, a cover page, and a works cited.
  • Use at least six authoritative, outside references (anonymous authors or web pages are not acceptable); one reference may be the textbook. These should be listed on the last page titled “Works Cited.”
  • Appropriate citations are required.
  • All DeVry University policies are in effect, including the plagiarism policy.
  • Projects are due during Week 7 of this course.
  • Any questions about this project may be discussed in the weekly Q & A discussion topic.
  • This paper is worth 230 total points and will be graded on documentation and formatting, policies and procedures, creation of reporting tools, communication tools, and presentation.

Milestones

Back to Top

  • Complete Policies and Procedures by Week 2
  • Complete Creation of Reporting Tool One by Week 3
  • Complete Creation of Reporting Tool Two by Week 4
  • Complete Communication Tool One by Week 5
  • Complete Communication Tool Two by Week 6
  • Complete all remaining components, including compilation of assignment by Week 7

Grading Rubrics

Back to Top

 

Category

Points

%

Description

 Documentation and Formatting

 10

5

Use APA formatting, including cover page, 12-point font, 1 inch margins, and works cited.  

Policies and Procedures

 60

26

Create a policy using the standardized format provided.  

Creation of Reporting Tools

 60

26

Create two unique tools to enforce the policy created.  

Communication Tools

 40

17

Create two tools, and discuss the training being provided on the new policy and tools.  

Presentation

 60

26

Provide a 15-slide presentation discussing new changes, that is, policy, tools, and communication efforts.  

Total

 230

100

A quality paper will meet or exceed all of the above requirements. 

 

Best Practices

Back to Top

The following are the best practices in preparing for the final project.

  • Cover Page – Include who you prepared the paper for, who prepared the paper, and the date.
  • Policies and Procedures – Use the standard format provided in assignment 2 (Week 3) to ensure that all elements are addressed.
  • Creation of Reporting Tools – Use the format provided in assignment four (Week 5) to ensure that the appropriate information is provided for the checklist tool.
  • Communication Tools – Creation of these tools can be done through a variety of media; most students use Word or Publisher to create flyers, brochures, posters, and e-mails.
  • Presentation – The presentation should be created using PowerPoint; ensure that background information is supplied as well as all three elements, including policies and procedures, tools, and communication tools.
  • Work Cited – Use the citation format specified in the Syllabus.

Back to Top

 

WHAT OUR CURRENT CUSTOMERS SAY

  • Google
  • Sitejabber
  • Trustpilot
Zahraa S
Zahraa S
Absolutely spot on. I have had the best experience with Elite Academic Research and all my work have scored highly. Thank you for your professionalism and using expert writers with vast and outstanding knowledge in their fields. I highly recommend any day and time.
Stuart L
Stuart L
Thanks for keeping me sane for getting everything out of the way, I’ve been stuck working more than full time and balancing the rest but I’m glad you’ve been ensuring my school work is taken care of. I'll recommend Elite Academic Research to anyone who seeks quality academic help, thank you so much!
Mindi D
Mindi D
Brilliant writers and awesome support team. You can tell by the depth of research and the quality of work delivered that the writers care deeply about delivering that perfect grade.
Samuel Y
Samuel Y
I really appreciate the work all your amazing writers do to ensure that my papers are always delivered on time and always of the highest quality. I was at a crossroads last semester and I almost dropped out of school because of the many issues that were bombarding but I am glad a friend referred me to you guys. You came up big for me and continue to do so. I just wish I knew about your services earlier.
Cindy L
Cindy L
You can't fault the paper quality and speed of delivery. I have been using these guys for the past 3 years and I not even once have they ever failed me. They deliver properly researched papers way ahead of time. Each time I think I have had the best their professional writers surprise me with even better quality work. Elite Academic Research is a true Gem among essay writing companies.
Got an A and plagiarism percent was less than 10%! Thanks!

ORDER NOW


Consider Your Assignments Done

“All my friends and I are getting help from eliteacademicresearch. It’s every college student’s best kept secret!”

Jermaine Byrant
BSN

“I was apprehensive at first. But I must say it was a great experience and well worth the price. I got an A!”

Nicole Johnson
Finance & Economics

Our Top Experts

See Why Our Clients Hire Us Again And Again!


OVER

10.3k
Reviews

RATING
4.89/5
Average

YEARS
13
Mastery

Success Guarantee

When you order form the best, some of your greatest problems as a student are solved!

Reliable

Professional

Affordable

Quick

Using this writing service is legal and is not prohibited by any law, university or college policies. Services of Elite Academic Research are provided for research and study purposes only with the intent to help students improve their writing and academic experience. We do not condone or encourage cheating, academic dishonesty, or any form of plagiarism. Our original, plagiarism-free, zero-AI expert samples should only be used as references. It is your responsibility to cite any outside sources appropriately. This service will be useful for students looking for quick, reliable, and efficient online class-help on a variety of topics.