Question: Before completing this assignment, be sure you read what an AUDIT TRAAL is in your i watbook. Since the HIPAA privacy rules was implementod, you

Before completing this assignment, be sure you
Before completing this assignment, be sure you read what an AUDIT TRAAL is in your i watbook. Since the HIPAA privacy rules was implementod, you have been drowning in your atcht fralls revi wh. You have finaliy obtained permission from administration fo develop and use triggers to help with the re iew. Thes. triggers, although not eliminating the review of audit trais, can be used to identify potential unauthorized accees much mc re quichly and easily than using a manual review. Now that you finaly have approval, your have to develop the iggers fo be used. Administration wants to reviaw your peoposed triggers before they are implemented. Identify 10 triggers that you will present fo administration for approval. Please be specific. HiNT: You might have pages and pages of the audit trail report. You are trying to got the computer system to do some of the work for you. What would look like highly suspicious activily of someone trying to access information that they shouldn th? What if someone tried to log in more than 10 times and was not able to (or was able to). This might look ske someone trying to access the system that shouldnt. This would be something you would want to invessgate. This would be a good tigger for the systern to autamatically flag. So your trigger would be any log in atiempth that wero greater than 10 (or you might want is to be a lower theesheld). SUBMIT AS A WORD DOCUMENT Adapted frome McCuen, C4, Sayles, N. B. \& Schnering. P. (2018), Case studies in healeh information management, Boston, MA. Congage Leaming. By submitting this paper, you agree: (1) that you are submitting your paper to be used and stored as part of the Safetssign services in accordance with the Blackboard Privacy Policy; (2) that your institution may use your paper in accordance with your institution's policies; and (3) that your use of Safeessign wilt be without recourse against Blackboard inci and its affiliates, Institution Release Statement Cick here to review CuNY's institution Release Statement

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related General Management Questions!