Entries by Student

write my assignment 556

Read the passage from the Gettysburg Address by Abraham Lincoln. It is rather for us to be here dedicated to the great task remaining before us—that from these honored dead we take increased devotion to that cause for which they gave the last full measure of devotion—that we here highly resolve that these dead shall not have died in vain . . . What does Abraham Lincoln propose the audience do to ensure that the men who lay dead at Gettysburg shall not have died in vain? make the battlefield at Gettysburg a national park hold annual memorial services to commemorate the dead continue to fight for the preservation of the Union

 

"Not answered?"


Get the Answer

write my assignment 21155

Class, I appreciate your participation in this discussion! For this assignment, you must post your original post addressing the topics below (minimum of 250 words), prior to 11:55 PM ET on Wednesday. Continue to follow your classmates’ posts for the remainder of the week and post at least two follow-up messages (minimum of 150 words each) to your classmates’ posts prior to 11:55 ET on Sunday. Your follow-up posts can add additional insight to a classmate’s opinions or can challenge their opinions. Use examples from the readings, or from your own research, to support your views, as appropriate. Be sure to read the follow-up posts to your own posts and reply to any questions or requests for clarification. By the way, include the name of the person’s post you are replying to. Thanks!

Questions:  

1. What is e-waste? What is so dangerous about e-waste? Many well-meaning individuals thought that recycling was the answer to the e-waste problem. But why hasn’t e-waste recycling yielded the results hoped for? 

2. What are network effects? Think about the kinds of technology products that you own, or websites you use, that are subject to network effects. What sorts of exchange do these products leverage (e.g., information, money, software, or other media)? Give several concrete examples and explain them as clearly as you can in your own words. 

3. Find an article online that discusses the problem of e-waste, preferably one that also proposed a solution. In your own words summarize and critique the article. Do you think it is a viable solution? Why or why not? Be sure to include the url to your article. 

4. Describe the impact that your chosen information system has on your organization. Be sure to consider both the positive and negative impacts. Over-dependence on an information system can be a negative impact, so also discuss whether your organization has any contingency plans for business continuity during system outages.

 

"Not answered?"


Get the Answer

write my assignment 2711

Write a 350- to 700-word paper in which you address the following:

  • What is the company’s mission statement?
  • What is the company’s vision statement?
  • What role do these have on the way the business operates?  Do the company’s actions seem to align to their vision and mission statements?
  • How might the mission and vision of the organization affect or guide you as an employee or manager in the company?
  • If the company does not have a mission or vision statement, what might be the effect of that?

The company assigned to me is Google. I need help. I bit off more than I can chew this week, anyone willing to do this assignment for me please?

 

"Not answered?"


Get the Answer

write my assignment 29805

Information Security in Healthcare

Determine why information security is so important in healthcare by analyzing at least two different types of safeguards for data and elaborate on what standards are looked at for each. Also, identify the types of facilities these safeguards can be used in and what are the expectations.  There may be several different standards for each safeguard but you are required to mention at least two.Discussion responses should be on topic, original, and contribute to the quality of the discussion by making frequent informed references to lesson material. Discussion responses should be around 200 words.

Give your personal opinion to Gabriela Berrios and  Dina Alani  . Opinions should be around 100 words with a total of two pages.

Gabriela Berrios 

Two Safeguards for Data

By having a solid security foundation for security management processes, assignment of responsibility, enforcement of workforce security, information access, training, as well as plans and protocol in the event where a breach occurs, the covered entity can be prepared, with a safeguard that will protect them in reducing the impact or preventing breaches altogether.

  1. Physical Safeguard:

Physical Safeguards are the implementation standards to physical access to information systems, equipment and facilities which can be in reference to access to such systems in and out of the actual building. (Chung, 2014).

This safeguard has physical measures, policies, and procedures to protect a covered entity’s electronic information systems and related buildings and equipment, from natural and environmental hazards, and unauthorized intrusion. (Chung, 2014).

It covers facility access to information systems and equipment, workstation use and security, and management of certain media devices that may contain ePHI. (Chung, 2014). It is in place to work with the administrative and technical safeguards so that the covered entity can place specific procedures in place to protect electronic information systems, buildings facilities, and equipment. (Chung, 2014).

  1. Administrative Safeguard:

The administrative safeguards cover over half of the HIPAA Security requirements and are focused on execution of security practices for protecting ePHI. (Chung, 2014).

This safeguard has administrative actions, and policies and procedures, to manage the selection, development, implementation, and maintenance of security measures to protect electronic protected health information and to manage the conduct of the covered entity’s workforce in relation to the protection of that information. (Chung, 2014).

This implements policies that aim to prevent, detect, contain, as well as correct security violations and is the groundwork of the HIPAA Security Rule. (Chung, 2014).

Gabi

Reference:

Chung, D. (2014, August 11). The Three Safeguards of the HIPAA Security Rule Summarized. Retrieved from https:// Dina Alani 

Information security is essential in health care settings as first of all information leakage of a patient is a legal offense, and secondly, by the leaked information criminals can make use of it by engaging in medical fraud and for other financial gains. When the security of information is maintained the healthcare industry saves money because the cost of a lawsuit from leaked documents, for example, could spell the end for a healthcare entity and securing the information thus saves a considerable amount of money. The safeguards to protect such information are-

1. Administrative safeguards-

It is related to lawmaking body and most importantly protecting these laws and compelling everyone to follow it. It determines the documentation process, roles and responsibilities, training requirements, data maintenance policies and more.

2.Technical and physical safeguards-

Using technology to safeguard the information regarding health care settings comes under technical safeguard that includes cybersecurity where every document is strictly password protected. Apart from preserving this way security systems are available 24 x 7 like video surveillance, door and window locks, and locations of servers and computers.

https://

 

"Not answered?"


Get the Answer