This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Uncategorized

Risk management Plan for Health Network Inc

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

Risk management Plan for Health Network Inc

Introduction

 

Health Network Inc. is a company which seems to be facing some risk related issues having acknowledged the large duration of time since the last review of its Risk management Plan (RMP). The organization mainly serves the customers through the use of three products namely: HNetExchange, HNetPay, HNetConnect. These services generally help customers to get information relating to data by querying its databases (Hayat, Usman 2012). It provides easy access and timely response to health-related situations. HNetExchange helps customers find clinics and also to exchange medically related messages over the net. HNetPay is Web Portal used by customers to process and display bills and payments. HNetConnect is a directory which helps customers to trace the clinics which offer good services including the doctors and their physicians of interests. The RMP is meant to protect staff members, guests, and patients from unintentional and intentional security breach as well as protection of the financial assets and the other intangible assets of the company.

Don't use plagiarised sources.Get your custom essay just from $11/page

RMP Scope

The RMP plan applies to the information systems and network infrastructure of the organization. It seeks to mitigate the risks which also face the financial data. The risks to be considered are those which mainly affect everyone who accesses the systems, gains access to the system and also trusts the system for the storage of the data. The plan also enables risk mitigation and collaboration of the risk management staff in departments of Minnesota and Minneapolis and other locations such as Arlington, Oregon Virginia and Portland. The detailed operations for risk plan include transfer of data to a required destination, security of servers, secure transfer of data via the HNetExcahnge, HNetPay portal protection and availability,  full data exchange, PHI data usage and storage, maintenance of information confidentiality and secured connections to third-party systems.

 

 

Regulations

Though regulations and laws form the basis of the risk management –plan, it also acts as one of the potential risks if it is not strictly followed while conducting organizational operations. Some of the laws and regulations which apply to the Health Network, Inc. include: Payment card Industry Data Standards (PCI), acts such as Healthcare Information Portability and Accountability Act [HIPPA]. The development of HIPPA standards was meant to protect citizens from personal information and data attacks (Farhadi, Haddad, & Shahriar. PCI standards, on the other hand, were specifically developed in order to reduce the losses due to card frauds or (Chuvakin, 5). The federal government also enacted the Gramm-Leach-Bliley Act [GLBA] which requires all financial institutions or any institution dealing with customers’ financial information to clarify the manner in which it shares the customers’ private data. There is also another bill referred to as the Computer Fraud and Abuse Act [CFAA] which was passed to ensure that no access to computers without access authorization (Goldman, 14).

 

Risks and Responsibilities

Job TitleRoles and Responsibilities
IRM –IT Resource ManagerEnsure proper and up-to-date risk management plan in place, he also ensures that proper practices and policies are followed.

He or she also assigns job responsibilities and follows up on the accountabilities.

Assesses risk management operations in the three departments

Risk Coordinator (Manager)Manages and coordinates Risk assessment activities and can stand for IRM
Health Network Inc. Senior ManagerOffers information about the risk faced by the company as well as helping in its initiation
Business SMEHelps in assessing the contexts, impacts, timing, consequences, and priorities of risks
The RPM team-Helps in managing components of risks as directed by IRM (They will be assigned risk owners)

-Documents incidences

– Reports the supporting information to the coordinator or risk manager

Risk Owner-Helps in managing components of risks as directed by IRM.

-Documents incidences

– Reports the supporting information to the coordinator or risk manager

StakeholdersInvolved in the planning processes and offering unique perspectives in risk operations, identifies and support the definition of the contexts, impacts, timing, consequences, and priorities of risks
Data Custodian (3rd Party)They will implement controls as per the specifications of the risk owners, evaluation of the cost-effectiveness of the risk management processes, The will provide the technical, physical and the procedural protection of the information and data. They will also help in of3ring monitoring and procedural techniques for detection, reporting and investigating risk incidences.

 

 

Risk Mitigation Plan

ThreatOutcomeProposed Revised Plan
Loss of data due to the removal of hardware from production systemsHandling of operation errorsThe approved budget for replacement of hardware
 Loss of company data due to loss of company assetsCompromise and loss of critical informationData backup in all the systems
Loss of customers due to production outages caused by various events, such as natural disasters, unstable software, and change managementStalling of processRegular review of the continuity recovery plan and equipping all the data centers in the three locations.
Internet threats due to company products being accessible on the internetNetwork system halt due to loss of vital informationUpdating of all security software such as firewalls and ant viruses
Changes in the regulatory landscape that may impact operationsDelays in organizational systems processesConstant regulatory review and update basing on the current government changes
Insider threatsOverall System riskCommunication of the policies and procedures regularly.

References

Chuvakin, Anton. “Managing a PCI DSS Project to Achieve Compliance.” PCI Compliance, 2012, pp. 231-251.

Farhadi, Maryam, et al. “Static Analysis of HIPPA Security Requirements in Electronic Health Record Applications.” 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC), 2018.

Goldman, Lee. “Interpreting the Computer Fraud and Abuse Act.” Pittsburgh Journal of Technology Law and Policy, vol. 13, 2012.

Hayat, Usman (2012). “Impact investing: making money the charitable way”. Financial Times. Retrieved 14 August 2014

 

 

 

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask