Order Number |
7899642644 |
Type of Project |
ESSAY |
Writer Level |
PHD VERIFIED |
Format |
APA |
Academic Sources |
10 |
Page Count |
3-12 PAGES |
A public health information value estimator has step methods that are used in assessing security threats and the risk value of organizational public health information ( Kolstad, 2012). It estimates the overall data breach cost potential and provides a method for establishing a level of investment needed to add strength to security programs and reduction of the probability in which a breach can occur.
Did the organization handle address its PHIve risk in its five steps well?
The organization handles addressing its protected health value estimator risk in its steps well. This is was through assessing risks that are involved, vulnerabilities plus the safeguard that are applicable for every protected health information home. The protected health information home refers to the functional, administrative, and technical database that is used to create, store, maintain and transmit public health information.
The organization has identified many public health information homes and their security readiness that needs a cross-functional explanation within the organization. These will help in identifying policy, process issues, and gaps in the security that will promote awareness of the public health information issues.
Secondly is the score on their security readiness through establishing the similarity of a data breach. The score is fundamental, for it allows one to assess the level of that can be with an organizational general security posture. A scale of 1 to 5 is usually used as a weighted measure of security readiness based on the probability of a data breach. 1 to 2 is the acceptable score, whereas 4 to 5 is the unacceptable score.
Through determining relevance for each public health information that had a security readiness score that is unaccepted, there is an examination conducted of a particular category of cost a relevance structure applied from the hierarchy that is provided. The breach costs are broken into five categories, including financial, reputational, operational, clinical, and regulatory. In this, not all costs will be relevant to the public health information home.
All the public health information home whose security readiness score is unaccepted is given a relevance factor that will be linked with the probability of cost being incurred in case a data breach occurred in the public health information home
The organization determines the potential repercussions, consequences, and relevance. The consequences are then determined using various aspects of a potential breach that is based on a variety of considerations for the organization (Tiplady,2018). The repercussions may include financial, reputational communication, change to insurance, and changing associates. Lastly is the sum of the total impact by adding all the adjusted costs of the organization.
Additional step for the company
Adding the changed costs to project the financial implications of a data breach. This is done through the addition of all the cost that costs that are adjustable for all the public health information homes whose security score is unacceptable to evaluate a total cost that can be adjusted. The adjusted total is then calculated as a revenue percentage that is used to evaluate the critical level of a data breach.
References
Kolstad, J. T. (2012). undefined. The Value of Information, 143-172. https://doi.org/10.1007/978-94-007-4839-2_6
Lepper, M. D., Scholten, H. J., & Stern, R. M. (2007). undefined. Springer Science & Business Media.
Tiplady, P. (2018). undefined. Vision and Value in Health Information, 143-148. https://doi.org/10.1201/9781315375380-11