Copy and Paste text into a spreadsheet HIPAA 4-30-2015
$10-30 USD
Pagado a la entrega
We have three documents that need to have the questions, regulation number, category, question number, and three notes sections to be entered into a spreadsheet.
These three documents are attached.
Please provide a sample of the first questions in a completed spreadsheet with your bid.
You must copy and paste, to keep the documents formatting to be carried over into the spreadsheet.
There are about 175 questions.
The spreadsheet will have the following fields format in this order:
Question #
Regulation
Category
Question
Things to Consider to Help Answer the Question
Possible Threats and Vulnerabilities
Examples of Safeguards
An example for the finished entry into the spreadsheet into the 7 different fields
Field 1: T2
Field 2: 164.312(a)(1)
Field 3: Standard
Field 4:
Does your practice have policies and procedures to grant access to ePHI based on the person or software programs appropriate for their role?
Field 5:
Things to Consider to Help Answer the Question:
Consider that written policies and procedures that:
Can drive the development of processes and adoption of standards and controls, which reduce risk to ePHI
Can provide essential information for privacy and security awareness and role-based training.
Field 6:
Possible Threats and Vulnerabilities:
If your practice does not have policies that explain how a user's need to know is verified before the least privileges are granted, users might be assigned greater access privileges than is needed based on the role and responsibilities.
Some potential impacts include:
" Unauthorized or inappropriate access to ePHI can compromise the confidentiality, integrity, and availability of your practice's ePHI.
Unauthorized disclosure (Including disclosure through theft or loss) of ePHI can lead to identity theft.
Accurate ePHI may not be available when needed, which can adversely impact your healthcare professionals' ability to diagnose and treat their patients.
Field 7:
Examples of Safeguards:
Some potential safeguards to use against possible threats/vulnerabilities. NOTE: The safeguards you may choose will depend on the degree of risk (likelihood) and the potential harm that the threat/vulnerability poses to you and the individuals who are the subjects of the ePHI.
Implement technical policies and procedures for electronic information systems that maintain ePHI to allow access only to those persons or software programs that have been granted access rights as specified in §164.308(a)(4).
[45 CFR §164.312(a)(1)]
Develop, document, and disseminate to workforce members an access control policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and procedures to facilitate the implementation of the access control policy and associated access controls.
[NIST SP 800-53 AC-1]
You have 3 days or less to complete this project
Funds will be placed in escrow
Nº del proyecto: #7585659
Sobre el proyecto
14 freelancers están ofertando un promedio de $26 por este trabajo
Sir, I am well versed in this kind of jobs and can do your project as per requirement. I have over 8 years of experiences and will deliver flawless work. I am very much able to work on this. ***I am ready Más
Hi! Please send me message so that I can send you the sample file in excel. Thanks Khurram .
Hi, I am good at excel and word documents. I can transfer the data into excel from word document. Looking in anticipation to start the work
Hello, I have made sample.I just need your approval to show you and discuss further. Thanks Motiurlaw
Having more than 11 years of experience in this area. Hence I can complete the task very quickly without compromising the quality.