1-1 Discussion: Vulnerabilities in the Flow of Information

In this discussion, you will identify potential vulnerabilities in the flow of information that potentially lead to noncompliance with HIPAA regulations.

To begin, introduce yourself to your classmates and instructor. Briefly discuss your background, describe your professional goals, explain what you hope to gain from this course, and share what you enjoy doing in your free time.

Then, reflect on a real-life work experience in a healthcare setting in which you had direct or indirect involvement with possible vulnerabilities or gaps of noncompliance with HIPAA in relation to the flow of protected information within the organization. If you have not worked in a healthcare setting, reflect on an article from a current event source. In your initial post, complete the following:

  • Provide two examples of vulnerabilities or gaps of noncompliance with HIPAA that might exist in a healthcare organization.
  • What are the vulnerabilities and why might they exist?
  • How do they lead to the potential of noncompliance with HIPAA?

In response to your peers, consider their initial posts and provide best practices for how these vulnerabilities might be addressed.

To complete this assignment, review the Discussion Rubric PDF document.



I have 4 great children, 22,20,12, and 10. The 12 and 10-year-old live with me and my current wife in Spring Hill, TN which is located outside of Franklin. We have lived in this area for going on 11 years now and it has grown so fast.

I am currently employed with UHS, United Health Services, as a business analyst going on 6 months now. I love the job as it gives me the flexibility to be with my family more than in my previous job, which was as a regional manager with Acadia Healthcare. I have been in the healthcare world for going on 14 years now. From patient support to backend user support.


To me, one of the most highly concerned areas of patient data that is always at risk is staff members and the increasing use of portable devices. Those can be laptops, tablets, phones, or any other device that can hold patient information.

“In Los Angeles, medical information of about 729,000 patients was compromised by the theft of two laptops belonging to a California hospital group. The laptops, owned by AHMC based in the San Gabriel Valley, contained health and personal information about patients treated at six hospitals in the region. The AHMC Healthcare breach is the 11th biggest healthcare data breach to date, according to data from the Department of Health and Human Services.”



West K. (2014). Patient medical information at risk from stolen computers. Missouri medicine111(1), 10–12.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now