In your final meeting with the CIO, she asks that you complete and present a risk analysis on one of these outsourcing opportunities, including quantitative and qualitative risks, a risk response plan, and a risk monitoring plan in a briefing paper. Use the selected critical IT function from Week Four to complete the Risk Register Template and final paper.Part 1:Complete the following spreadsheets using the Risk Register Template:Risk IdentificationRisk AnalysisExplain techniques for quantitative risk analysis for selected critical IT function.Risk MonitoringAnalyze techniques for risk monitoring planning for selected critical IT function.Explain techniques for qualitative risk analysis for selected critical IT function.Risk ResponseAnalyze techniques for risk response planning for selected critical IT function.Part 2:Write a 700- to 1,050-word paper using Microsoft® Word to discuss the importance of regulatory requirements, security and privacy laws and monitoring compliance. Consider the following in your paper:Explain the major regulatory requirements that have a direct effect on IT in a health care organization when outsourcing the identified IT function.Explain how security and privacy laws affect the design and operation of the outsourced IT function.Explain the role of IT in monitoring compliance with the organization’s risk management policies and plans when outsourcing the identified IT function.Format your paper according to APA guidelines.Cite at least 3 peer-reviewed, scholarly, or similar references
hcis420_r3_wk5_risk_register_template.xls

Unformatted Attachment Preview

Risk ID
Number
Risk Area
Risk Identification
Description
Internal /
External /
Legal /
Regulatory /
Project /
Technical
Risk Identification
Symptoms
Risk ID
Number
Risk Identification
Risk Analysis
Description
Qualitative
Risk Analysis
Quantitative
Risk Analysis
Risk Analysis
Risk Analysis
Risk Event
Probability
High / Medium /
Low
Risk Event
Severity
High / Medium /
Low
Risk Summary
Probability x
Severity
Risk Priority
Risk ID
Number
Risk Identification
Risk Response
Strategy
Description
Accept / Mitigate
Transfer / Ignore
Risk Response Plan
Risk Trigger
Response Plan to be Activated When
These Symptoms Appear
Risk ID
Number
Risk Identification
Description
Risk Review Date
Comments
Risk Status
Active / Inactive

Purchase answer to see full
attachment