breach of unsecured protected health information

please follow this structure when you write the paper.

Structure

Introduction; Facts; Issues Presented; Applicable Legal Framework; Analysis; and Conclusion.

keep the introduction and conclusion short.

Go through this article as the whole case is in these articles

http://www.startribune.com/hospitals-face-investigation-of-patient-data-theft/131925938/?refresh=true

https://www.huntonprivacyblog.com/2012/01/24/minnesota-ag-sues-debt-collection-agency-for-health-privacy-violations/.

https://www.twincities.com/2011/09/26/fairview-informs-patients-of-security-breach/.

https://www.mprnews.org/story/2012/07/31/health/accretive-settlement.

https://loriswansonlawsuits.com/accretive-health.

Your Analysis should include consideration of the legal issues raised by the specific factual situation. Include a discussion of the applicable legal principles as a background for your analysis of the specific factual situation. Analyze and evaluate the claims and defenses of all parties. For a case that went to trial, evaluate the evidence and claims/defenses on both sides and analyze the reasons for the outcome.

ANALYSIS PARAMETERS

Be sure to include:

  1. the applicable legal standard(s)(e.g. a statute, rule taken from a case we have studied, negligence standard etc.);
  2. the arguments presented by both sides under those legal standards;
  3. how did the court respond to the arguments and reach its decision (if case went to court); or how would a court be likely to respond?
  4. your own evaluation of the legal issues and positions of the parties, including public policy, if applicable. Were the arguments strong or weak? What evidence supported the claims made by each side? Do the arguments make sense? Were there reasons other than the obvious ones for the outcome or decision?;
  5. policy analysis of the issues and applicable law, and the possible or actual outcome.
  6. Analyze the ethics of the situation, using an applicable code of ethics as a point of reference
  7. List best practices/ risk management actions that you recommend based on your research.