Part 1
Complete the following spreadsheets using the Risk Register Template:
- Risk Identification
- Risk Analysis
- Explain techniques for quantitative risk analysis for selected critical IT function.
- Explain techniques for qualitative risk analysis for selected critical IT function.
- Risk Response
- Analyze techniques for risk response planning for selected critical IT function.
- Risk Monitoring
- Analyze techniques for risk monitoring planning for selected critical IT function.
Part 2
Write at least a 1,050-word paper using Microsoft® Word to discuss the importance of regulatory requirements, security and privacy laws and monitoring compliance. Consider the following in your paper:
- Explain the major regulatory requirements that have a direct effect on IT in a healthcare organization when outsourcing the identified IT function.
- Explain how security and privacy laws affect the design and operation of the outsourced IT function.
- Explain the role of IT in monitoring compliance with the organizations risk management policies and plans when outsourcing the identified IT function.
Cite at least 3 reputable references. One reference must be your textbook, Managing Risk in Information Systems. Reputable references include trade or industry publications, government or agency websites, scholarly works, or other sources of similar quality.
Format your paper according to APA guidelines.