Kot2

In: Other Topics

Submitted By nursbettty
Words 319
Pages 2
Mr. Davis is eligible for COBRA coverage. The Consolidated Omnibus Budget Recovery Act (COBRA) was passed by congress in 1986. This act allows former employees, their spouses, and their dependent children who were previously covered under their employers group health insurance plan to temporarily continue coverage after their employment has ended. To meet qualifications for continued coverage the employer must have had at least 20 employees, and the employee cannot loose their job as a result of gross misconduct. The type of qualifying event, or the reason the employee lost their job will determine how long COBRA coverage can be continued. Mr. Davis's employers have 30 days to notify their health plan administrators of his termination and he should receive an election notice no later than 14 days after the health plan administrators have been notified. Mr. Davis will then have 60 days to decide whether or not to elect coverage. If Mr. Davis chooses to elect COBRA coverage he then has 45 days to pay the initial premium. The premiums for COBRA coverage can be substantially more expensive than what the former employee was paying under their group health insurance while employed depending on how much of the premium the former employees employer was paying. I would encourage Mr.Davis to "shop around" for individual health insurance coverage and to contact the Department's Employee Benefits Security Administration to see if he may qualify for COBRA premium reduction. If Mr. Davis has been deemed disabled due to his illness he may qualify for Medicaid.

The biggest challenge states and local governments are facing in providing care for patients like Mr. Davis who have long term, chronic illnesses and require care is funding that care. States and local governments are currently facing huge economic challenges in relation to healthcare funding. As the…...

Similar Documents

Kot2

...B. Recommendations: This attack on university was DDos attack. However, the attack initiated from the inside network. Following are the recommend defensive measures to counter such type of attack. 1. Prevent systems from installation of attack tools: The attacker was able to install attacking software on many lab computers. These computers (secondary victims) were then participated in this DDoS attack. One of the precautionary steps that can be taken to prevent such type of attack is preventing installation of distributed attack tools. An antivirus or antiTrojan should be installed. The university needs to proactive scan and test systems on the network to find installed attacking software (daemons and/or masters) in the internal network (EC-Council, 2010, p.29). 2. Load balancing: The university needs to implement load balancing which would mitigate a DDoS attack and improve normal performance as well. They should advance in and maintain the computers that can be positioned into service quickly in the event that the registration server or other services server is disabled (hot spares) (cert.org, 1997). 3. Throttling: When an attack is being carried out, throttling will prevent servers from going down. This will throttle incoming traffic such that number and load of requests for the service will be safe for the server (princeton.edu, 2004).   Deflect Attacks: They can intentionally set up systems with limited security, which is called Honeypots, to be an......

Words: 561 - Pages: 3

El Señor de los Cielos 6 Capitulo 100 | Если я завтра отсюда уйду: Фильм о Линэрд Скинэрд / If I Leave Here Tomorrow: A Film About Lynyrd Skynyrd | Frontier HDTV 720p AC3 5.1