Preview

Biometrics in Healthcare

Powerful Essays
Open Document
Open Document
1609 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Biometrics in Healthcare
Biometrics in Healthcare |

Samantha Daily
1/24/2013
|

Introduction
Dialog has already started in the healthcare industry regarding the right to healthcare. The World Health Organization (WHO) declared “every country has become party to at least one human rights treaty that addresses health-related rights.” (World Health Organization, 2013) In 2009, to meet this declaration by the WHO and to improve healthcare delivery in America, President Barack Obama passed into law the Patient Protection and Affordable Care Act (PPACA). Passage of the PPACA afforded the US Government the ability to advance health information technology (HIT) and implement electronic health records (EHR), patient health records, and electronic prescribing. (Brown, 2012) A step towards implementing EHRs in medical practices was to incentivize providers to start using an EHR and use it in a meaningful way. According to the National Center for Health Statistics in 2011 “54% of providers had adopted an EHR system.” (Barrett, 2011) With an increase in patient electronic records there is a greater awareness of the need for security.
Current Security Issues
Keeping patient data secure is becoming an increasing problem. According to the Department of Health and Human Services in 2011, 67% of investigated reports had corrective actions taken. (Department of Health & Human Services) A majority of those included theft or loss of a laptop. (Center for Democracy & Technology, 2011) Just this year, there have been 16 breaches in the medical/Healthcare sector alone with an estimated 124,680 patient records exposed. (Identity Theft Resource Center, 2013) The largest facility exposed approximately 57,000 patient records. In in 2008, Providence Health and Services was fined $100,000 for compromising protected health information of approximately 386,000 patients. (Diana Manos, 2008) With these types of statistics, it’s not surprising biometric security is being considered as a possible



Cited: Agency for Healthcare Research and Quality. (2012, October). AHRQ Patient Safety Net. Retrieved January 23, 2013, from Patient Safety Net: http://www.psnet.ahrq.gov/primer.aspx?primerID=18 Barrett, C Brown, C. L. (2012). Health-care Protection and Biometric Authentication Policies: Comparative Culture and Technology Acceptance in China and in the United States. Review of Policy Research, pp. 141-159. Department of Health & Human Services. (n.d.). Health Informaiton Privacy: HHS. Retrieved January 22, 2013, from HHS.gov: http://www.hhs.gov/ocr/privacy/hipaa/enforcement/data/historicalnumbers.html Diana Manos, S Federal Trade Commission. (2012, August). Consumer Information. Retrieved January 23, 2013, from Federal Trade Commission: http://www.consumer.ftc.gov/articles/0171-medical-identity-theft Identity Theft Resource Center Rick Kam, P. &. (2012, February 08). News: Government Health IT. Retrieved January 23, 2013, from Government Health IT: http://www.govhealthit.com/news/glimpse-inside-234-billion-world-medical-id-theft World Health Organization

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Hcs 483 Wk1Dq1 2

    • 457 Words
    • 2 Pages

    Prior to the enactment of the Health Insurance Portability and Accountability Act (HIPPA) health information was able to be shared without the knowledge or permission of the patient. This information was available to just about anyone including insurance agencies, places of employment and even loan lenders. People would potentially use individuals’ health information to deny them work or a loan for their home and even impacting higher insurance rates or denial of coverage. According to U.S. Department of Health and Human Services (n.d.), “The Privacy Rule establishes a Federal floor of safeguards to protect the confidentiality of medical information. State laws which provide stronger privacy protections will continue to apply over and above the new Federal privacy standards.” (para. 1). Also, as medical records continue to move entirely to the new standard of electronic records it is important to have one standard across the country to protect everyone’s information. Electronic health records (EHR) make it easier than ever to accidentally share medical information, to include having it stolen. Medical providers are just as likely to face consequence if their facility is broken in to and the hard drive with patients information is stolen as they would be if they gave the information away themselves. In general HIPPA protects patients’ information as well as their right to be treated equally.…

    • 457 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    4. U.S. Department of Health and Human Services. ( ) Health Information Privacy. Retrieved from http://www.hhs.gov.…

    • 1432 Words
    • 6 Pages
    Powerful Essays
  • Better Essays

    U.S. Department of Health and Human Services (HHS) (n.d.). Health information privacy. Retrieved from: http://www.hhs.gov/ocr/privacy.…

    • 1172 Words
    • 5 Pages
    Better Essays
  • Good Essays

    U.S. Department of Health and Human Services. (2012). Health Information Privacy. Retrieved from California. (2012) Retrieved from…

    • 827 Words
    • 4 Pages
    Good Essays
  • Good Essays

    How can you protect a patient’s health records? We have passwords on computers, training of employees to not discuss patients, and only release information after receiving a signed consents but it that enough? Obviously that is not enough since we are all taking a class to learn how to properly safe guard patients records. This is a very complex problem. There are in some cases delays in proper medical care due to HIPPA. There are instances where a Doctor needs access to medical records quickly. Having HIPPA has fused the Medical and Information Technologies fields together.…

    • 999 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Medical identity theft is just as devastating patients as financial issues are. This type of theft is defined as the fraudulent acquisition of another person’s personal information - such as their name, Social Security number, or health insurance number - for unlawfully obtaining such items as prescription drugs or devices, or medical services (Ollove, 2014). Insurance reimbursements obtained illegally are also considered medical identity theft. According to one survey completed by the Identity Theft Resource Center, 43 percent of all identity theft is medical-related identity theft (Ollove, 2014). Under the Health Information Technology for Economic and Clinical Health Act (HITECH Act), all medical providers must notify patients and HHS when a breach of patient medical records is found. Unlike financial identity theft, it is nearly impossible to separate the thief’s medical information from the victim’s information because of the fear of medical liability (Ollove, 2014). If some information about the patient is missing and a mis-diagnosis occurs, then the chance of a malpractice lawsuit…

    • 1089 Words
    • 5 Pages
    Better Essays
  • Better Essays

    The Joint Commission

    • 1167 Words
    • 5 Pages

    The Joint Commission has a list of national patient safety goals were set in place to guide improvements in safety of patients and to help highlight any problem areas within the healthcare systems regarding patient’s safety (The Joint Commission, 2013). The goals created for patient’s safety are listed and described through evidence based solutions in order to assess each goal. The Joint Commission focuses on several topics, all of include an importance in patient safety and their quality of care (The Joint Commission, 2013).…

    • 1167 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Privacy, in healthcare is defined as patient’s right to control the disclosure of his or her confidential personal information. Security is defined as all the methods, processes and technology used to protect the confidentiality and safety of patient’s personal information. Privacy is very important aspect of the patient–physician relationship. Patients share personal information with their physicians to facilitate correct diagnosis and treatment, and to avoid adverse drug interactions. Privacy and security of patients health record has always been an important issue for the healthcare facilities. The need for stronger measures for protecting patient’s information is essential with the advent of Electronic Health Record…

    • 1261 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Medical Identity Theft

    • 638 Words
    • 3 Pages

    Medical identity theft is when someone uses your personal identity to use your medical insurance benefits to get free medical services and/or make false claims to gain financial assistance by using your identity. Medical identity theft accounts for 3 percent of identity theft crimes, or 249,000 of the estimated 8.3 million people who have had their identities stolen in 2005, according to the Federal Trade Commission. It is estimated that people who are affected by this crime are left with $40,000 + in bills for services they never used. Medical identity theft can take place in private doctor’s offices, hospital’s, or pharmacy’s. A single person or a group could be involved in this crime. Some people fear that with the electronic medical records from paper that it may be easier to get peoples medical identity. Many people don’t even realize that they have been a victim of this crime until months to years down the road.…

    • 638 Words
    • 3 Pages
    Good Essays
  • Good Essays

    U.S. department of Health & Human services.HHS.gov Improving the health, safety and well being of America Health information privacy retrieved June 26, 2011 from: http://www.hhs.gov…

    • 1262 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Health Care Industry

    • 614 Words
    • 3 Pages

    HIPAA is the acronym for the Health Insurance Portability and Accountability Act that was passed by Congress in 1996. The HIPAA Privacy regulations require health care providers and organizations, as well as their business associates, develop and follow procedures that ensure the confidentiality and security of protected health information (PHI) when it is transferred, received, handled, or shared. This applies to all forms of PHI, including paper, oral, and electronic, etc. Furthermore, only the minimum health information necessary to conduct business is to be used or shared.…

    • 614 Words
    • 3 Pages
    Good Essays
  • Best Essays

    (2005, December 14). Medicare Program - General Information. Retrieved March 8, 2009, from HHS.gov Web site: http://www.cms.hhs.gov/MedicareGenInfo/…

    • 2781 Words
    • 12 Pages
    Best Essays
  • Best Essays

    References: Author Unknown. Breach Report 2010, Redspin Inc. Dec. 2010. Retrieved from http://www.redspin.com/resources/whitepapers-datasheets/index.php on April 19, 2012. Badzek, L., Gross, G. Confidentiality and Privacy: At the Forefront for Nurses. The American Journal of Nursing, Vol. 99, No. 6 (June, 1999), pp.52-54. Lippincott Williams & Wilkins. Retrieved April 18, 2012 from http://www.jstor.org/stable/3472150. Byfield, E. 315,000 Patients ' Information Disappears From Emory Healthcare. WSBTV. Retrieved April 18, 2012 from file:///F:/Ethics%20information%20age/315,000%20patients%27%20information%20disappears%20from%20Emory%20Healthcare%20_%20www.wsbtv.com.htm Dixon, P. MEDICAL IDENTITY THEFT: The Information Crime that Can Kill You, March 3, 2006. World Privacy Forum. Retrieved from http://www.worldprivacyforum.org/pdf/wpf_medicalidtheft2006.pdf on April 24, 2012. Foreman, Judy (26 June 2006). "At Risk of Exposure”. Los Angeles Times. Retrieved April 23 , 2012. Gellman, R. Fact Sheet 8a: HIPAA Basics: Medical Privacy in the Electronic Age. Privacy Clearing House. March, 2012. Retrieved April 19, 2012 from http://www.privacyrights.org/fs/fs8a-hipaa.htm. Health Insurance Portability and Accountability Act of 1996, 42 U.S.C. § 1320d-9 (2010).…

    • 1982 Words
    • 57 Pages
    Best Essays
  • Better Essays

    In the world of technology today, consumers often purchase items through the internet using their personal information such as name, date of birth and credit card numbers. This information can easily be stolen from someone who seeks to exploit weakness in a computer network. According, to (Gagne, 2012), “data breaches often occur through technical vulnerabilities, malware, compromised user credentials or opportunist attackers”. Healthcare organizations maintain patient medical and personal information through an electronic source called the electronic health record. Healthcare quality and safety requires that the right information be available at the right time to support patient care and health system management decisions. Data breaches in healthcare have become common within the last few years which is a violation of the Health Insurance Portability Accountability Act of 1996 and patient privacy. Data security is a major concern pertaining to consumers choosing a health care organization to fit their needs. Care providers and insurance companies face the increased enforcement of regulatory requirements to ensure patients of their personal information secure. The key steps to achieving data security in healthcare organizations is to following policies and procedure, conduct audit trails, data classification, data protection, encryption and disaster recovery/business continuity.…

    • 1491 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Biometrics

    • 774 Words
    • 2 Pages

    This paper will discuss biometrics and the concerns that individuals have regarding their privacy. People tend to resist biometrics as a method of identification because of their concerns that their privacy will be invaded or belief that the technology is too intrusive on their personal lives. In this paper, some of the current privacy problems related to biometrics will be discussed. A few of the mechanisms that could mitigate these problems and concerns will be identified. In addition, some methods of biometrics that would not meet with undue resistance from potential users will be recommended to my manager to replace password-based access controls. This paper is intended to provide the reader with an overview of biometrics and to also address the associated privacy concerns.…

    • 774 Words
    • 2 Pages
    Good Essays