Preview

Computer Ethics: HIPPA, CIA And Safeguards

Better Essays
Open Document
Open Document
1284 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Computer Ethics: HIPPA, CIA And Safeguards
HIPPA, CIA and Safeguards
Percy A. Grisby II
Computer Ethics
January 16, 2015
Professor Sonya M. Dennis

Describe the security issues of BCBST in regard to confidentiality, integrity, availability, and privacy based on the information provided in the BCBST case.
To begin with the enforcement movement coming about because of HITECH Breach Notification Rule: Blue Cross Blue Shield of Tennessee (BCBST) has consented to pay the U.S. Bureau of Health and Human Services (HHS) $1,500,000 to settle potential infringement of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) Privacy and Security Rules, Leon Rodriguez, Director of the HHS Office for Civil Rights (OCR), affirmed today. BCBST has likewise consented to
…show more content…
HHS Office for Civil Rights implements the HIPAA Privacy and Security Rules. The HIPAA Privacy Rule gives people rights over their secured health data and sets governs and confines on who can take a gander at and get that health data. The HIPAA Security Rule ensures health data in electronic structure by obliging elements secured by HIPAA to utilize physical, specialized, and authoritative shields to guarantee that electronic ensured health data stays private and secure.
The HITECH Breach Notification Rule requires secured elements to report an impermissible utilization or revelation of ensured wellbeing data, or a "rupture," of 500 people or more to HHS and the media. Littler breaks influencing short of what 500 people must be accounted for to the secretary on a yearly premise. (HHS settles HIPAA case with BCBST for $1.5 million, 2012)
Describe the HIPPA security requirement that could have prevented each security issue identified if it had been
…show more content…
(Mullen, 2012)
Analyze the security issues and the HIPAA security requirements and describe the safeguards that the organization needs to implement in order to mitigate the security risks. Ensure that you describe the safeguards in terms of administrative, technical, and physical safeguards. Security risk examination should be the first request of business, if this hasn’t been performed in the previous year. There needs to be verification that all regions have been investigated and taken care of from a security standpoint. When you take for granted something you think is immaterial you could end up with a security problem that is paramount, trying to address it then will have you playing catch up. To date this is no evidence of any abuse of information from the stolen hard drives as indicated by BCBST. The organizations’ reaction incorporated the encryption of all of its information and additional examinations. Tena Roberson, security officer for BlueCross stated in an announcement, “since the burglary, we have worked industriously to restore the trust of our partners by showing that we are restricting the dangers from this wrong doing and making critical ventures to guarantee that their data is protected at all times,” this was announced to HC

You May Also Find These Documents Helpful

  • Powerful Essays

    Create 5- to 7- Microsoft® PowerPoint® slides providing HIPAA Privacy and Security Rules and the reasons those rules do or do not apply to the chosen system.…

    • 834 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    In this week’s assignment, you are asked to research HIPAA and how it has provided…

    • 351 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    HIPAA (1996) Compliance

    • 657 Words
    • 3 Pages

    HIPAA (1996) compliance HCS/545 10/29/12 By Sunao Slayton, Bonnie Zapletal Julienne Auguste, Toccara Grant Introduction     Responded to the situations in a way that meets HIPAA (1996) privacy, security, and HITECH (2009ond to the) breach notice requirements. Ethical issues that relate to this situation.…

    • 657 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    Foremost in compiling a health care risk assessment will be to ensure all methodologies take into account compliance of the U.S. Health Insurance Portability and Accountability Act (HIPAA) of 1996. The healthcare provider must comply with the HIPAA Privacy and Security Rules in order to avoid penalties.…

    • 311 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    HIPAA Security Rule

    • 170 Words
    • 1 Page

    With so many health organizations turning to electronic transfer and receiving of individual health information, certain rules must be in place to ensure health information is kept confidential. In the article “Summary of the HIPAA Security Rule” defines the different roles that the rule covers. Here are some examples of what the HIPAA security rule covers: administrative safeguards, physical and technical safeguards, policies and procedure requirements and much more.…

    • 170 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    HIPAA allows patients’ health information to be disclosed under some circumstances, such as 1) to meet law requirements; 2) for reporting of abuse, neglect, and domestic violence; 3) for monitoring of healthcare operations; 4) to be presented as evidence in legal proceedings; 5) for assistance with police investigation; 6) for medical examinations and funerals; 7) for organ donation; 8) for research; 9) to avoid a significant threat to health or safety; 10) for workers’ compensation payments; 11) to execute government…

    • 81 Words
    • 1 Page
    Powerful Essays
  • Good Essays

    The Health Insurance Portability and Accountability Act (HIPAA), became law in 1996. It requires health care providers, insurance companies and others involved in health care transactions to provide security on any system containing personal health information, store and transmit that information according to standardized rules, and place an automatic audit on files to help keep track of who should have access to them and whether those access rules have been violated. HIPAA complaints and violations that aren't fixed quickly are subject to a fine of between $100 per incident or a maximum of $25,000 per year for violation of a specific rule.…

    • 783 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Put a set of standards that would protect the patients’ information that would be suitable in the health care services. Those privacy practices would have the follow the HIPPA Privacy Rule.…

    • 434 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Over the years since the inception of HIPAA, it is hard not to notice the influence it brought on to the patients, the healthcare industry, the health information management and technology, and other entities in securing the confidentiality, security, and privacy of PHI. In addition, the HITECH Act and its HIPAA modification released in January 2013 greatly invigorated the HIPAA of 1996 (Solove, 2013). Definitely, the most important health care changes over the past couple of decades is the growing interest in health information privacy and security (Solove, 2013).…

    • 90 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Hippa Regulations

    • 339 Words
    • 2 Pages

    2. Discuss the role of HIPAA regulations in data and network security, patient consent and authorization.…

    • 339 Words
    • 2 Pages
    Good Essays
  • Good Essays

    HIPAA Audit Report

    • 877 Words
    • 4 Pages

    Although it's important to enforce HIPAA compliance at any time, it is especially important to reiterate the importance of compliance to your staff at this time. Remind everyone who handles PHI of how to safely work with sensitive patient health data, and the importance of following practice policies. The more HIPAA regulations are enforced, discussed, and training resources are provided, the more likely your operations are to be in 100% compliance.…

    • 877 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    The Health Insurance Portability and Accountability Act of 1996 (HIPAA) was created to develop regulations to protect the privacy and security of certain health information; which shouldn’t be accessible to individuals without the need to know. The U.S. Department of Health and Human Services (HHS) is responsible for HIPAA compliance within the Privacy Rule as well as the Security Rule. This Privacy Rule develops national standards for protecting certain health information while the Security Rule establishes a national set of security standards for protecting specific health information that is held or transferred in electronic form.…

    • 470 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    December 28, 2000, the rule became final and it stated that it applied to health plans, health care clearinghouses, and certain health care providers, present standards with respect to the rights of individuals who are the subjects of this information, and the authorized and required uses and disclosures of this information. (Standards for Privacy of Individual Identifiable Health Information, 2000) On March 27, 2002, there were modifications to the Privacy Rule and they were made final August 14, 2002. The final modifications added to the rule that it would protect the health care providers that conduct certain health care transactions electronically. The Privacy Rule requires safeguards that are appropriate, in order to protect the privacy of personal health information and sets limits and conditions on the uses and disclosures that may be made of such information without authorization from the patient. This section of HIPAA, also gives the patient their rights over their health information, which includes the rights to examine, understand, and receive a copy of their health records, and to request that corrections be made if any are…

    • 595 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Why Is Hippa Important

    • 649 Words
    • 3 Pages

    Guidelines to measure and sustain adequate protection under the PHI seems to be dangling in areas of intent. Intending . Breaching the HIPPA laws should enforce more strict penalties for exposed reports. Penalties have been set forth to punish those who have breached the HIPPA laws. As society continues to grow in technology it becomes more of a risk for personal data to be subject to anyone's leisure. Look at the easy access to online medical reports and personal information. Most doctor offices and hospitals have created online patient portals to give patients immediate access to their medical records. Much of personal data and your medical information is placed in these websites. This gives opportunities for identity theft as well as your financial information is available.This information is suppose to be confidential but someone has to add the data to the system and access is available among staff, insurance companies , medical personnel and others databases.…

    • 649 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Risk Assessment Lab 1

    • 741 Words
    • 5 Pages

    Finally, you mapped these risks to the domain that was impacted from a risk management…

    • 741 Words
    • 5 Pages
    Good Essays