The Health Insurance Portability and Accountability Act was created August of 1996 by the United States Congress and signed by President Bill Clinton. The Department of Health and Human Services was asked to develop regulations for the use of electronic transaction standards, security, privacy, and uniform identification numbers for physicians, health plans and purchasers of health care and so on. Some of these regulations are published while some are still in the draft form. HIPAA is the acronym for the Health Insurance Portability and Accountability Act of 1996. HIPAA is responsible for health insurance coverage for workers and their families, especially when the worker changes or lost their jobs. President Clinton signed this on August 21, 1996. It was considered a Public Law 104-191. To decrease the organizational costs of health care a separate section is included in the law. It is required by the law that all health plans, including ERISA and health care clearinghouses and any dentist who transmits health information in an electronic transaction are required by HIPAA to use a standard electronic device. Most people believe that their medical or other health information is private and should be protected, and we want to know who has access to this information. The Privacy Rule which is a Federal law gives you the right to your health information and sets rules and limits on who can look at and receive your health information. The Privacy Rule is balanced so that it permits the disclosure of personal information needed for patient care and other important purposes. It also applies to all forms of individual protected health information whether it is electronic, written or oral. The Security Rule which is also a Federal law protects health information in electronic form which requires entities covered by HIPAA to ensure that electronic protected health information is secure. We know that every problem s a solution, it might be complete or incomplete, but still there is a hope. On the technical side, healthcare organizations can use security technologies such as passwords, access controls, firewalls and encryption etc. These will protect data that is stored in enterprise computers. To be on the safe side they should be trained so that they may understand the use of security technologies. Health insurers and providers who are covered entities must comply with you to ask to see and get a copy of your health records. You can get a report on when and why your health information was shared for certain purposes. An individual with a pre-existing condition who has group health coverage may obtain new coverage with a reduced or exclusion period for a pre-existing condition. The new coverage must be either an individual policy from the same health carrier that offered the previous group coverage. PORTABILITY
A group coverage or the special group to individual portability coverage established by each state. When medical records and information technology meet with each other, a very big question of privacy arises. If the record falls into the wrong hands, what would happen to the patient? How can we secure medical records from the hackers. As we all know that quality health care is dependent on quality information and the procurement of information is becoming very risky every day. The healthcare industry is steadily moving to base patient records and the delivery of health care information. For all these information the use of computer networks has heightened concerned about the security of that information. Since the networking technology is becoming more common with every passing of the day, therefore it has also very necessary to implement safeguards to protect the privacy of patient data through employing adequate security technology into the network infrastructures. According to Cisco Systems health care industry has the highest percentage o Internet vulnerabilities. For example the vulnerability found in health...
Please join StudyMode to read the full document