Preview

Week # 2 Lab 2 Legal Issues in Information Security

Satisfactory Essays
Open Document
Open Document
255 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Week # 2 Lab 2 Legal Issues in Information Security
Week 2 Lab #2
Assessment Questions

1. Privacy is where a person has control their own personal data
Privacy is the individual’s right to control, the person has the opportunity to assess a situation and determine how’s it’s used. Just because information is secure it doesn’t mean it is secure.
2. In 2002 he received permission to obtain a laptop and hard drive not to acquire the data.
3. Possible consequences might be that personal information being used against the people in the VA system.
4. Yes, the disability ratings are personal healthcare information that would be a HIPPA violation.
5. Termination or demotion or revoked privileges or cut in pay or equipment reimbursement
6. Yes, as no employee would be a suspect until strong evidence is found to incriminate said employee.
7. They were demoted as they put off informing their superiors of the incident.
8. An individual’s private home was burglarized.
9. If the data was encrypted per VA policy the data loss would still be an issue due to how the information was lost.
10. Denial of personal company equipment leaving company premises and or use of VPN connection if work has to be done from home to complete an assignment before a set deadline.
11. The use of a Secure VPN connection or secure encryption would greatly help mitigate this situation.
12. The laptop and hard drive, the analyst, as well as the supervisors
13. Written documentation on the analyst taking equipment and information home would have helped immensely in mitigating this occurrence.
14. True
15. The GAO which stands for Government Accountability Office.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Unit 4 Assignment 2

    • 1005 Words
    • 5 Pages

    The use of company-owned computing devices and networks is a privilege, instead of a right, and inappropriate use can result in revocation of such privilege. Employees must remember that their behaviors represent the actions of the company, and the respect to the rights of others and all relevant laws, regulations and contracts. Employees also must be aware of that their inappropriate uses may lead to catastrophic results on the company and other employees. This acceptable use policy grants the right for users to gain access to the network of Richman Investments and also binds the said user to follow and abide accordingly to the agreements set forth for network access provided below.…

    • 1005 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unsecured Networks – Risk from using unsecured networks can be mitigated but not eliminated. Us encryption technologies to protect the confidentiality and integrity of communications, as well as using mutual authentication mechanisms to verify the identities of both endpoints…

    • 449 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    lasb 8 IS3220

    • 390 Words
    • 2 Pages

    5. If the organization implemented wireless LAN (WLAN) technology, what would you recommend regarding the use of VPNs or encryption within the…

    • 390 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    NT 2580 Project Part 2

    • 2096 Words
    • 9 Pages

    Issue five. Because Richman hosts an internet for employees to access information about the company and enroll in company benefits programs, and because Richman also hosts an extranet for its business partners, you must research and devise a method to secured networks and communications. This should include the network structure,…

    • 2096 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 4222 - 307

    • 395 Words
    • 2 Pages

    6. About the rights of individuals e.g.[10] personal data shall be processed in accordance with the rights of data subjects (individuals).…

    • 395 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Bio Ethics Project 8

    • 934 Words
    • 4 Pages

    2. In this case, how would you be able to correct your error and provide the missing documents to the patient while still protecting patient confidentiality under HIPAA?…

    • 934 Words
    • 4 Pages
    Good Essays
  • Good Essays

    All personal data is processed in accordance with the subject’s rights. They have the rights to have data about themselves removed.…

    • 1256 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Hippa Regulations

    • 339 Words
    • 2 Pages

    2. Discuss the role of HIPAA regulations in data and network security, patient consent and authorization.…

    • 339 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    5. Explain the agreed ways of working with your employer in relation to the following areas: data protection, grievance, conflict management, antidiscriminatory practice, Health & Safety, confidentiality & whistleblowing…

    • 596 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    The act contains statues that are very clear and strict on the privacy and confidentiality of healthcare information. The right to privacy is commonly referred to as a patient’s right to be left alone. A patient’s right to privacy is not only protected by HIPAA but also by constitutional, statutory, and common law provisions (McWay, 2008). A major ethical dilemma faced by health information managers is how to protect private patient information. HIPAA’s privacy rule not only defines what type of information is confidential, but also how healthcare professionals need to handle this sensitive information. Information protected by HIPAA contains identifiers. Identifiers are small pieces of personal information by which a person can be recognized such as their name, social security number, date of birth, email address, account numbers, medical record number, and facial photographs. Before any information can be used or disclosed without the direct authorization of the patient, all personal identifiers outlined by HIPAA must be removed from all documentation. Once personal identifiers are removed the information is considered de-identified health information (McWay, 2008). Analysis of de-identified information can be very useful for healthcare providers and third party payers. Information managers must be diligent in protecting all patient information before it can be…

    • 1510 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    G22 health and safety

    • 266 Words
    • 2 Pages

    d. Why is it important to evaluate information gained from reports and records in the workplace?…

    • 266 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Lawson, N. A., Orr, J. M., & Klar, D. S. (2003). The HIPAA Privacy Rule: An Overview of Compliance Initiatives and Requirements. Defense Counsel Journal, 70(1),…

    • 327 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    5. In the cases reported, which of the following items were identified as potential trigger(s) of unprofessional behaviors?…

    • 231 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    from an inadequate definition of what privacy is and the value that privacy possesses. The adherents of…

    • 2748 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    The two major issues identified in this situation is the violation against HIPPA regulations which is a US law designed to provide privacy standards to protect patients ' medical records and other health information provided to health plans, doctors, hospitals and other health care providers. This was an act developed by the Department of Health and Human Services, in which new standards provide patients with access to their medical records and more control over how their personal health information is used and disclosed. The HIPAA Privacy Rule provides federal protections for personal health information held by covered entities and gives patients an array of rights with respect to that information. At the same time, the Privacy Rule is balanced so that it permits the disclosure of personal health information needed for patient care and other important purposes (HHS.gov 2011).…

    • 586 Words
    • 2 Pages
    Satisfactory Essays