Respond…disagree … min 100
One of the first things I thought of when I read this dq was the HIPPA act. HIPAA sets the standard for sensitive patient data protection. Certainly the protection of PHI certainly carries inherent consequences if patients information is compromised. Companies that deal with protected health information (PHI) must have physical, network, and process security measures in place and follow them to ensure HIPAA Compliance. The HIPAA Privacy Rule establishes standards for protecting patients’ medical records and other PHI which would assure a given client that the information is being protected using need to know security practices in securing this type of information. Working in this industry ways to secure this type of information include having both physical and technical safeguards. Physical safeguards include limiting the facility access and control with authorized access. Have policies about use and access to workstations. Also restrictions for transferring, removing, disposing and re-using electronic media and ePHI. Technical safeguards can include using unique user IDS, having automatic log off as well as encryption and decryption. Creating audit reports that record activity on hardware and software. To help ensure HIPAA compliance, the U.S. government passed a supplemental act, The Health Information Technology for Economic and Clinical Health (HITECH) Act, which raises penalties for health organizations that violate HIPAA Privacy and Security Rules. The HITECH Act was put into place due to the development of health technology and the increased use, storage, and transmission of electronic health information.
References:
HIPAA Journal. (2019). HIPAA compliance checklist 2018-2019. Retrieved from https://www.hipaajournal.com/hipaa-compliance-checklist/
Kohgodhal Ajmal. (2018). What is HIPAA security rule and privacy rule? Retrieved from https://www.skyhighnetworks.com/cloud-security-blog/what-is-hipaa-security-rule-and-privacy-rule/
Rouse Margaret. (2019). Cybersecurity. Retrieved from https://searchsecurity.techtarget.com/definition/cybersecurity