Safety of Healthcare Information

Running head: SAFETY OF HEALTHCARE INFORMATION 1
Safety of Healthcare Information
Name
Institutional Affiliation
SAFETY OF HEALTHCARE INFORMATION 2
Safety of Healthcare Information
Part I
The change in technology has made it challenging for the inventors of the security
breaches to ensure realization of their objectives regarding achievement maintenance of security
in the healthcare centers. The failure to ensure effective of the security objectives at the
healthcare is attributable to the major work done by the hackers whose primary objective entails
the destruction of the secured sites as a way of obtaining the seemingly hidden information.
Consequently, the hackers often toil towards ensuring their establishment of new hacking skills
aimed at obtaining the confidential information regarding particular patients (Sterling, 2015).
The computer systems introduced in the global market often play a significant role in making
work easier through storage of data ensuring the provision of the cross-referenced data besides
facilitating retrieval of the information when necessary. However, this system despite its
common nature in the industries, it is often defenseless to much coercion that often contributes to
significant damage that often ranges from minor in errors of the computer system affecting the
database reliability to fires that may wipe out the entire healthcare information. There is thus the
necessity for awareness regarding the intensity of the security breaches in the healthcare system.
The first case involves the phishing emails masked as an official OCR audit notification
targeting different individuals. The phishing emails are mainly disseminated on forged letterhead
of the HHS department and appears as an official communication from the government while
targeting the staff of organizations covered by HIPAA and business partners. The emails
required the recipients to click a link concerning possible addition in the HIPAA Privacy,
Security, and Breach Rules Audit Program (HHS.gov, 2017). The link then leads the individuals
SAFETY OF HEALTHCARE INFORMATION 3
to a non-governmental website marketing cybersecurity services of a different firm. There is the
necessity for noting that the company is in no way linked with the US Department of Health and
Human Services. The phishing email targeting the different individuals aim at accessing some of
the confidential information through its disguise as official communication which it is not and
then gaining access to the information stored on the accessing devices.
Moreover, a broad trend of threats and related losses often relate to their pervasiveness
and importance in the existing computer setting and their expected growth. This often happens
because of the introduction of the computer systems with operating systems in the health care
that often makes it easier to manage the information of the company. In the recent years HIPAA
privacy, Security, and Breach Notification Audit Program have ensured identification of two
cases. The first instance entailed when a patient logged onto the healthcare system to assess their
insurance options and the healthcare center platform revealed his health status. The revelation of
the healthcare situation of a patient was evident security flow that the as well revealed the
eligibility letters addressed to people in other states (HHS.gov, 2017). Another case involved the
MNsure’s PR machines that often collaborate with the insurance agents and members of the
community towards the creation of a customer service network. However, it became apparent
that customer service system was compromised due to the security breach involving the social
security numbers. The privacy in the healthcare industry is of great significance and curbing it
necessitates the provision of software by the healthcare that ensures efficient identification of a
patient before disposal of information. The introduction of such software will provide adequate
reduction of the risks in the recent electronic based healthcare system.
Part II
SAFETY OF HEALTHCARE INFORMATION 4
Efficient addressing of the security plan necessitates the understanding of the four aspects
of privacy in the healthcare that include the personal autonomy, respect, dignity, and
individuality. Many writers depict diverse reasons for ensuring effective placement of the high
significance to defending the privacy, security, and safety of the health information while others
regard privacy as rather objectively valuable concerning the aspects that present a form of
acknowledgment of attributes that provide the public their ethical distinctiveness. Consequently,
there is the necessity for ensuring the provision of the patients with the opportunity for making
their personal decisions as they deserve respect just like the rest. The value of the individuals and
their dignity is often of equal value as that of other humans (Sterling, 2015). However, disclosing
the health of a patient to other people often results in the embarrassment of life stigma.
Therefore, there is often the need for assurance of privacy between the physician and the patient
for ultimate confidentiality.
Majority of the physicians often lack respect to most of their patients and are often busy
doing their jobs hence forgetting to pay attention to the well-being of the patients in the rooms.
Consequently, such ignorance of the patients’ interests often makes them feel disrespected and
not well served (Boerner, 2017). Such acts often arise from the fact that some of the practitioners
want to perform other duties faster to channel their attention to other personal issues. The
primary causes of the show of disrespect by the practitioners often entail the lack of effectiveness
and passion with their duties.
SAFETY OF HEALTHCARE INFORMATION 5
References
BOERNER, C. M. (2017). HIPAA Privacy, Security, and Breach Notification. Journal Of
Health Care Compliance, 19(1), 31-34.
HHS.gov, (2017). HIPAA Privacy, Security, and Breach Notification Audit Program: United
States Department of Health & Human Services. Retrieved from
https://www.hhs.gov/hipaa/for-professionals/compliance-enforcement/audit/index.html
On [18 September 2017]
Sterling, R. (2015). How to defend your practice against HIPAA violations. Ophthalmology
Times, 40(15), 71-75.

Place new order. It's free, fast and safe

-+
550 words

Our customers say

Customer Avatar
Jeff Curtis
USA, Student

"I'm fully satisfied with the essay I've just received. When I read it, I felt like it was exactly what I wanted to say, but couldn’t find the necessary words. Thank you!"

Customer Avatar
Ian McGregor
UK, Student

"I don’t know what I would do without your assistance! With your help, I met my deadline just in time and the work was very professional. I will be back in several days with another assignment!"

Customer Avatar
Shannon Williams
Canada, Student

"It was the perfect experience! I enjoyed working with my writer, he delivered my work on time and followed all the guidelines about the referencing and contents."

  • 5-paragraph Essay
  • Admission Essay
  • Annotated Bibliography
  • Argumentative Essay
  • Article Review
  • Assignment
  • Biography
  • Book/Movie Review
  • Business Plan
  • Case Study
  • Cause and Effect Essay
  • Classification Essay
  • Comparison Essay
  • Coursework
  • Creative Writing
  • Critical Thinking/Review
  • Deductive Essay
  • Definition Essay
  • Essay (Any Type)
  • Exploratory Essay
  • Expository Essay
  • Informal Essay
  • Literature Essay
  • Multiple Choice Question
  • Narrative Essay
  • Personal Essay
  • Persuasive Essay
  • Powerpoint Presentation
  • Reflective Writing
  • Research Essay
  • Response Essay
  • Scholarship Essay
  • Term Paper
We use cookies to provide you with the best possible experience. By using this website you are accepting the use of cookies mentioned in our Privacy Policy.