[et_pb_section fb_built="1" specialty="on" _builder_version="4.9.3" _module_preset="default" custom_padding="0px|0px|0px|||"][et_pb_column type="3_4" specialty_columns="3" _builder_version="3.25" custom_padding="|||" custom_padding__hover="|||"][et_pb_row_inner _builder_version="4.9.3" _module_preset="default" custom_margin="|||-44px|false|false" custom_margin_tablet="|||0px|false|false" custom_margin_phone="" custom_margin_last_edited="on|tablet" custom_padding="28px|||||"][et_pb_column_inner saved_specialty_column_type="3_4" _builder_version="4.9.3" _module_preset="default"][et_pb_text _builder_version="4.9.3" _module_preset="default" hover_enabled="0" sticky_enabled="0"]
-
QUESTION
Do an Internet search for a recent article or news story discussing a significant breach under the HIPAA Privacy and Security rules. Using your own words, write a summary of the article, and discuss how the organization could have prevented or mitigated the risk of the breach. You must use your own thoughts and words - you may include no more than 15% of directly quoted, and properly cited, references.
[/et_pb_text][et_pb_text _builder_version="4.9.3" _module_preset="default" width_tablet="" width_phone="100%" width_last_edited="on|phone" max_width="100%"]
Subject |
Article Analysis |
Pages |
2 |
Style |
APA |
[/et_pb_text][/et_pb_column_inner][/et_pb_row_inner][et_pb_row_inner module_class="the_answer" _builder_version="4.9.3" _module_preset="default" custom_margin="|||-44px|false|false" custom_margin_tablet="|||0px|false|false" custom_margin_phone="" custom_margin_last_edited="on|tablet"][et_pb_column_inner saved_specialty_column_type="3_4" _builder_version="4.9.3" _module_preset="default"][et_pb_text _builder_version="4.9.3" _module_preset="default" width="100%" custom_margin="||||false|false" custom_margin_tablet="|0px|||false|false" custom_margin_phone="" custom_margin_last_edited="on|desktop"]
Answer
The HIPAA Privacy and Security Rules
The Health Insurance Portability and Accountability Act (HIPAA) was enacted to protect patients' personal health information from being released without explicit consent. The law has sections such as HIPAA security that mandate healthcare organizations to put measures that protect patients' electronic data from being accessed by unauthorized individuals without their consent. However, there are several instances where the HIPAA security rule has been breached, resulting in the loss of patients personal health information,
According to Davis (2020), in 2017, Lifespan, the largest hospital in Rhodes Island, was forced to notify at least 20,000 patients of the possibility of their personal and protected health information being in unauthorized hand after a laptop containing the information was stolen from an employee of the organization. The loss of the laptop meant the thieves have access to all protected health information (PHI) and could use the information to steal the patients' identity or just blackmail mail them based on their medical diagnoses, especially those that are not supposed to be known publicly. The organization paid a fine of $ 1.04 million for the violation of various elements of the HIPAA security law.
The organization could have prevented the risk of the breach in the following ways; first, physical security at their premises and warming employees against taking office computers out of the secure facility. The move reduces theft of the computers. Secondly, the company should have encrypted the data its stores on its computers to make it inaccessible to any unauthorized person even if they come across the laptop. The stolen laptop contained information that was not encrypted. Additionally, the organization should retrain its employees on HIPAA security law compliance. Such training would make employees appreciate the use of passwords to protect their work computers, thus reducing the ease of unauthorized access to the information contained in such devicesfor generalizing the study’s findings.
[/et_pb_text][/et_pb_column_inner][/et_pb_row_inner][et_pb_row_inner _builder_version="4.9.3" _module_preset="default" custom_margin="|||-44px|false|false" custom_margin_tablet="|||0px|false|false" custom_margin_phone="" custom_margin_last_edited="on|desktop" custom_padding="60px||6px|||"][et_pb_column_inner saved_specialty_column_type="3_4" _builder_version="4.9.3" _module_preset="default"][et_pb_text _builder_version="4.9.3" _module_preset="default" min_height="34px" custom_margin="||4px|1px||"]
Related Samples
[/et_pb_text][et_pb_divider color="#E02B20" divider_weight="2px" _builder_version="4.9.3" _module_preset="default" width="10%" module_alignment="center" custom_margin="|||349px||"][/et_pb_divider][/et_pb_column_inner][/et_pb_row_inner][et_pb_row_inner use_custom_gutter="on" _builder_version="4.9.3" _module_preset="default" custom_margin="|||-44px||" custom_margin_tablet="|||0px|false|false" custom_margin_phone="" custom_margin_last_edited="on|tablet" custom_padding="13px||16px|0px|false|false"][et_pb_column_inner saved_specialty_column_type="3_4" _builder_version="4.9.3" _module_preset="default"][et_pb_blog fullwidth="off" post_type="project" posts_number="5" excerpt_length="26" show_more="on" show_pagination="off" _builder_version="4.9.3" _module_preset="default" header_font="|600|||||||" read_more_font="|600|||||||" read_more_text_color="#e02b20" width="100%" custom_padding="|||0px|false|false" border_radii="on|5px|5px|5px|5px" border_width_all="2px" box_shadow_style="preset1"][/et_pb_blog][/et_pb_column_inner][/et_pb_row_inner][/et_pb_column][et_pb_column type="1_4" _builder_version="3.25" custom_padding="|||" custom_padding__hover="|||"][et_pb_sidebar orientation="right" area="sidebar-1" _builder_version="4.9.3" _module_preset="default" custom_margin="|-3px||||"][/et_pb_sidebar][/et_pb_column][/et_pb_section]