Miyerkules, Mayo 2, 2012

Chapter 4 Case Study

Discussion Questions

1. What type of security breaches of medical record are commonly today?
Answer  
there are many types of Security breaches today, the most common are viruses than can destroy yoy computers hard drives and files.

2. What measures are being taken by the government and private industry to safeguard EHR's?


Answer

Healthcare organizations are entrusted with the most private information of their patients and employees. They have a legal, moral, and ethical duty to protect all clinical and research information by ensuring that security and privacy safeguards are in place. A higher degree of control is necessary to prevent unauthorized access to especially sensitive information. This is particularly true within the context of the electronic health record (EHR).
This practice brief identifies categories of health information that are afforded special protections under law or may otherwise require a higher degree of security. It recommends system features and practices that will help secure sensitive information in EHRs and afford organizations satisfactory assurances that sufficient safeguards shield this information from misuse.

Reference:

3. How do you think the implementation of ARRA will affect the privacy of our healthcare and personal data? What breaches do you foresee? How can they be forestalled?
Answer
Within healthcare organizations, the temptation for some staff can be great: what harm can come from a peek at a celebrity’s health information or a next door neighbor’s record? At one time this act might have gone unnoticed, unrecorded, and without penalty.
But new privacy protection laws included in the American Recovery and Reinvestment Act (ARRA) have created the first federal punishment for such snooping.
ARRA layers on new privacy protections and prosecution powers to discourage unauthorized access to patient information. Under ARRA, even a brief unauthorized look at a medical record can mean large monetary fines for individuals and facilities. Through a wide range of provisions, Congress used ARRA as an attempt to increase patient trust that the healthcare industry will protect their personal information.
ARRA’s privacy provisions represent a “major change in privacy law,” says Deven McGraw, JD, LLM, MPH, director of the Health Privacy Project at the Center for Democracy and Technology, based in Washington DC. McGraw also serves on the Health IT Policy Committee, which makes recommendations on ARRA to the Office of the National Coordinator for Health Information Technology.
“The biggest [change] since HIPAA was enacted,” she says, “and there hasn’t yet been a lot of guidance coming out of the regulators about how to comply with both [state and federal law] and what the rules really mean. So this creates a lot of uncertainty in the marketplace.”
Across the country, providers reviewing the new ARRA regulations face the task of adapting their privacy policies and procedures to meet both state and federal requirements. This task is amplified in California, where just months ago healthcare privacy policies were overhauled with strict new state laws.
Prominent in California’s laws are tough new requirements on reporting privacy breaches and notifying individuals that their health information may have been compromised. California’s laws had been in effect approximately six weeks when the first-ever federal requirements on data breach notification were announced.
California’s HIM professionals have their work cut out to ensure their facilities meet both state and federal laws on notification, an exercise that all states with notification laws face.
Discussion Questions
1. How does Google's business model use personal data?
Answer
 Google is firmly committed to the privacy of our advertisers and users. [ While Google does add a cookie to a user's computer when he/she clicks on an ad, this cookie expires in 30 days, and Google does not associate a user's search activity with his/her ad click history. Further, Google does not collect or track personally identifying information, and does not reveal individual information to third parties. Users who do not wish to participate in tracking activities can easily disable Google's conversion tracking cookie in their Internet browser's user preferences settings. These users will not be included in your conversion tracking statistics
Reference
2. What do you think are the major privacy concerns raised by Google's business model and applications?
Answer
I think the major privacy concerns raised by Google's business model and applications is there technology was very open to the public and so others can sneak on it
3. Do you think Google has taken adequate measures to protect its user's privacy? Explain your answer.

Answer
Google has experienced a great deal of consistent growth since its beginnings in 1998.
Google’s initial product provided to the public was its search engine and searching capabilities.
Here the first instance of privacy issues can be seen. Google’s search engine, like almost every
search engine, monitors and remembers a user’s previous searches. The Google search engine
uses tracking cookies to allow for the gathering of information. A cookie is a file that the website
sends to your computer and stores data on while you use the site.Google states, “We use cookies to improve the quality of our service by storing user preferences and tracking user trends, such as how people search.”Cookies were initially thought to be only accessible by the website that held the cookies; however, with increased advertising technology and cookies  provided by these companies, information from cookies can be attained by those who want it. A detailed description of what different IP addresses search for can be created by Google. This practice does not respect the rights of informational privacy for Google users.

     




  

Walang komento:

Mag-post ng isang Komento