.

Tuesday, January 29, 2019

Privacy And Security Concerns Regarding Health Information Essay

trip 4.8 E-mail Goes AstrayPrimarily, the technician is the one responsible for the breach in confidentiality because he was the one who sent out the e-mails. Moreover, he did non examine instructions from Kaiser Permanente regarding the backlogged e-mails. Kaiser Permanente hired the technician to upgrade their administration. Therefore, tasks other than doing upgrades should be consulted to the company. The technician should constitute asked whether the store e-mails in the governing body should be sent out, and he should have asked what to do with them. However, Kaiser Permanente is partly responsible for the breach, because first and fore almost, since they hold millions of private randomness, they should have make sure that that information would non be compromised. They should have do their arrangement secure and only accessible to Kaiser Permanente personnel.Yes, situations like this discourage subscribers in victimisation the system of Kaiser Permanente. However, the services that Kaiser Permanente offer is of great value and subscribers will not easily discontinue their subscription. But Kaiser Permanente has to ensure their subscribers that this will not evanesce in the future by informing them what caused the breach and reassuring them that upgrades atomic number 18 being done to improve the surety of the system and the privacy of their information. The most important thing to do here is to be honest and at the same time make great efforts to secure the system of the company.Case 4.17 Patients Files Used for Obscene CallsDefinitely, solid ground checks should be conducted forrader hiring new employees because this would ensure the safety of the clients, especially in the health apportion industry. Employers should be granted access to criminal records for them to be able to advert the extent of the crime that ex-convicts have committed. Cases much(prenominal) as child enthral and indecent assault is a serious crime that should not be disregarded when hiring employees, especially when the job requires dealing with other people, children, etc. such as in the health care institution.Former employees who are effrontery access to system information that are confidential, such as passwords, etc. should be screened out from the system. In other words, once an employee is not machine-accessible with the institution anymore, his access to the system should be deleted or reset. In this case, the system of the health care institution is at fault because it failed to keep the information confidential and secure.In this case, the hospital is accountable for the actions of the technician. Primarily because they hired an employee without doing background checks, they do not monitor the system, wherein they could have detected that calls were being made and the information of the clients were being accessed, and the system is not 100 % secure.Case 4.44 University Tightens computer SecurityBecause of the wide range o f subscribers in university medical centers information systems, it becomes susceptible to hackers. In this case, they hacked into the system and used it to send hundreds of advertisements in their e-mails. The hackers wanted to rear the significant number of subscribers in the system. However, the information within the system is not precisely the target of the breach.It is not entirely the medical centers fault. This is because hackers do what they do. They find ways to get into the system even if security measures were set-up to avoid breaching the security of an information system. Therefore, even if the system is secure, hackers will unfeignedly find a way to get into the system. The medical centers fault was that they were not able to detect that the system was being hacked. They should have upgrades in the system, which will be used in monitoring the system and alarming when hackers breach the system.

No comments:

Post a Comment