Huwebes, Mayo 3, 2012

Case Study : Chapter 4

Discussion Questions

1. What type of security breaches of medical record are commonly today?
Answer:
In my search to find the types of security breaches of medical records that are common I found: In October 2008, hackers broke into a data goldmine at the University of California, Berkeley. They infiltrated 20 separate databases kept on a server at the health services center and over a span of six months, stole Social Security numbers, birth dates and addresses. In some cases they lifted immunization records.
Shelton Waggener, the university's associate vice chancellor and chief information officer, suspects the thieves had been scanning millions of IP addresses looking for a weak link and stumbled into the server. On April 21, administrators learned of the break-in when they discovered a taunting message hinting at the hackers' accomplishment. "It was a version of 'Kilroy was here,'" says Waggener.



link: http://www.forbes.com/2009/06/03/health-identity-theft-lifestyle-health-medical-records.html

2. What measures are being taken by the government and private industry to safeguard EHR's?
Answer:
Searching the net a stumbled upon :

Healthcare organizations are entrusted with the most private information of their patients and employees. They have a legal, moral, and ethical duty to protect all clinical and research information by ensuring that security and privacy safeguards are in place. A higher degree of control is necessary to prevent unauthorized access to especially sensitive information. This is particularly true within the context of the electronic health record (EHR).
This practice brief identifies categories of health information that are afforded special protections under law or may otherwise require a higher degree of security. It recommends system features and practices that will help secure sensitive information in EHRs and afford organizations satisfactory assurances that sufficient safeguards shield this information from misuse.
HIM professionals must be aware of high-risk groups and be able to assess whether electronic systems include features and functionality that may increase risk of inappropriate use and disclosure or offer additional layers of protections for sensitive information.
link: http://library.ahima.org/xpedio/groups/public/documents/ahima/bok1_039956.hcsp?dDocName=bok1_039956

3. How do you think the implementation of ARRA will affect the privacy of our healthcare and personal data? What breaches do you foresee? How can they be forestalled?
Answer:
 ARRA aslo requires healthcare institutions to notify individuals who are affected by security breaches, provides for increase fines for noncompliance, and authorizes state attorneys general to prosecite institutions violating HIPAA regulations. Furthermore, The clear intent of these provisions is to increase enforcement of HIPPA, The development of procedures, standards, and technology is left to the private sector, which clearly recognizes htat there are major challenges ahead  and has begun to organize to meet these challenges.

Discussion Questions

1. How does Google's business model use personal data?
Answer:
First, The Google Business Module is Founded in 1998 by Stanford graduate students Larry Page and Sergey Brin, Google is the dominant search company on the Internet. The company's primary revenue source comes from advertising related to Internet searches. But it is not the only revenue source.
How it Works: When a user clicks on an AdWords text ad, the company or individual who composed the ad is charged a fee every time someone clicks on the ad. This type of advertising is known as pay per click (PPC) advertising. Additionally, Google pays a commission to websites, blogs, and other online destinations to display the Google ads on their sites. This is the AdSense program.

2. What do you think are the major privacy concerns raised by Google's business model and applications?
Answer:
 Data Leaks
On 10 March 2009, Google reported, for example, that a bug in Google Docs had allowed unintended access to some private documents. It was believed that 0.05% of all documents stored via the service were affected by the bug. Google claims the bug has now been fixed.

courtesy of wikipedia.org
 
3. Do you think Google has taken adequate measures to protect its user's privacy? Explain your answer.
 Answer:
Yes, because of its personal user information that are vital and if exposed may prove to be fatal on the users part in terms of privacy.

Walang komento:

Mag-post ng isang Komento