SlideShare a Scribd company logo
1 of 11
Page 9 of 15
Capstone Project
Yaima Ortiz
IDS-4934
March 1st, 2020
Abstract
Topic:
Privacy- What medical information should be confidential?
Who, if anybody, should have access to medical records?
Thesis Statement
In healthcare centers and overall privacy is the right of every
US citizen that should be protected in all its forms by the
healthcare organization.
Rationale
1. The purpose of this paper is to identify why security
measures are necessary to protect one’s privacy in the medical
industry.
2. There are numerous laws, policies and healthcare
organizational rules and regulations and statistics that would be
helpful for conducting this research.
3. Privacy of a person whether this is me or you, is important
then everything. I want to talk on this topic because I think
most of us do not know what is happening to us.
4. I have selected textual analysis of books and available
internet sources. The reason of this limited research
methodology is that I cannot perform field study because of
shortage of time.
Rough Draft Ideas
Identity theft in healthcare industry become a common practice
and leads to information leakage that may destroy someone’s
life. We can eliminate this human right violation by enforcing
effective and practical laws. Healthcare organizations should
understand their responsibilities and tighten security to protect
information of patients.
Table of Contents
Introduction 3
Overview of Privacy Protections with Respect to Medical
Records 4
Data Breaches in the Healthcare Industry 5
Healthcare is the biggest Target for Cyber Attack 7
Penalties and Punishments for Hacking Personal Information 9
Penalties 9
Devastating Consequences of Healthcare Data Breaches 10
Conclusion 10
Recommendations 11
Bibliography 12
Introduction
While operating in healthcare organizations need to gather
patient’s information that is mostly personal information. It is
the moral and legal responsibility of health care organizations
to protect the information of their patients and do not share it
with people outside of the organization without the patient’s
consent. Protecting patient’s information is a crucial element of
respect and essential for patients' autonomy and trust in the
organization — the US healthcare industry currently facing
patient mistrust that is caused because of a lack of trust. When
patients experience a lack of confidence they do not share their
information with a healthcare professional that causes
ineffective treatment. In a 2018 study, Levy, Scherer, Zikmund-
Fisher, Larkin, Barnes, & Fagerlin concluded that
approximately 81.1% of people withheld medically relevant
information from their health-care providers. Patients fail to
disclose medically relevant information in front of their
clinicians undermine their health and cause patient harm (Levy,
2018).
There are numerous components of patient privacy in
healthcare that are personal space, religious and cultural
affiliations, physical privacy, decisional privacy, associational
privacy that includes patient's personal relationships and
informational privacy that provides for the protection of
patient's personal data. Healthcare organizations and physicians
should protect the patient’s information and kept strict privacy
measures in all its forms;
1. Minimize interpretation of external members with patients
personal information
2. Inform patients about every single happening and use of their
information wherever physician it is needed
3. Patients information must be protected in all of the above-
mentioned areas whether informational or associational (AMA,
2019)
Medical records contain personal information of patients and
sometimes sensitive information like physical records that is
disclosed in front of the public by any means, cause
embarrassment and uneasiness in front of others. These things
could affect the patient’s personal and professional life.
Although records at healthcare organizations are promised to be
protected but still we need effective and long-term legal
implications that bring satisfaction among patients. The
protection of medical records through privacy policies is still in
its infancy. Over time medical records are started to save in
computers instead of written documents. Although this
transition is taken to keep records more efficiently but
unfortunately still information from healthcare organizations
moves out, which needs to be settled. Overview of Privacy
Protections with Respect to Medical Records
The word privacy was not a bounded definition but it changed
along with legal changes. Civil law, common law, and criminal
define privacy differently for example, common and
constitutional law define privacy as “it is a right to be let alone”
and to be free from any external interpretation like government
institutions. With respect to medical records constitutional and
common law privacy of patients in different contexts while
statutory laws see and deal with patients privacy policy in a
different ways. In 1888, the right to privacy was first introduced
by Thomas Cooley. Roots of this right can be found in the
Warren and Brandeis law review article that is known as the
creation of tort right to privacy.
During the 1970s, Supreme court raise a decision for
privacy issues in medical records and after reviewing the case
two implications were introduced in the privacy policy of
healthcare organizations;
1. Avoid disclosure or sharing of patients’ information with
anyone for personal gain
2. Make independent decisions
During that period, the question for abortion privacy rights has
been raised, that states government involvement in abortion
decisions disturbs women’s independent decision-making
authority and also violate their privacy (Cleaver, 1985). Data
Breaches in the Healthcare Industry
From current sources, it is clear that in the current world data
breaches are a regular practice. Every day, news channels reveal
a hospital or healthcare organization breaching their personal
records. According to a report from, Ponemon Institute and
Verizon Data Breach Investigations healthcare industry are
facing more data breaches than any other industry across the
world, and mainly in the United States. The healthcare sector
faces more breaches because of numerous incidents that include
stealing malware for professional or personal gain, purposeful
harm to a patient or through lost devices of healthcare
professionals. Data breaches in the healthcare sector through
cybercriminals is a controversial topic these days. According to
the health and service report, more than 15 million health
records have been breached and shared for different purposes.
The black market behind the healthcare organization is
working for long, and many patients are not aware of the thing
that their personal information has been sold out to third
parties. 2019, proved as the worst year regarding healthcare
breaches and lack of security measures. Sean Curran, West
Monroe Partners’ senior director states that based on the
previous year attacks and data breaches healthcare professionals
need to reset their infrastructure and adjust their security
measures to limit the activities of hackers. According to this
report, healthcare organizations need to understand that they
need to understand, recover, minimize and get backup of lost
data of patient's healthcare (CIS, 2020).
Twenty-five million patients' health record has been lost or
shared according to ongoing investigations. Investigations are
still in process that makes it clear that patients are still
impacted but the accurate number of impacted patients is still
unclear. 12 million people from Quest Diagnostics have been
affected and the lost data includes social and medical
information. The information was leaked through lab reports
and tests performed outside of the hospital organization.
According to the AMCA data breach report, about 7.7
million patients from LabCorp were impacted with data breach
and almost 422,000 patients from BioReference are impacted
with the data breach. These patient’s medical and personal
information has been lost by people within the organization
such as by employees. 1.5 million Patients from immediate
health groups are impacted by the misconfigured database. The
examination decided patient segment subtleties, therapeutic case
information, and other individual data were conceivably broken.
In any case, when Immediate sent the warnings to patients about
the security occurrence, a few patients announced that they
were getting various letters, some routed to different patients
(Davis, 2019).
By 2009-2018 healthcare data breaches evolve 500 health
records. During these year data breaches, records are almost
189,945,874 healthcare records. Almost 59% of the US
population is affected by healthcare record theft and the irony is
half of the impacted population do not have understanding nor
they are informed by healthcare organizations for the leakage of
their personal and medical history (HIPAA, 2019).
Healthcare Breached Records during 2009-18Healthcare is the
biggest Target for Cyber Attack
The healthcare industry is at risk because organizations are
becoming technologically advanced. Although organizations are
becoming technologically advanced still professionals in
organizations do not have the training to manage online risks.
From a few past years, cybercrimes are happening every second
day, and healthcare data is revealed and hacked through these
activities. There are many reasons hack patient’s medical
information because of its worth thousands of dollars for
hackers. Employees within the healthcare organization get
trapped by hackers and for their personal gain share patient’s
information outside dealers. Organizations need to keep a sharp
eye on such employees and introduce hard policies that restrict
behaviors within and outside of the organization. IT
professionals are thinking to introduce effective security
measures to prevent data breaches from healthcare organizations
but they understand that this is a high-cost process.
Another big reason for being the big target for attackers is
the low security of medical devices. The healthcare providers in
the United States is becoming totally technologically innovative
and depend on advanced machinery. But the drawback of the
devices that these are not security optimized nor protect data of
patients. These devices are manufactured on one way working
principle without thinking for protection as a need. And this is
the reason hackers can easily access information available in
these devices like X-rays, insulin pumps and many other
devices.
Remote assessment of healthcare data is another point to
ponder. Accessibility of healthcare data of the patient can be
accessed from any desktop or multiple devices from different
places. These availabilities are also risky for healthcare
organizations. Remotely connections should be more secure
than it can identify the actual user and prevent loss of data.
Risk-based authentication is a way to improve security for risk
authentication in the healthcare department (risk, 2018).
Penalties and Punishments for Hacking Personal Information
The term hacking was first introduced in the 1950s in the
Massachusetts Institute of Technology. The word hacking means
feeling pleasure in itself. But over time, the concept has been
changed into a negative meaning because of its association with
negative or criminal activities for a long time. Hackers pulled
out information for someone’s computer and use this
information for personal gain, like earn money by selling this
information to a third party. In 2011, Aaron Swartz the founder
of Reddit hacked JSTOR and penalize to pay $1 million and 35
years of imprisonment and all his property was forfeiture, at
last, he committed suicide.
Another important act that protects the privacy and
personal information of people in the United States is The
Computer Fraud and Abuse Act. This act experiences some
amendments that are known as “exceeds authorized access”
which means access to someone’s computer without
authorization. The punishment for the one who accesses
someone’s information without authorization, like in the
healthcare sector will be punished based on the sensitivity of
information hacked. Penalties
In the US a hacker who accesses and uses someone’s personal
information will be imprisoned for ten years at first but if he
again attempts to commit hacking will be kept in prison for
more than 20 years. Punishments to the offender also varied
based on the problem or damaged the victim bears (Lee, 2014).
Because of unusual attempts of a data breach during 2019,
regulators are becoming focused and attempting to enforce strict
measures for those organizations who are not taking any product
decisions. Data breach in different countries brings many
conflicts in various institutions. For example, during 2017, the
US paid a minimum of $575 million for protection against a
data breach. During 2018, the country fined a substantial
amount as a result of weak protection of the health industry
(Swinhoe, 2020).
Apart from hacking attempts, those who sell healthcare
information to others are also termed as fraudulent. Because
they commit fraud with the organization with which they are
working. Thus, penalties for fraud attempts could be termed as
criminal penalties, civil penalties or in some cases both.
Punishment for fraud activities or involvement in these
activities includes imprisonment, fine and probation or both
imprisonment and fine. These conditions are varied based on the
sensitivity of the case. Laws for theft from 2004, decide the
punishment for these cases that minimum is three years that
might be extended to five years (http://criminal.findlaw.com,
2016). Devastating Consequences of Healthcare Data Breaches
According to studies of 2000, US citizens have faced personal
data breaches and as a result of data breach patients have to pay
for their medical information up to $2500 that is out of pocket
cost for them. Studies have found that the healthcare sector
ranks first when it comes to data breach results. The healthcare
organization notifies only one-third of data breach victims and
only 15% are alerted by the government agencies. Because of
the ineffective management of healthcare organizations patients
face financial loss and if the information revealed by hackers, it
also causes domestic rejection for victims mostly for women
(Security, 2017). Conclusion
Privacy is paramount and to personalize it vital whether it
is me or you. Not just in the healthcare sector but everywhere
like insurance companies and banks are also impacted by these
evil attacks. After reviewing the data of healthcare breaches and
its impact on the lives of victims, I would say that healthcare
officials should stay vigilant and careful about the protection of
patients, healthcare information. Personal information and
medical history are two important things to be protected under
strong security. Recommendations
Healthcare protection laws should be improved with the aim to
protect electronically saved patient's information. Training
should be arranged for healthcare officials and employees so
they can get an insight into technical risks and enable them to
manage if occurs. Employees should be hired on a loyalty basis
in healthcare organizations, and strict punishments are needed
to impose to regulate their activities. Strong security should be
maintained to monitor the activities of healthcare workers.
Enhanced and advanced network security and application
security are required to avoid data breaches and further
complications for the organization as well as for the patient.
Encryption methods should be implemented because this is a
good thing to protect the patient’s personal and medical
information from any unauthorized access. Punishments stated
in constitutional and universal laws are short term that is not
enough to probate a criminal. Healthcare hacking laws need to
be improved with extended imprisonment and fined that will be
paid to the patient according to the beard loss. Government
involvement in the healthcare sector needs to eliminate or
should be on a small level, to protect data breach by undefined
ways. These recommendations help deal with privacy problems
in the United States as well as across the world.
Bibliography
AMA. (2019). Privacy in Health Care. AMA, https://www.ama-
assn.org/delivering-care/ethics/privacy-health-care.
CIS. (2020). Data Breaches: In the Healthcare Sector. CIS,
https://www.cisecurity.org/blog/data-breaches-in-the-
healthcare-sector/.
Cleaver, C. M. (1985). Privacy Rights In Medical Records.
Privacy Rights In Medical Records, 13 Fordham,
https://ir.lawnet.fordham.edu/cgi/viewcontent.cgi?article=1252
&context=ulj.
Davis, J. (2019). Health IT Security.
https://healthitsecurity.com/news/the-10-biggest-healthcare-
data-breaches-of-2019-so-far.
HIPAA. (2019). Healthcare Data Breach Statistics. HIPAA
Journal, https://www.hipaajournal.com/healthcare-data-breach-
statistics/.
http://criminal.findlaw.com. (2016, October 7). Retrieved from
http://criminal.findlaw.com:
http://criminal.findlaw.com/criminal-charges/fraud.html
Lee, S. O. (2014). The Need for Specific Penalties for Hacking
in Criminal Law. The Scientific World Journal, 6.
Levy, A. G.-F. (2018). Prevalence of and factors associated
with patient nondisclosure of medically relevant information to
clinicians. JAMA Network Open, 1(7):e185293.
doi:10.1001/jamanetworkopen.2018.5293.
risk, T. h. (2018). The healthcare industry is at risk. Swivel
Secure,
https://swivelsecure.com/solutions/healthcare/healthcare-is-the-
biggest-target-for-cyberattacks/.
Security, H. N. (2017). The devastating impact of healthcare
data breaches. HELPNETSECURITY,
https://www.helpnetsecurity.com/2017/02/23/healthcare-data-
breaches/.
Swinhoe, D. (2020). The biggest data breach fines, penalties,
and settlements so far. CSO,
https://www.csoonline.com/article/3410278/the-biggest-data-
breach-fines-penalties-and-settlements-so-far.html.
CAPSTONE PROJECT
CAPSTONE PROJECT

More Related Content

Similar to Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx

Page 1 Executive Summary Policy makers are looking.docx
Page 1   Executive Summary Policy makers are looking.docxPage 1   Executive Summary Policy makers are looking.docx
Page 1 Executive Summary Policy makers are looking.docxsmile790243
 
Fifth Annual Study on Medical Identity Theft
Fifth Annual Study on Medical Identity TheftFifth Annual Study on Medical Identity Theft
Fifth Annual Study on Medical Identity Theft- Mark - Fullbright
 
A Personal Health Record ( Ehr )
A Personal Health Record ( Ehr )A Personal Health Record ( Ehr )
A Personal Health Record ( Ehr )Tasha Holloway
 
Sample HIPAA Training
Sample HIPAA Training Sample HIPAA Training
Sample HIPAA Training Tara Goodwin
 
Hippa training on confidentiality
Hippa training on confidentialityHippa training on confidentiality
Hippa training on confidentialitycraig45365
 
Hippa training on confidentiality
Hippa training on confidentialityHippa training on confidentiality
Hippa training on confidentialitycraig45365
 
Confidentiality & privacy
Confidentiality & privacyConfidentiality & privacy
Confidentiality & privacykendale
 
Confidentiality & privacy
Confidentiality & privacyConfidentiality & privacy
Confidentiality & privacykendale
 
Hipa Health Insurance Portability And Accountability Act
Hipa Health Insurance Portability And Accountability ActHipa Health Insurance Portability And Accountability Act
Hipa Health Insurance Portability And Accountability ActAmy Williams
 
Protecting yourself and others
Protecting yourself and othersProtecting yourself and others
Protecting yourself and otherssatart1944
 
PLEASE POST EACH DISCUSSION SEPARATELYEach healthcare organi
PLEASE POST EACH DISCUSSION SEPARATELYEach healthcare organiPLEASE POST EACH DISCUSSION SEPARATELYEach healthcare organi
PLEASE POST EACH DISCUSSION SEPARATELYEach healthcare organisamirapdcosden
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft- Mark - Fullbright
 
Presentation hippa
Presentation hippaPresentation hippa
Presentation hippamaggie_Platt
 
Medical Information Security
Medical Information SecurityMedical Information Security
Medical Information SecurityCSCJournals
 
Maintaining patient privacy
Maintaining patient privacyMaintaining patient privacy
Maintaining patient privacyspoullard1
 
Security, Confidentiality and Privacy in Health of Healthcare Data
Security, Confidentiality and Privacy in Health of Healthcare DataSecurity, Confidentiality and Privacy in Health of Healthcare Data
Security, Confidentiality and Privacy in Health of Healthcare Dataijtsrd
 

Similar to Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx (20)

Page 1 Executive Summary Policy makers are looking.docx
Page 1   Executive Summary Policy makers are looking.docxPage 1   Executive Summary Policy makers are looking.docx
Page 1 Executive Summary Policy makers are looking.docx
 
Fifth Annual Study on Medical Identity Theft
Fifth Annual Study on Medical Identity TheftFifth Annual Study on Medical Identity Theft
Fifth Annual Study on Medical Identity Theft
 
A Personal Health Record ( Ehr )
A Personal Health Record ( Ehr )A Personal Health Record ( Ehr )
A Personal Health Record ( Ehr )
 
Sample HIPAA Training
Sample HIPAA Training Sample HIPAA Training
Sample HIPAA Training
 
Hippa training on confidentiality
Hippa training on confidentialityHippa training on confidentiality
Hippa training on confidentiality
 
Hippa training on confidentiality
Hippa training on confidentialityHippa training on confidentiality
Hippa training on confidentiality
 
Confidentiality & privacy
Confidentiality & privacyConfidentiality & privacy
Confidentiality & privacy
 
Confidentiality & privacy
Confidentiality & privacyConfidentiality & privacy
Confidentiality & privacy
 
Hipa Health Insurance Portability And Accountability Act
Hipa Health Insurance Portability And Accountability ActHipa Health Insurance Portability And Accountability Act
Hipa Health Insurance Portability And Accountability Act
 
Nicolas Terry, "Big Data, Regulatory Disruption, and Arbitrage in Health Care"
Nicolas Terry, "Big Data, Regulatory Disruption, and Arbitrage in Health Care"Nicolas Terry, "Big Data, Regulatory Disruption, and Arbitrage in Health Care"
Nicolas Terry, "Big Data, Regulatory Disruption, and Arbitrage in Health Care"
 
Protecting yourself and others
Protecting yourself and othersProtecting yourself and others
Protecting yourself and others
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
PLEASE POST EACH DISCUSSION SEPARATELYEach healthcare organi
PLEASE POST EACH DISCUSSION SEPARATELYEach healthcare organiPLEASE POST EACH DISCUSSION SEPARATELYEach healthcare organi
PLEASE POST EACH DISCUSSION SEPARATELYEach healthcare organi
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft
 
Presentation hippa
Presentation hippaPresentation hippa
Presentation hippa
 
Medical Information Security
Medical Information SecurityMedical Information Security
Medical Information Security
 
Maintaining patient privacy
Maintaining patient privacyMaintaining patient privacy
Maintaining patient privacy
 
G0953643
G0953643G0953643
G0953643
 
Addressing Data Security Issues in Healthcare
Addressing Data Security Issues in Healthcare Addressing Data Security Issues in Healthcare
Addressing Data Security Issues in Healthcare
 
Security, Confidentiality and Privacy in Health of Healthcare Data
Security, Confidentiality and Privacy in Health of Healthcare DataSecurity, Confidentiality and Privacy in Health of Healthcare Data
Security, Confidentiality and Privacy in Health of Healthcare Data
 

More from karlhennesey

Resources Assigned readings, ERRs, the Internet,and other resources.docx
Resources Assigned readings, ERRs, the Internet,and other resources.docxResources Assigned readings, ERRs, the Internet,and other resources.docx
Resources Assigned readings, ERRs, the Internet,and other resources.docxkarlhennesey
 
Resource Review Documenting the Face of America Roy Stryker and.docx
Resource Review Documenting the Face of America Roy Stryker and.docxResource Review Documenting the Face of America Roy Stryker and.docx
Resource Review Documenting the Face of America Roy Stryker and.docxkarlhennesey
 
Resource Review Thelma Golden--How Art Gives Shape to Cultural C.docx
Resource Review Thelma Golden--How Art Gives Shape to Cultural C.docxResource Review Thelma Golden--How Art Gives Shape to Cultural C.docx
Resource Review Thelma Golden--How Art Gives Shape to Cultural C.docxkarlhennesey
 
Resource Review Representational Cityscape, and Ch. 3 of Oxfo.docx
Resource Review Representational Cityscape, and Ch. 3 of Oxfo.docxResource Review Representational Cityscape, and Ch. 3 of Oxfo.docx
Resource Review Representational Cityscape, and Ch. 3 of Oxfo.docxkarlhennesey
 
Resource Part 2 of Terrorism TodayYou work on a national se.docx
Resource Part 2 of Terrorism TodayYou work on a national se.docxResource Part 2 of Terrorism TodayYou work on a national se.docx
Resource Part 2 of Terrorism TodayYou work on a national se.docxkarlhennesey
 
Resources Appendix A, The Home Depot, Inc. Annual Report in Fun.docx
Resources Appendix A, The Home Depot, Inc. Annual Report in Fun.docxResources Appendix A, The Home Depot, Inc. Annual Report in Fun.docx
Resources Appendix A, The Home Depot, Inc. Annual Report in Fun.docxkarlhennesey
 
Resources Annotated Bibliography document. Research five websites t.docx
Resources Annotated Bibliography document. Research five websites t.docxResources Annotated Bibliography document. Research five websites t.docx
Resources Annotated Bibliography document. Research five websites t.docxkarlhennesey
 
Resources American History, Primary Source Investigator;Cente.docx
Resources American History, Primary Source Investigator;Cente.docxResources American History, Primary Source Investigator;Cente.docx
Resources American History, Primary Source Investigator;Cente.docxkarlhennesey
 
Resource University of Phoenix Material Data SetDownload the.docx
Resource University of Phoenix Material Data SetDownload the.docxResource University of Phoenix Material Data SetDownload the.docx
Resource University of Phoenix Material Data SetDownload the.docxkarlhennesey
 
Resource Ch. 6 & 7 of Financial AccountingComplete Brief Ex.docx
Resource Ch. 6 & 7 of Financial AccountingComplete Brief Ex.docxResource Ch. 6 & 7 of Financial AccountingComplete Brief Ex.docx
Resource Ch. 6 & 7 of Financial AccountingComplete Brief Ex.docxkarlhennesey
 
Resource Films on DemandCrime and Punishment”Experiment Res.docx
Resource Films on DemandCrime and Punishment”Experiment Res.docxResource Films on DemandCrime and Punishment”Experiment Res.docx
Resource Films on DemandCrime and Punishment”Experiment Res.docxkarlhennesey
 
Resource Managing Environmental Issues Simulation(or research a.docx
Resource Managing Environmental Issues Simulation(or research a.docxResource Managing Environmental Issues Simulation(or research a.docx
Resource Managing Environmental Issues Simulation(or research a.docxkarlhennesey
 
Resource Ch. 9 of Introduction to Business Create a 5-to-7 slide .docx
Resource Ch. 9 of Introduction to Business Create a 5-to-7 slide .docxResource Ch. 9 of Introduction to Business Create a 5-to-7 slide .docx
Resource Ch. 9 of Introduction to Business Create a 5-to-7 slide .docxkarlhennesey
 
Resource Ch. 9 of Introduction to Business Complete the table in .docx
Resource Ch. 9 of Introduction to Business Complete the table in .docxResource Ch. 9 of Introduction to Business Complete the table in .docx
Resource Ch. 9 of Introduction to Business Complete the table in .docxkarlhennesey
 
Resource Ch. 3 of ManagementIdentify a time in your life wh.docx
Resource Ch. 3 of ManagementIdentify a time in your life wh.docxResource Ch. 3 of ManagementIdentify a time in your life wh.docx
Resource Ch. 3 of ManagementIdentify a time in your life wh.docxkarlhennesey
 
Resource Significant Health Care Event Paper Grading Criteria.docx
Resource Significant Health Care Event Paper Grading Criteria.docxResource Significant Health Care Event Paper Grading Criteria.docx
Resource Significant Health Care Event Paper Grading Criteria.docxkarlhennesey
 
Resource Ch. 3 of Financial AccountingComplete Exercises E3.docx
Resource Ch. 3 of Financial AccountingComplete Exercises E3.docxResource Ch. 3 of Financial AccountingComplete Exercises E3.docx
Resource Ch. 3 of Financial AccountingComplete Exercises E3.docxkarlhennesey
 
Resource University of Phoenix Material Appendix AIdentify.docx
Resource University of Phoenix Material Appendix AIdentify.docxResource University of Phoenix Material Appendix AIdentify.docx
Resource University of Phoenix Material Appendix AIdentify.docxkarlhennesey
 
Resource The Threat of Bioterrorism VideoWrite a 700 to 850-w.docx
Resource The Threat of Bioterrorism VideoWrite a 700 to 850-w.docxResource The Threat of Bioterrorism VideoWrite a 700 to 850-w.docx
Resource The Threat of Bioterrorism VideoWrite a 700 to 850-w.docxkarlhennesey
 
Resource Ch. 14 of Introduction to Psychology Create an 8 to 12 s.docx
Resource Ch. 14 of Introduction to Psychology Create an 8 to 12 s.docxResource Ch. 14 of Introduction to Psychology Create an 8 to 12 s.docx
Resource Ch. 14 of Introduction to Psychology Create an 8 to 12 s.docxkarlhennesey
 

More from karlhennesey (20)

Resources Assigned readings, ERRs, the Internet,and other resources.docx
Resources Assigned readings, ERRs, the Internet,and other resources.docxResources Assigned readings, ERRs, the Internet,and other resources.docx
Resources Assigned readings, ERRs, the Internet,and other resources.docx
 
Resource Review Documenting the Face of America Roy Stryker and.docx
Resource Review Documenting the Face of America Roy Stryker and.docxResource Review Documenting the Face of America Roy Stryker and.docx
Resource Review Documenting the Face of America Roy Stryker and.docx
 
Resource Review Thelma Golden--How Art Gives Shape to Cultural C.docx
Resource Review Thelma Golden--How Art Gives Shape to Cultural C.docxResource Review Thelma Golden--How Art Gives Shape to Cultural C.docx
Resource Review Thelma Golden--How Art Gives Shape to Cultural C.docx
 
Resource Review Representational Cityscape, and Ch. 3 of Oxfo.docx
Resource Review Representational Cityscape, and Ch. 3 of Oxfo.docxResource Review Representational Cityscape, and Ch. 3 of Oxfo.docx
Resource Review Representational Cityscape, and Ch. 3 of Oxfo.docx
 
Resource Part 2 of Terrorism TodayYou work on a national se.docx
Resource Part 2 of Terrorism TodayYou work on a national se.docxResource Part 2 of Terrorism TodayYou work on a national se.docx
Resource Part 2 of Terrorism TodayYou work on a national se.docx
 
Resources Appendix A, The Home Depot, Inc. Annual Report in Fun.docx
Resources Appendix A, The Home Depot, Inc. Annual Report in Fun.docxResources Appendix A, The Home Depot, Inc. Annual Report in Fun.docx
Resources Appendix A, The Home Depot, Inc. Annual Report in Fun.docx
 
Resources Annotated Bibliography document. Research five websites t.docx
Resources Annotated Bibliography document. Research five websites t.docxResources Annotated Bibliography document. Research five websites t.docx
Resources Annotated Bibliography document. Research five websites t.docx
 
Resources American History, Primary Source Investigator;Cente.docx
Resources American History, Primary Source Investigator;Cente.docxResources American History, Primary Source Investigator;Cente.docx
Resources American History, Primary Source Investigator;Cente.docx
 
Resource University of Phoenix Material Data SetDownload the.docx
Resource University of Phoenix Material Data SetDownload the.docxResource University of Phoenix Material Data SetDownload the.docx
Resource University of Phoenix Material Data SetDownload the.docx
 
Resource Ch. 6 & 7 of Financial AccountingComplete Brief Ex.docx
Resource Ch. 6 & 7 of Financial AccountingComplete Brief Ex.docxResource Ch. 6 & 7 of Financial AccountingComplete Brief Ex.docx
Resource Ch. 6 & 7 of Financial AccountingComplete Brief Ex.docx
 
Resource Films on DemandCrime and Punishment”Experiment Res.docx
Resource Films on DemandCrime and Punishment”Experiment Res.docxResource Films on DemandCrime and Punishment”Experiment Res.docx
Resource Films on DemandCrime and Punishment”Experiment Res.docx
 
Resource Managing Environmental Issues Simulation(or research a.docx
Resource Managing Environmental Issues Simulation(or research a.docxResource Managing Environmental Issues Simulation(or research a.docx
Resource Managing Environmental Issues Simulation(or research a.docx
 
Resource Ch. 9 of Introduction to Business Create a 5-to-7 slide .docx
Resource Ch. 9 of Introduction to Business Create a 5-to-7 slide .docxResource Ch. 9 of Introduction to Business Create a 5-to-7 slide .docx
Resource Ch. 9 of Introduction to Business Create a 5-to-7 slide .docx
 
Resource Ch. 9 of Introduction to Business Complete the table in .docx
Resource Ch. 9 of Introduction to Business Complete the table in .docxResource Ch. 9 of Introduction to Business Complete the table in .docx
Resource Ch. 9 of Introduction to Business Complete the table in .docx
 
Resource Ch. 3 of ManagementIdentify a time in your life wh.docx
Resource Ch. 3 of ManagementIdentify a time in your life wh.docxResource Ch. 3 of ManagementIdentify a time in your life wh.docx
Resource Ch. 3 of ManagementIdentify a time in your life wh.docx
 
Resource Significant Health Care Event Paper Grading Criteria.docx
Resource Significant Health Care Event Paper Grading Criteria.docxResource Significant Health Care Event Paper Grading Criteria.docx
Resource Significant Health Care Event Paper Grading Criteria.docx
 
Resource Ch. 3 of Financial AccountingComplete Exercises E3.docx
Resource Ch. 3 of Financial AccountingComplete Exercises E3.docxResource Ch. 3 of Financial AccountingComplete Exercises E3.docx
Resource Ch. 3 of Financial AccountingComplete Exercises E3.docx
 
Resource University of Phoenix Material Appendix AIdentify.docx
Resource University of Phoenix Material Appendix AIdentify.docxResource University of Phoenix Material Appendix AIdentify.docx
Resource University of Phoenix Material Appendix AIdentify.docx
 
Resource The Threat of Bioterrorism VideoWrite a 700 to 850-w.docx
Resource The Threat of Bioterrorism VideoWrite a 700 to 850-w.docxResource The Threat of Bioterrorism VideoWrite a 700 to 850-w.docx
Resource The Threat of Bioterrorism VideoWrite a 700 to 850-w.docx
 
Resource Ch. 14 of Introduction to Psychology Create an 8 to 12 s.docx
Resource Ch. 14 of Introduction to Psychology Create an 8 to 12 s.docxResource Ch. 14 of Introduction to Psychology Create an 8 to 12 s.docx
Resource Ch. 14 of Introduction to Psychology Create an 8 to 12 s.docx
 

Recently uploaded

DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 

Recently uploaded (20)

Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 

Page 9 of 15Capstone ProjectYaima OrtizIDS-4934.docx

  • 1. Page 9 of 15 Capstone Project Yaima Ortiz IDS-4934 March 1st, 2020 Abstract Topic: Privacy- What medical information should be confidential? Who, if anybody, should have access to medical records? Thesis Statement In healthcare centers and overall privacy is the right of every US citizen that should be protected in all its forms by the healthcare organization. Rationale 1. The purpose of this paper is to identify why security measures are necessary to protect one’s privacy in the medical industry. 2. There are numerous laws, policies and healthcare organizational rules and regulations and statistics that would be helpful for conducting this research. 3. Privacy of a person whether this is me or you, is important then everything. I want to talk on this topic because I think most of us do not know what is happening to us. 4. I have selected textual analysis of books and available internet sources. The reason of this limited research
  • 2. methodology is that I cannot perform field study because of shortage of time. Rough Draft Ideas Identity theft in healthcare industry become a common practice and leads to information leakage that may destroy someone’s life. We can eliminate this human right violation by enforcing effective and practical laws. Healthcare organizations should understand their responsibilities and tighten security to protect information of patients. Table of Contents Introduction 3 Overview of Privacy Protections with Respect to Medical Records 4 Data Breaches in the Healthcare Industry 5 Healthcare is the biggest Target for Cyber Attack 7 Penalties and Punishments for Hacking Personal Information 9 Penalties 9 Devastating Consequences of Healthcare Data Breaches 10 Conclusion 10 Recommendations 11 Bibliography 12
  • 3. Introduction While operating in healthcare organizations need to gather patient’s information that is mostly personal information. It is the moral and legal responsibility of health care organizations to protect the information of their patients and do not share it with people outside of the organization without the patient’s consent. Protecting patient’s information is a crucial element of respect and essential for patients' autonomy and trust in the organization — the US healthcare industry currently facing patient mistrust that is caused because of a lack of trust. When patients experience a lack of confidence they do not share their information with a healthcare professional that causes ineffective treatment. In a 2018 study, Levy, Scherer, Zikmund- Fisher, Larkin, Barnes, & Fagerlin concluded that approximately 81.1% of people withheld medically relevant information from their health-care providers. Patients fail to disclose medically relevant information in front of their clinicians undermine their health and cause patient harm (Levy, 2018). There are numerous components of patient privacy in healthcare that are personal space, religious and cultural affiliations, physical privacy, decisional privacy, associational privacy that includes patient's personal relationships and informational privacy that provides for the protection of patient's personal data. Healthcare organizations and physicians should protect the patient’s information and kept strict privacy measures in all its forms; 1. Minimize interpretation of external members with patients
  • 4. personal information 2. Inform patients about every single happening and use of their information wherever physician it is needed 3. Patients information must be protected in all of the above- mentioned areas whether informational or associational (AMA, 2019) Medical records contain personal information of patients and sometimes sensitive information like physical records that is disclosed in front of the public by any means, cause embarrassment and uneasiness in front of others. These things could affect the patient’s personal and professional life. Although records at healthcare organizations are promised to be protected but still we need effective and long-term legal implications that bring satisfaction among patients. The protection of medical records through privacy policies is still in its infancy. Over time medical records are started to save in computers instead of written documents. Although this transition is taken to keep records more efficiently but unfortunately still information from healthcare organizations moves out, which needs to be settled. Overview of Privacy Protections with Respect to Medical Records The word privacy was not a bounded definition but it changed along with legal changes. Civil law, common law, and criminal define privacy differently for example, common and constitutional law define privacy as “it is a right to be let alone” and to be free from any external interpretation like government institutions. With respect to medical records constitutional and common law privacy of patients in different contexts while statutory laws see and deal with patients privacy policy in a different ways. In 1888, the right to privacy was first introduced by Thomas Cooley. Roots of this right can be found in the Warren and Brandeis law review article that is known as the creation of tort right to privacy. During the 1970s, Supreme court raise a decision for privacy issues in medical records and after reviewing the case two implications were introduced in the privacy policy of
  • 5. healthcare organizations; 1. Avoid disclosure or sharing of patients’ information with anyone for personal gain 2. Make independent decisions During that period, the question for abortion privacy rights has been raised, that states government involvement in abortion decisions disturbs women’s independent decision-making authority and also violate their privacy (Cleaver, 1985). Data Breaches in the Healthcare Industry From current sources, it is clear that in the current world data breaches are a regular practice. Every day, news channels reveal a hospital or healthcare organization breaching their personal records. According to a report from, Ponemon Institute and Verizon Data Breach Investigations healthcare industry are facing more data breaches than any other industry across the world, and mainly in the United States. The healthcare sector faces more breaches because of numerous incidents that include stealing malware for professional or personal gain, purposeful harm to a patient or through lost devices of healthcare professionals. Data breaches in the healthcare sector through cybercriminals is a controversial topic these days. According to the health and service report, more than 15 million health records have been breached and shared for different purposes. The black market behind the healthcare organization is working for long, and many patients are not aware of the thing that their personal information has been sold out to third parties. 2019, proved as the worst year regarding healthcare breaches and lack of security measures. Sean Curran, West Monroe Partners’ senior director states that based on the previous year attacks and data breaches healthcare professionals need to reset their infrastructure and adjust their security measures to limit the activities of hackers. According to this report, healthcare organizations need to understand that they need to understand, recover, minimize and get backup of lost data of patient's healthcare (CIS, 2020). Twenty-five million patients' health record has been lost or
  • 6. shared according to ongoing investigations. Investigations are still in process that makes it clear that patients are still impacted but the accurate number of impacted patients is still unclear. 12 million people from Quest Diagnostics have been affected and the lost data includes social and medical information. The information was leaked through lab reports and tests performed outside of the hospital organization. According to the AMCA data breach report, about 7.7 million patients from LabCorp were impacted with data breach and almost 422,000 patients from BioReference are impacted with the data breach. These patient’s medical and personal information has been lost by people within the organization such as by employees. 1.5 million Patients from immediate health groups are impacted by the misconfigured database. The examination decided patient segment subtleties, therapeutic case information, and other individual data were conceivably broken. In any case, when Immediate sent the warnings to patients about the security occurrence, a few patients announced that they were getting various letters, some routed to different patients (Davis, 2019). By 2009-2018 healthcare data breaches evolve 500 health records. During these year data breaches, records are almost 189,945,874 healthcare records. Almost 59% of the US population is affected by healthcare record theft and the irony is half of the impacted population do not have understanding nor they are informed by healthcare organizations for the leakage of their personal and medical history (HIPAA, 2019). Healthcare Breached Records during 2009-18Healthcare is the biggest Target for Cyber Attack The healthcare industry is at risk because organizations are becoming technologically advanced. Although organizations are becoming technologically advanced still professionals in organizations do not have the training to manage online risks. From a few past years, cybercrimes are happening every second day, and healthcare data is revealed and hacked through these
  • 7. activities. There are many reasons hack patient’s medical information because of its worth thousands of dollars for hackers. Employees within the healthcare organization get trapped by hackers and for their personal gain share patient’s information outside dealers. Organizations need to keep a sharp eye on such employees and introduce hard policies that restrict behaviors within and outside of the organization. IT professionals are thinking to introduce effective security measures to prevent data breaches from healthcare organizations but they understand that this is a high-cost process. Another big reason for being the big target for attackers is the low security of medical devices. The healthcare providers in the United States is becoming totally technologically innovative and depend on advanced machinery. But the drawback of the devices that these are not security optimized nor protect data of patients. These devices are manufactured on one way working principle without thinking for protection as a need. And this is the reason hackers can easily access information available in these devices like X-rays, insulin pumps and many other devices. Remote assessment of healthcare data is another point to ponder. Accessibility of healthcare data of the patient can be accessed from any desktop or multiple devices from different places. These availabilities are also risky for healthcare organizations. Remotely connections should be more secure than it can identify the actual user and prevent loss of data. Risk-based authentication is a way to improve security for risk authentication in the healthcare department (risk, 2018). Penalties and Punishments for Hacking Personal Information The term hacking was first introduced in the 1950s in the Massachusetts Institute of Technology. The word hacking means feeling pleasure in itself. But over time, the concept has been changed into a negative meaning because of its association with negative or criminal activities for a long time. Hackers pulled out information for someone’s computer and use this
  • 8. information for personal gain, like earn money by selling this information to a third party. In 2011, Aaron Swartz the founder of Reddit hacked JSTOR and penalize to pay $1 million and 35 years of imprisonment and all his property was forfeiture, at last, he committed suicide. Another important act that protects the privacy and personal information of people in the United States is The Computer Fraud and Abuse Act. This act experiences some amendments that are known as “exceeds authorized access” which means access to someone’s computer without authorization. The punishment for the one who accesses someone’s information without authorization, like in the healthcare sector will be punished based on the sensitivity of information hacked. Penalties In the US a hacker who accesses and uses someone’s personal information will be imprisoned for ten years at first but if he again attempts to commit hacking will be kept in prison for more than 20 years. Punishments to the offender also varied based on the problem or damaged the victim bears (Lee, 2014). Because of unusual attempts of a data breach during 2019, regulators are becoming focused and attempting to enforce strict measures for those organizations who are not taking any product decisions. Data breach in different countries brings many conflicts in various institutions. For example, during 2017, the US paid a minimum of $575 million for protection against a data breach. During 2018, the country fined a substantial amount as a result of weak protection of the health industry (Swinhoe, 2020). Apart from hacking attempts, those who sell healthcare information to others are also termed as fraudulent. Because they commit fraud with the organization with which they are working. Thus, penalties for fraud attempts could be termed as criminal penalties, civil penalties or in some cases both. Punishment for fraud activities or involvement in these activities includes imprisonment, fine and probation or both imprisonment and fine. These conditions are varied based on the
  • 9. sensitivity of the case. Laws for theft from 2004, decide the punishment for these cases that minimum is three years that might be extended to five years (http://criminal.findlaw.com, 2016). Devastating Consequences of Healthcare Data Breaches According to studies of 2000, US citizens have faced personal data breaches and as a result of data breach patients have to pay for their medical information up to $2500 that is out of pocket cost for them. Studies have found that the healthcare sector ranks first when it comes to data breach results. The healthcare organization notifies only one-third of data breach victims and only 15% are alerted by the government agencies. Because of the ineffective management of healthcare organizations patients face financial loss and if the information revealed by hackers, it also causes domestic rejection for victims mostly for women (Security, 2017). Conclusion Privacy is paramount and to personalize it vital whether it is me or you. Not just in the healthcare sector but everywhere like insurance companies and banks are also impacted by these evil attacks. After reviewing the data of healthcare breaches and its impact on the lives of victims, I would say that healthcare officials should stay vigilant and careful about the protection of patients, healthcare information. Personal information and medical history are two important things to be protected under strong security. Recommendations Healthcare protection laws should be improved with the aim to protect electronically saved patient's information. Training should be arranged for healthcare officials and employees so they can get an insight into technical risks and enable them to manage if occurs. Employees should be hired on a loyalty basis in healthcare organizations, and strict punishments are needed to impose to regulate their activities. Strong security should be maintained to monitor the activities of healthcare workers. Enhanced and advanced network security and application security are required to avoid data breaches and further complications for the organization as well as for the patient. Encryption methods should be implemented because this is a
  • 10. good thing to protect the patient’s personal and medical information from any unauthorized access. Punishments stated in constitutional and universal laws are short term that is not enough to probate a criminal. Healthcare hacking laws need to be improved with extended imprisonment and fined that will be paid to the patient according to the beard loss. Government involvement in the healthcare sector needs to eliminate or should be on a small level, to protect data breach by undefined ways. These recommendations help deal with privacy problems in the United States as well as across the world. Bibliography AMA. (2019). Privacy in Health Care. AMA, https://www.ama- assn.org/delivering-care/ethics/privacy-health-care. CIS. (2020). Data Breaches: In the Healthcare Sector. CIS, https://www.cisecurity.org/blog/data-breaches-in-the- healthcare-sector/. Cleaver, C. M. (1985). Privacy Rights In Medical Records. Privacy Rights In Medical Records, 13 Fordham, https://ir.lawnet.fordham.edu/cgi/viewcontent.cgi?article=1252 &context=ulj. Davis, J. (2019). Health IT Security. https://healthitsecurity.com/news/the-10-biggest-healthcare- data-breaches-of-2019-so-far. HIPAA. (2019). Healthcare Data Breach Statistics. HIPAA Journal, https://www.hipaajournal.com/healthcare-data-breach- statistics/. http://criminal.findlaw.com. (2016, October 7). Retrieved from http://criminal.findlaw.com: http://criminal.findlaw.com/criminal-charges/fraud.html Lee, S. O. (2014). The Need for Specific Penalties for Hacking in Criminal Law. The Scientific World Journal, 6.
  • 11. Levy, A. G.-F. (2018). Prevalence of and factors associated with patient nondisclosure of medically relevant information to clinicians. JAMA Network Open, 1(7):e185293. doi:10.1001/jamanetworkopen.2018.5293. risk, T. h. (2018). The healthcare industry is at risk. Swivel Secure, https://swivelsecure.com/solutions/healthcare/healthcare-is-the- biggest-target-for-cyberattacks/. Security, H. N. (2017). The devastating impact of healthcare data breaches. HELPNETSECURITY, https://www.helpnetsecurity.com/2017/02/23/healthcare-data- breaches/. Swinhoe, D. (2020). The biggest data breach fines, penalties, and settlements so far. CSO, https://www.csoonline.com/article/3410278/the-biggest-data- breach-fines-penalties-and-settlements-so-far.html. CAPSTONE PROJECT CAPSTONE PROJECT