SlideShare a Scribd company logo
1 of 4
1)
Health data is sensitive and confidential; hence, it should be
kept safe. Data security is one of the critical activities which
has become challenging for many organizations (Frith, 2019).
Due to technology advancements, people can save their health
data online. Similarly, people are also able to share data with
close friends or any other person of interest. Using online
platforms to store the data has brought a lot of benefits. The
primary benefit is the fact that individuals can share data with
medical experts easily. By, this the medical experts will be able
to assist the sick people if possible. The data is always
accessible as long as one is authorized.
I read different articles that shared information concerning
health data breaches. Various health organizations have been
affected by data breaches (Garner, 2017). A good example is the
University of Washington Medicine. This organization reported
that 974,000 patients' data was affected. The attack was noticed
by a patient who found some files containing personal
information on public sites. The patient then notified the
organization, which claimed that some employees made some
errors, which led to the leakage. The files were accessible
through Google, so the organization had to ask Google to
remove the data. Fortunately, the files were removed from the
search list, and this occurred in January 2019.
It was risky to let the files containing personal
information available on the website (Ronquillo, Erik
Winterholler, Cwikla, Szymanski & Levy, 2018). The
organization was lucky that the data breach was not significant,
and hence, the patients were not significantly affected. It is
good to ensure that files containing health data are handled
carefully to avoid some problems. In keeping the health data
secure, it is good to ensure that the systems are well-protected.
The systems can be protected by making use of firewalls which
prevent unauthorized people from accessing them. During the
data sharing process, a health organization should ensure that
the information is encrypted. Encryption prevents unauthorized
people from understanding the message that is being shared
using different channels. Users should make sure that they use
strong passwords.
2)
Protection of patient’s information is the top most priority of
health care providers and professionals. Patient’s health
information contains personal data and their health conditions
hence the federal laws requires to maintain security and privacy
to safeguards health information. Privacy, as distinct from
confidentiality, is viewed as the right of the individual client or
patient to be let alone and to make decisions about how personal
information is shared (Brodnik, 2012). Health data is usually
stored on paper or electronically, in both these ways it is
important to respect the privacy of the patients and hence
follow policies to maintain security and privacy rules.
The Health Insurance Portability and Accountability Act
(HIPPA) is a major law introduced to ensure privacy, integrity
and confidentiality of health data. Its main objective is to
provide step by step instructions for providers and other health
care organization in dealing with patient’s personal health
information.
Security of data is protecting health data and methods used to
ensure privacy of health information and help health care
professionals in secure transmission of data. As utilization of
electronic wellbeing record frameworks developed, and
transmission of wellbeing information to help charging turned
into the standard, the requirement for administrative rules
explicit to electronic wellbeing data turned out to be
progressively evident.
Confidentiality is to ensure that medical professional having
access to patients data hold health data in confidence.
According to HIPPA and PHI rules any individual or the
organization involved in disclosure of patient’s health
information is subjected to heavy fines and possible expulsion
from license.
3)
The HIPAA regulation are only for the US but the regulations
which are part of the data regulations for hospital records but
there are many regulations that enforced by other countries and
international standards and committees one such standard is that
helping the hospital records to regulated, secured and
maintained properly. One such regulation is HL7 which is
provided by the international committee which regulates
hospital and patient records all over the world. These
regulations make sure that patient privacy is also maintained
and makes sure other countries don’t get access to patients in
other countries which will get access to weaponize patient data.
The data of a country’s citizens is very useful in the hands of
other countries, so it is the duty of the HL7 regulation and
committee to protect this. The regulations clearly instruct how
the patient records are transmitted by API and how they should
be encrypted and where the key should be stored and sent via a
special communication which will help the patients to maintain
the records safe and the hospital to continue to do their
business.
The HL7 also makes the job for software vendors and providers
who work in the health care industry can store and use the
patient records in a uniform manner and access can be restricted
to different groups. The applications which use HL7 need to be
end to end encrypted and API keys need to come from the health
care data providers like Cerner which will increase the
credibility of the data
Bender, D., & Sartipi, K. (2013, June). HL7 FHIR: An Agile
and RESTful approach to healthcare information exchange. In
Proceedings of the 26th IEEE international symposium on
computer-based medical systems
(pp. 326-331). IEEE
Dolin, R. H., Alschuler, L., Boyer, S., Beebe, C., Behlen, F. M.,
Biron, P. V., & Shabo, A. (2006). HL7 clinical document
architecture, release 2.
Journal of the American Medical Informatics Association
,
13
(1), 30-39

More Related Content

Similar to 1)Health data is sensitive and confidential; hence, it should .docx

64 journal of law, medicine & ethicsDreams and Nightmare.docx
64 journal of law, medicine & ethicsDreams and Nightmare.docx64 journal of law, medicine & ethicsDreams and Nightmare.docx
64 journal of law, medicine & ethicsDreams and Nightmare.docxevonnehoggarth79783
 
Priv&security&profin electrcommunicationsrev9 23
Priv&security&profin electrcommunicationsrev9 23Priv&security&profin electrcommunicationsrev9 23
Priv&security&profin electrcommunicationsrev9 23Deven McGraw
 
What explains why certain services were covered and others were not .docx
 What explains why certain services were covered and others were not .docx What explains why certain services were covered and others were not .docx
What explains why certain services were covered and others were not .docxajoy21
 
Virtual Mentor American Medical Association Journal of Ethi.docx
Virtual Mentor  American Medical Association Journal of Ethi.docxVirtual Mentor  American Medical Association Journal of Ethi.docx
Virtual Mentor American Medical Association Journal of Ethi.docxsheronlewthwaite
 
Why merging medical records, hospital reports, and clinical trial data is a v...
Why merging medical records, hospital reports, and clinical trial data is a v...Why merging medical records, hospital reports, and clinical trial data is a v...
Why merging medical records, hospital reports, and clinical trial data is a v...Arete-Zoe, LLC
 
Presentation hippa
Presentation hippaPresentation hippa
Presentation hippamaggie_Platt
 
Apa format450 words1 biblical integration34 minutes ago
Apa format450 words1 biblical integration34 minutes agoApa format450 words1 biblical integration34 minutes ago
Apa format450 words1 biblical integration34 minutes agoaman341480
 
Running Head THE HEALTH INFORMATION EXCHANGE (HIE) IN U.S 1.docx
Running Head THE HEALTH INFORMATION EXCHANGE (HIE) IN U.S 1.docxRunning Head THE HEALTH INFORMATION EXCHANGE (HIE) IN U.S 1.docx
Running Head THE HEALTH INFORMATION EXCHANGE (HIE) IN U.S 1.docxtodd521
 
Exploiting multimodal biometrics in e privacy scheme for electronic health re...
Exploiting multimodal biometrics in e privacy scheme for electronic health re...Exploiting multimodal biometrics in e privacy scheme for electronic health re...
Exploiting multimodal biometrics in e privacy scheme for electronic health re...Alexander Decker
 
Public Health informatics, Consumer health informatics, mHealth & PHRs (Novem...
Public Health informatics, Consumer health informatics, mHealth & PHRs (Novem...Public Health informatics, Consumer health informatics, mHealth & PHRs (Novem...
Public Health informatics, Consumer health informatics, mHealth & PHRs (Novem...Nawanan Theera-Ampornpunt
 
19 hours agoSteven Trudel Privacy, Security, and Quality Sta
19 hours agoSteven Trudel Privacy, Security, and Quality Sta19 hours agoSteven Trudel Privacy, Security, and Quality Sta
19 hours agoSteven Trudel Privacy, Security, and Quality StaAnastaciaShadelb
 
Sample HIPAA Training
Sample HIPAA Training Sample HIPAA Training
Sample HIPAA Training Tara Goodwin
 
Health information technology (Health IT)
Health information technology (Health IT)Health information technology (Health IT)
Health information technology (Health IT)Mohammad Yeakub
 
Implementing The Affordable Care Act Essay
Implementing The Affordable Care Act EssayImplementing The Affordable Care Act Essay
Implementing The Affordable Care Act EssayMichelle Love
 
Running Head Stage 2 Sharing Data1Stage 2 Sharing Data3.docx
Running Head Stage 2 Sharing Data1Stage 2 Sharing Data3.docxRunning Head Stage 2 Sharing Data1Stage 2 Sharing Data3.docx
Running Head Stage 2 Sharing Data1Stage 2 Sharing Data3.docxjeanettehully
 
An Electronic Health Record ( Ehr )
An Electronic Health Record ( Ehr )An Electronic Health Record ( Ehr )
An Electronic Health Record ( Ehr )Tracy Huang
 
Sarah Kim HIPAA for Small Providers
Sarah Kim HIPAA for Small ProvidersSarah Kim HIPAA for Small Providers
Sarah Kim HIPAA for Small ProvidersSarah Kim
 

Similar to 1)Health data is sensitive and confidential; hence, it should .docx (20)

64 journal of law, medicine & ethicsDreams and Nightmare.docx
64 journal of law, medicine & ethicsDreams and Nightmare.docx64 journal of law, medicine & ethicsDreams and Nightmare.docx
64 journal of law, medicine & ethicsDreams and Nightmare.docx
 
Priv&security&profin electrcommunicationsrev9 23
Priv&security&profin electrcommunicationsrev9 23Priv&security&profin electrcommunicationsrev9 23
Priv&security&profin electrcommunicationsrev9 23
 
What explains why certain services were covered and others were not .docx
 What explains why certain services were covered and others were not .docx What explains why certain services were covered and others were not .docx
What explains why certain services were covered and others were not .docx
 
Nicolas Terry, "Big Data, Regulatory Disruption, and Arbitrage in Health Care"
Nicolas Terry, "Big Data, Regulatory Disruption, and Arbitrage in Health Care"Nicolas Terry, "Big Data, Regulatory Disruption, and Arbitrage in Health Care"
Nicolas Terry, "Big Data, Regulatory Disruption, and Arbitrage in Health Care"
 
Virtual Mentor American Medical Association Journal of Ethi.docx
Virtual Mentor  American Medical Association Journal of Ethi.docxVirtual Mentor  American Medical Association Journal of Ethi.docx
Virtual Mentor American Medical Association Journal of Ethi.docx
 
Why merging medical records, hospital reports, and clinical trial data is a v...
Why merging medical records, hospital reports, and clinical trial data is a v...Why merging medical records, hospital reports, and clinical trial data is a v...
Why merging medical records, hospital reports, and clinical trial data is a v...
 
Presentation hippa
Presentation hippaPresentation hippa
Presentation hippa
 
Apa format450 words1 biblical integration34 minutes ago
Apa format450 words1 biblical integration34 minutes agoApa format450 words1 biblical integration34 minutes ago
Apa format450 words1 biblical integration34 minutes ago
 
Running Head THE HEALTH INFORMATION EXCHANGE (HIE) IN U.S 1.docx
Running Head THE HEALTH INFORMATION EXCHANGE (HIE) IN U.S 1.docxRunning Head THE HEALTH INFORMATION EXCHANGE (HIE) IN U.S 1.docx
Running Head THE HEALTH INFORMATION EXCHANGE (HIE) IN U.S 1.docx
 
Exploiting multimodal biometrics in e privacy scheme for electronic health re...
Exploiting multimodal biometrics in e privacy scheme for electronic health re...Exploiting multimodal biometrics in e privacy scheme for electronic health re...
Exploiting multimodal biometrics in e privacy scheme for electronic health re...
 
Public Health informatics, Consumer health informatics, mHealth & PHRs (Novem...
Public Health informatics, Consumer health informatics, mHealth & PHRs (Novem...Public Health informatics, Consumer health informatics, mHealth & PHRs (Novem...
Public Health informatics, Consumer health informatics, mHealth & PHRs (Novem...
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
19 hours agoSteven Trudel Privacy, Security, and Quality Sta
19 hours agoSteven Trudel Privacy, Security, and Quality Sta19 hours agoSteven Trudel Privacy, Security, and Quality Sta
19 hours agoSteven Trudel Privacy, Security, and Quality Sta
 
Sample HIPAA Training
Sample HIPAA Training Sample HIPAA Training
Sample HIPAA Training
 
Health information technology (Health IT)
Health information technology (Health IT)Health information technology (Health IT)
Health information technology (Health IT)
 
Implementing The Affordable Care Act Essay
Implementing The Affordable Care Act EssayImplementing The Affordable Care Act Essay
Implementing The Affordable Care Act Essay
 
Hitech Act
Hitech ActHitech Act
Hitech Act
 
Running Head Stage 2 Sharing Data1Stage 2 Sharing Data3.docx
Running Head Stage 2 Sharing Data1Stage 2 Sharing Data3.docxRunning Head Stage 2 Sharing Data1Stage 2 Sharing Data3.docx
Running Head Stage 2 Sharing Data1Stage 2 Sharing Data3.docx
 
An Electronic Health Record ( Ehr )
An Electronic Health Record ( Ehr )An Electronic Health Record ( Ehr )
An Electronic Health Record ( Ehr )
 
Sarah Kim HIPAA for Small Providers
Sarah Kim HIPAA for Small ProvidersSarah Kim HIPAA for Small Providers
Sarah Kim HIPAA for Small Providers
 

More from teresehearn

1- When it comes to helping people who are having problems, how do y.docx
1- When it comes to helping people who are having problems, how do y.docx1- When it comes to helping people who are having problems, how do y.docx
1- When it comes to helping people who are having problems, how do y.docxteresehearn
 
1-Managing Interpersonal Relationships DiscussionManaging inte.docx
1-Managing Interpersonal Relationships DiscussionManaging inte.docx1-Managing Interpersonal Relationships DiscussionManaging inte.docx
1-Managing Interpersonal Relationships DiscussionManaging inte.docxteresehearn
 
1-IRB is an important step in research. State the required compo.docx
1-IRB is an important step in research. State the required compo.docx1-IRB is an important step in research. State the required compo.docx
1-IRB is an important step in research. State the required compo.docxteresehearn
 
1-App must contain at least 5 runnable and navigable activities.docx
1-App must contain at least 5 runnable and navigable activities.docx1-App must contain at least 5 runnable and navigable activities.docx
1-App must contain at least 5 runnable and navigable activities.docxteresehearn
 
1-2 paragraphsMaximum of 1 page, double- spacedAPA sty.docx
1-2 paragraphsMaximum of 1 page, double- spacedAPA sty.docx1-2 paragraphsMaximum of 1 page, double- spacedAPA sty.docx
1-2 paragraphsMaximum of 1 page, double- spacedAPA sty.docxteresehearn
 
1-What are the pros and cons of parole. Discuss!2-Discuss wa.docx
1-What are the pros and cons of parole. Discuss!2-Discuss wa.docx1-What are the pros and cons of parole. Discuss!2-Discuss wa.docx
1-What are the pros and cons of parole. Discuss!2-Discuss wa.docxteresehearn
 
1-2 pages, APA format, 2 scholarly resources (one from textbook)....docx
1-2 pages, APA format, 2 scholarly resources (one from textbook)....docx1-2 pages, APA format, 2 scholarly resources (one from textbook)....docx
1-2 pages, APA format, 2 scholarly resources (one from textbook)....docxteresehearn
 
1-A patient on a medical floor has an indwelling catheter that has b.docx
1-A patient on a medical floor has an indwelling catheter that has b.docx1-A patient on a medical floor has an indwelling catheter that has b.docx
1-A patient on a medical floor has an indwelling catheter that has b.docxteresehearn
 
1-2 pages REVIEW ATTACHED DOCUMENT!! ( indicate assignment response .docx
1-2 pages REVIEW ATTACHED DOCUMENT!! ( indicate assignment response .docx1-2 pages REVIEW ATTACHED DOCUMENT!! ( indicate assignment response .docx
1-2 pages REVIEW ATTACHED DOCUMENT!! ( indicate assignment response .docxteresehearn
 
1-2 pages  Required ReadingsRavitch, S. M., & Carl, N. M. (2.docx
1-2 pages  Required ReadingsRavitch, S. M., & Carl, N. M. (2.docx1-2 pages  Required ReadingsRavitch, S. M., & Carl, N. M. (2.docx
1-2 pages  Required ReadingsRavitch, S. M., & Carl, N. M. (2.docxteresehearn
 
1-866-275-3266[email protected]ANALYSISVITALITYRELATIV.docx
1-866-275-3266[email protected]ANALYSISVITALITYRELATIV.docx1-866-275-3266[email protected]ANALYSISVITALITYRELATIV.docx
1-866-275-3266[email protected]ANALYSISVITALITYRELATIV.docxteresehearn
 
1-2 paragraphsapa formatreferencesStep 1 - Read the In.docx
1-2 paragraphsapa formatreferencesStep 1 - Read the In.docx1-2 paragraphsapa formatreferencesStep 1 - Read the In.docx
1-2 paragraphsapa formatreferencesStep 1 - Read the In.docxteresehearn
 
1- What is Policy2- Explain each of them  Public policy—Pr.docx
1- What is Policy2- Explain each of them  Public policy—Pr.docx1- What is Policy2- Explain each of them  Public policy—Pr.docx
1- What is Policy2- Explain each of them  Public policy—Pr.docxteresehearn
 
1-2 paragraphsapa formatreferencesIn Chapter 6 The En.docx
1-2 paragraphsapa formatreferencesIn Chapter 6 The En.docx1-2 paragraphsapa formatreferencesIn Chapter 6 The En.docx
1-2 paragraphsapa formatreferencesIn Chapter 6 The En.docxteresehearn
 
1- What is Policy2- Explain each of them     Public policy— Pr.docx
1- What is Policy2- Explain each of them     Public policy— Pr.docx1- What is Policy2- Explain each of them     Public policy— Pr.docx
1- What is Policy2- Explain each of them     Public policy— Pr.docxteresehearn
 
1- What is Policy2- Explain each of them  Public policy—Pr.docx
1- What is Policy2- Explain each of them  Public policy—Pr.docx1- What is Policy2- Explain each of them  Public policy—Pr.docx
1- What is Policy2- Explain each of them  Public policy—Pr.docxteresehearn
 
1-2 Paragraphs adequately describing cloning biotechnology as thorou.docx
1-2 Paragraphs adequately describing cloning biotechnology as thorou.docx1-2 Paragraphs adequately describing cloning biotechnology as thorou.docx
1-2 Paragraphs adequately describing cloning biotechnology as thorou.docxteresehearn
 
1- Explain why some cells are pink and others are purple in Gram-sta.docx
1- Explain why some cells are pink and others are purple in Gram-sta.docx1- Explain why some cells are pink and others are purple in Gram-sta.docx
1- Explain why some cells are pink and others are purple in Gram-sta.docxteresehearn
 
1-Some typical agents of socialization are family, school, religion.docx
1-Some typical agents of socialization are family, school, religion.docx1-Some typical agents of socialization are family, school, religion.docx
1-Some typical agents of socialization are family, school, religion.docxteresehearn
 
1-Provide a critique Kristen Swanson’s Theory of Caring, making .docx
1-Provide a critique Kristen Swanson’s Theory of Caring, making .docx1-Provide a critique Kristen Swanson’s Theory of Caring, making .docx
1-Provide a critique Kristen Swanson’s Theory of Caring, making .docxteresehearn
 

More from teresehearn (20)

1- When it comes to helping people who are having problems, how do y.docx
1- When it comes to helping people who are having problems, how do y.docx1- When it comes to helping people who are having problems, how do y.docx
1- When it comes to helping people who are having problems, how do y.docx
 
1-Managing Interpersonal Relationships DiscussionManaging inte.docx
1-Managing Interpersonal Relationships DiscussionManaging inte.docx1-Managing Interpersonal Relationships DiscussionManaging inte.docx
1-Managing Interpersonal Relationships DiscussionManaging inte.docx
 
1-IRB is an important step in research. State the required compo.docx
1-IRB is an important step in research. State the required compo.docx1-IRB is an important step in research. State the required compo.docx
1-IRB is an important step in research. State the required compo.docx
 
1-App must contain at least 5 runnable and navigable activities.docx
1-App must contain at least 5 runnable and navigable activities.docx1-App must contain at least 5 runnable and navigable activities.docx
1-App must contain at least 5 runnable and navigable activities.docx
 
1-2 paragraphsMaximum of 1 page, double- spacedAPA sty.docx
1-2 paragraphsMaximum of 1 page, double- spacedAPA sty.docx1-2 paragraphsMaximum of 1 page, double- spacedAPA sty.docx
1-2 paragraphsMaximum of 1 page, double- spacedAPA sty.docx
 
1-What are the pros and cons of parole. Discuss!2-Discuss wa.docx
1-What are the pros and cons of parole. Discuss!2-Discuss wa.docx1-What are the pros and cons of parole. Discuss!2-Discuss wa.docx
1-What are the pros and cons of parole. Discuss!2-Discuss wa.docx
 
1-2 pages, APA format, 2 scholarly resources (one from textbook)....docx
1-2 pages, APA format, 2 scholarly resources (one from textbook)....docx1-2 pages, APA format, 2 scholarly resources (one from textbook)....docx
1-2 pages, APA format, 2 scholarly resources (one from textbook)....docx
 
1-A patient on a medical floor has an indwelling catheter that has b.docx
1-A patient on a medical floor has an indwelling catheter that has b.docx1-A patient on a medical floor has an indwelling catheter that has b.docx
1-A patient on a medical floor has an indwelling catheter that has b.docx
 
1-2 pages REVIEW ATTACHED DOCUMENT!! ( indicate assignment response .docx
1-2 pages REVIEW ATTACHED DOCUMENT!! ( indicate assignment response .docx1-2 pages REVIEW ATTACHED DOCUMENT!! ( indicate assignment response .docx
1-2 pages REVIEW ATTACHED DOCUMENT!! ( indicate assignment response .docx
 
1-2 pages  Required ReadingsRavitch, S. M., & Carl, N. M. (2.docx
1-2 pages  Required ReadingsRavitch, S. M., & Carl, N. M. (2.docx1-2 pages  Required ReadingsRavitch, S. M., & Carl, N. M. (2.docx
1-2 pages  Required ReadingsRavitch, S. M., & Carl, N. M. (2.docx
 
1-866-275-3266[email protected]ANALYSISVITALITYRELATIV.docx
1-866-275-3266[email protected]ANALYSISVITALITYRELATIV.docx1-866-275-3266[email protected]ANALYSISVITALITYRELATIV.docx
1-866-275-3266[email protected]ANALYSISVITALITYRELATIV.docx
 
1-2 paragraphsapa formatreferencesStep 1 - Read the In.docx
1-2 paragraphsapa formatreferencesStep 1 - Read the In.docx1-2 paragraphsapa formatreferencesStep 1 - Read the In.docx
1-2 paragraphsapa formatreferencesStep 1 - Read the In.docx
 
1- What is Policy2- Explain each of them  Public policy—Pr.docx
1- What is Policy2- Explain each of them  Public policy—Pr.docx1- What is Policy2- Explain each of them  Public policy—Pr.docx
1- What is Policy2- Explain each of them  Public policy—Pr.docx
 
1-2 paragraphsapa formatreferencesIn Chapter 6 The En.docx
1-2 paragraphsapa formatreferencesIn Chapter 6 The En.docx1-2 paragraphsapa formatreferencesIn Chapter 6 The En.docx
1-2 paragraphsapa formatreferencesIn Chapter 6 The En.docx
 
1- What is Policy2- Explain each of them     Public policy— Pr.docx
1- What is Policy2- Explain each of them     Public policy— Pr.docx1- What is Policy2- Explain each of them     Public policy— Pr.docx
1- What is Policy2- Explain each of them     Public policy— Pr.docx
 
1- What is Policy2- Explain each of them  Public policy—Pr.docx
1- What is Policy2- Explain each of them  Public policy—Pr.docx1- What is Policy2- Explain each of them  Public policy—Pr.docx
1- What is Policy2- Explain each of them  Public policy—Pr.docx
 
1-2 Paragraphs adequately describing cloning biotechnology as thorou.docx
1-2 Paragraphs adequately describing cloning biotechnology as thorou.docx1-2 Paragraphs adequately describing cloning biotechnology as thorou.docx
1-2 Paragraphs adequately describing cloning biotechnology as thorou.docx
 
1- Explain why some cells are pink and others are purple in Gram-sta.docx
1- Explain why some cells are pink and others are purple in Gram-sta.docx1- Explain why some cells are pink and others are purple in Gram-sta.docx
1- Explain why some cells are pink and others are purple in Gram-sta.docx
 
1-Some typical agents of socialization are family, school, religion.docx
1-Some typical agents of socialization are family, school, religion.docx1-Some typical agents of socialization are family, school, religion.docx
1-Some typical agents of socialization are family, school, religion.docx
 
1-Provide a critique Kristen Swanson’s Theory of Caring, making .docx
1-Provide a critique Kristen Swanson’s Theory of Caring, making .docx1-Provide a critique Kristen Swanson’s Theory of Caring, making .docx
1-Provide a critique Kristen Swanson’s Theory of Caring, making .docx
 

Recently uploaded

Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 

Recently uploaded (20)

Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 

1)Health data is sensitive and confidential; hence, it should .docx

  • 1. 1) Health data is sensitive and confidential; hence, it should be kept safe. Data security is one of the critical activities which has become challenging for many organizations (Frith, 2019). Due to technology advancements, people can save their health data online. Similarly, people are also able to share data with close friends or any other person of interest. Using online platforms to store the data has brought a lot of benefits. The primary benefit is the fact that individuals can share data with medical experts easily. By, this the medical experts will be able to assist the sick people if possible. The data is always accessible as long as one is authorized. I read different articles that shared information concerning health data breaches. Various health organizations have been affected by data breaches (Garner, 2017). A good example is the University of Washington Medicine. This organization reported that 974,000 patients' data was affected. The attack was noticed by a patient who found some files containing personal information on public sites. The patient then notified the organization, which claimed that some employees made some errors, which led to the leakage. The files were accessible through Google, so the organization had to ask Google to remove the data. Fortunately, the files were removed from the search list, and this occurred in January 2019. It was risky to let the files containing personal information available on the website (Ronquillo, Erik Winterholler, Cwikla, Szymanski & Levy, 2018). The organization was lucky that the data breach was not significant, and hence, the patients were not significantly affected. It is good to ensure that files containing health data are handled carefully to avoid some problems. In keeping the health data
  • 2. secure, it is good to ensure that the systems are well-protected. The systems can be protected by making use of firewalls which prevent unauthorized people from accessing them. During the data sharing process, a health organization should ensure that the information is encrypted. Encryption prevents unauthorized people from understanding the message that is being shared using different channels. Users should make sure that they use strong passwords. 2) Protection of patient’s information is the top most priority of health care providers and professionals. Patient’s health information contains personal data and their health conditions hence the federal laws requires to maintain security and privacy to safeguards health information. Privacy, as distinct from confidentiality, is viewed as the right of the individual client or patient to be let alone and to make decisions about how personal information is shared (Brodnik, 2012). Health data is usually stored on paper or electronically, in both these ways it is important to respect the privacy of the patients and hence follow policies to maintain security and privacy rules. The Health Insurance Portability and Accountability Act (HIPPA) is a major law introduced to ensure privacy, integrity and confidentiality of health data. Its main objective is to provide step by step instructions for providers and other health care organization in dealing with patient’s personal health information. Security of data is protecting health data and methods used to ensure privacy of health information and help health care professionals in secure transmission of data. As utilization of electronic wellbeing record frameworks developed, and
  • 3. transmission of wellbeing information to help charging turned into the standard, the requirement for administrative rules explicit to electronic wellbeing data turned out to be progressively evident. Confidentiality is to ensure that medical professional having access to patients data hold health data in confidence. According to HIPPA and PHI rules any individual or the organization involved in disclosure of patient’s health information is subjected to heavy fines and possible expulsion from license. 3) The HIPAA regulation are only for the US but the regulations which are part of the data regulations for hospital records but there are many regulations that enforced by other countries and international standards and committees one such standard is that helping the hospital records to regulated, secured and maintained properly. One such regulation is HL7 which is provided by the international committee which regulates hospital and patient records all over the world. These regulations make sure that patient privacy is also maintained and makes sure other countries don’t get access to patients in other countries which will get access to weaponize patient data. The data of a country’s citizens is very useful in the hands of other countries, so it is the duty of the HL7 regulation and committee to protect this. The regulations clearly instruct how the patient records are transmitted by API and how they should be encrypted and where the key should be stored and sent via a special communication which will help the patients to maintain the records safe and the hospital to continue to do their business.
  • 4. The HL7 also makes the job for software vendors and providers who work in the health care industry can store and use the patient records in a uniform manner and access can be restricted to different groups. The applications which use HL7 need to be end to end encrypted and API keys need to come from the health care data providers like Cerner which will increase the credibility of the data Bender, D., & Sartipi, K. (2013, June). HL7 FHIR: An Agile and RESTful approach to healthcare information exchange. In Proceedings of the 26th IEEE international symposium on computer-based medical systems (pp. 326-331). IEEE Dolin, R. H., Alschuler, L., Boyer, S., Beebe, C., Behlen, F. M., Biron, P. V., & Shabo, A. (2006). HL7 clinical document architecture, release 2. Journal of the American Medical Informatics Association , 13 (1), 30-39