.

Wednesday, March 13, 2019

Privacy And Security Concerns Regarding Health Information Essay

eccentric 4.8 E-mail Goes AstrayPrimarily, the technician is the one responsible for the jailbreak in confidentiality because he was the one who sent out the e-mails. Moreover, he did non seek instructions from Kaiser Permanente regarding the backlogged e-mails. Kaiser Permanente engage the technician to upgrade their system of rules. Therefore, tasks other than doing upgrades should be consulted to the company. The technician should consecrate asked whether the accumulated e-mails in the system should be sent out, and he should nurse asked what to do with them. However, Kaiser Permanente is partly responsible for the breach, because first and foremost, since they hold millions of private selective information, they should need make sure that that information would not be compromised. They should have made their system secure and only accessible to Kaiser Permanente personnel.Yes, situations like this discourage subscribers in using the system of Kaiser Permanente. However , the services that Kaiser Permanente offer is of great value and subscribers give not easily discontinue their subscription. But Kaiser Permanente has to ensure their subscribers that this leave not happen in the future by informing them what caused the breach and reassure them that upgrades are existence done to improve the security of the system and the privateness of their information. The most important thing to do here is to be bonny and at the same time make great efforts to secure the system of the company.Case 4.17 Patients Files Used for Obscene CallsDefinitely, background checks should be conducted before hiring new employees because this would ensure the safety of the clients, especially in the health care industry. Employers should be granted access to criminal records for them to be satisfactory to identify the extent of the crime that ex-convicts have committed. Cases such as child rape and indecent assault is a serious crime that should not be disregarded wh en hiring employees, especially when the job requires dealing with other people, children, and so forth such as in the health care institution.Former employees who are given access to system information that are confidential, such as passwords, etc. should be screened out from the system. In other words, once an employee is not connected with the institution anymore, his access to the system should be deleted or reset. In this case, the system of the health care institution is at fault because it failed to substantiate the information confidential and secure.In this case, the hospital is accountable for the actions of the technician. Primarily because they hired an employee without doing background checks, they do not monitor the system, wherein they could have detected that calls were world made and the information of the clients were being accessed, and the system is not 100 % secure.Case 4.44 University Tightens Computer SecurityBecause of the wide range of subscribers in univ ersity medical middle(a)s information systems, it becomes vulnerable to hackers. In this case, they hacked into the system and used it to send hundreds of advertisements in their e-mails. The hackers precious to target the significant number of subscribers in the system. However, the information within the system is not precisely the target of the breach.It is not entirely the medical circle arounds fault. This is because hackers do what they do. They find ways to get into the system even if security measures were set-up to avoid breaching the security of an information system. Therefore, even if the system is secure, hackers will really find a way to get into the system. The medical centers fault was that they were not able to detect that the system was being hacked. They should have upgrades in the system, which will be used in supervise the system and alarming when hackers breach the system.

No comments:

Post a Comment