Determine problem-protecting health care privacy

Assignment Help Management Theories
Reference no: EM131631583

Question: Protecting Health Care Privacy

The U.S. Health Insurance Portability and Accountability Act (HIPAA) addresses (among other things) the privacy of health information. Title 2 of the act regulates the use and disclosure of protected health information (PHI), such as billing services, by healthcare providers, insurance carriers, employers, and business associates.

Email is often the best way for a hospital to communicate with off-site specialists and insurance carriers about a patient. Unfortunately, standard email is insecure. It allows eavesdropping, later retrieval of messages from unprotected backups, message modification before it is received, potential invasion of the sender's privacy by providing access to information about the identity and location of the sending computer, and more. Since healthcare provider email often includes PHI, healthcare facilities must be sure their email systems meet HIPAA privacy and security requirements. Children's National Medical Center (CNMC) of Washington, D.C., "The Nation's Children's Hospital," is especially aware of privacy concerns because its patients are children. CNMC did what many organizations do when faced with a specialized problem: rather than try to become specialists or hire specialists for whom the hospital has no long-term full-time need, it turned to a specialist firm.

CNMC chose Proofpoint of Sunnyvale, California, for its security as a service (SaaS) email privacy protection service. Matt Johnston, senior security analyst at CNMC, says that children are "the highest target for identity theft. A small kid's record is worth its weight in gold on the black market. It's not the doctor's job to protect that information. It's my job." Johnston explains that he likes several things about the Proofpoint service:

? "I don't have to worry about backups." Proofpoint handles those.

? "I don't have to worry about if a server goes down. [If it was a CNMC server, I would have to] get my staff ramped up and bring up another server. Proofpoint does that for us. It's one less headache."

? "We had a product in-house before. It required several servers which took a full FTE [full-time employee] just to manage this product. It took out too much time."

? "Spam has been on the rise. Since Proofpoint came in, we've seen a dramatic decrease in spam. It takes care of itself. The end user is given a digest daily."

? Email can be encrypted or not, according to rules that the end user need not be personally concerned with.

? "Their tech support has been great."

Proofpoint is not the only company that provides healthcare providers with email security services. LuxSci of Cambridge, Massachusetts, also offers HIPAA-compliant email hosting services, as do several other firms. They all provide the same basic features: user authentication, transmission security (encryption), logging, and audit. Software that runs on the provider's computers can also deliver media control and backup. Software that runs on auser organization's server necessarily relies on that organization to manage storage; for example, deleting messages from the server after four weeks as HIPAA requires.

As people become more aware of the privacy risks associated with standard email, the use of more secure solutions such as these will undoubtedly become more common in the future.

Critical Thinking Questions

1. What requirement does HIPAA institute to safeguard patient privacy?

2. Universities use email to communicate private information. For example, an instructor might send you an email explaining what you must do to raise your grade. The regulations about protecting that information under the Family Educational Rights and Privacy Act (FERPA) are not as strict as those under HIPAA. Do you think they should be as strict as HIPAA's requirements? Why or why not?

3. How does Proofpoint safeguard patient privacy? Could Proofpoint do the same for university and corporate emails? Why or why not?

Reference no: EM131631583

Questions Cloud

Evaluate alternative monetary policies : Describe the Fed's objective function and how it can be used with an economic model to evaluate alternative monetary policies.
And why is this overinvestment a bad thing : Government-imposed price floors may increase the price, but they also typically lead to:
Define emotions most heavily impact the healthcare consumers : Discuss which emotions most heavily impact the healthcare consumers and how healthcare marketers are able to react to those emotions
Same product with different cost functions : Three firms produce the same product with different cost functions. Firm 1's marginal cost is 10, firm 2's marginal cost is 8, and firm 2's marginal cost is 4.
Determine problem-protecting health care privacy : The U.S. Health Insurance Portability and Accountability Act (HIPAA) addresses (among other things) the privacy of health information.
Support your views with credible data : Support your views with credible data. This is an area where junk science abounds. Be prepared to give and defend your sources as scientifically trustworthy.
Demand and supply curves for a product : If the current price of the product is $100, what is the quantity demanded and the quantity supplied? How would you describe this situation
Discuss young adults often engage in risky activities : Teenagers and young adults often engage in risky activities that have the potential to result in harm to oneself or others
Discuss ethanol as a transportation fuel : In 2-3 pages, using APA-style formatting, discuss ethanol as a transportation fuel. Identify at least three advantages and three disadvantages of its use.

Reviews

Write a Review

Management Theories Questions & Answers

  Learning in action

Learning contract proposal that will form the basis of your learning contract report.

  Change is the only constant

"Change is the only constant " Evaluate the different types of change that have occurred in Sony.

  How do advertisers try to use group influence

How do advertisers try to use group influence?  Will you find any specific examples and explain the relevant theory of group behavior and influence?

  Case study:saving sony

You have been appointed by Sony as a consultant on change management. Advise Sony on how they could implement the change by using the various theories of change you have learnt.

  How the stock market works

The purpose of this project is to help you to gain an understanding of how the stock market works and of the relationship between theory and practice.

  Find the optimal production quantities

Find not only the optimal production quantities, but also the optimal total cost.

  Describe the management process

Describe the management process and identify the skills required to manage business organizations.

  Case study : bert''s bonsai and aquatic sport museum

Case Study : Bert's Bonsai and Aquatic Sport Museum Prepare a knowledge management system.

  Knowledge management techniques

Demonstrate understanding of the many-sided nature of knowledge management

  Theory of transtheoretical model

Demonstrate understanding of the many-sided nature of knowledge management

  Write a paper on historical trends of management

Write a paper on Historical Trends of Management.

  Theory of reasoned action

Theory of Planned Behavior and Integrated Behaviors Model

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd