The Computer, the Nurse and You
How would you like to keep track of your personal health information record in your computer at home? The electronic data exchange was one of the goals of the government to improve the delivery and competence of the U.S. healthcare system. To achieve this plan, the U.S. Congress passed a regulation that will direct its implementation. The Department of Health and Human Services is the branch of the government that was assigned to oversee the HIPAA rules. The Health Insurance Portability and Accountability Act (HIPAA) of 1996 is a national public law in the United States that was created to improve health insurability, prevent insurance abuse and to protect the privacy and security of a person’s health information.
The knowledge about the HIPAA Privacy and Security rules; its coverage and benefits; its development and updates will help an individual to understand the law to effectively manage and protect his or her own personal health record. The advent of computer technology and the HIPAA terms that were associated with information system will be discussed. Some of the experiences with HIPAA will shared to give a better picture and understanding of the law.
HIPAA: Privacy and Security Rules
What is HIPAA? The Health Insurance Portability & Accountability Act of 1996 (HIPAA) was passed by the U.S. Congress to improve portability and continuity of health insurance coverage; to combat waste, fraud and abuse in health insurance; to reduce costs and the administrative burdens by improving efficiency and effectiveness of the health care system by standardizing the interchange of electronic data; and to ensure the pri...
... middle of paper ...
...). Privacy and Health Information Technology. Journal of Law Medicine, 37(2), 121-149. Retrieved January 28, 2011 from CINAHL database
North Carolina DHHS. (2008). HIPAA Timeline. Retrieved January 20, 2011, from http://hipaa.dhhs.state.nc.us/hipaa2002/whatishipaa/HIPAATimeline.html
Schmeida, M. (2005). HIPAA of 1996: Just an Incremental Step in Reshaping Government. Retrieved January 25, 2011, from American Nursing Association Web Site: http://www.nursingworld.org
Sobel, R. (2007). The HIPAA Paradox. The Privacy Rule that’s Not. Hasting Center Report, 37(4), 40-50.
U.S. DHHS (2002). Understanding HIPAA Privacy and Security Rules. Retrieved January 20, 2011, from http://www.hhs.gov/ocr/privacy/hipaa/understanding/index.
Wisconsin DHHS. (2010). Timeline of HIPAA Changes. Retrieved January 22, 2011, from http://www.dhs.wisconsin.gov/hipaa/Timeline/index.htm
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- HIPAA’s Privacy and Security Rules: A Federal Regulation Since the adoption of the Health Insurance Portability and Accountability Act (HIPAA) of 1996, there had been some modifications and interpretations made to its provisions to ensure that the requirements of the law are strictly adhered to. Thus, the “two sets of federal regulations were implemented… the Privacy Rule and the Security Rule” (McGonigle & Mastrian, 2015, p. 157). Briefly, the Privacy Rule addresses the limited use and disclosure of patients’ health information, while the Security Rule refers to the need to safeguard “patients’ health information from improper use or disclosure” (McGonigle & Mastrian, 2015, p.... [tags: Health care provider, Health care]
726 words (2.1 pages)
- The computer is a valuable tool in the healthcare setting, impacting the way nurses practice in the clinical and non-clinical setting. Checking patient identification and medications using bar codes, and entering data into a computer database are commonplace today. Does this move forward with technology actually create an environment which is more effective, efficient, and satisfying for the patient and the nurse. This paper will take a high level look at how technology and the computer impact the nurse, the benefits associated with advancing technology, and some responsibilities the nurse has in today’s increasingly technological arena.... [tags: Healthcare Nursing Technology]
935 words (2.7 pages)
- Since the beginning of technology, the security levels have dramatically increased making the computers and information technology very secure places to store information. In the beginning computer security focused mainly on securing the computer and the physical system. But with everything becoming more and more mobile, security isn’t just about the physical system anymore…it’s also about securing the information that is constantly running between systems and being stored in clouds. This is information security.... [tags: Computer security, Information security, Security]
732 words (2.1 pages)
- http://forums.iobit.com/forum/iobit-security-software/iobit-security-softwares-general-discussions/other-security-discussions/15251-28-types-of-computer-security-threats-and-risA specialized field in computer system security that involves securing a computer system hardware and software. Security is typically handled by a system administrator who implements the security policy, network software and hardware needed to protect a system and the resources accessed through the network from unauthorized access and also ensure that employees have adequate access to resources.... [tags: Computer security, Internet, Password]
1140 words (3.3 pages)
- Privacy and Security are very important aspects in regards to computer databases and keeping them safe. Data Privacy is a way to keep your information secure, and keeping your information secure means it’s going to be kept private (vice versa). Information and data privacy is the relationship between gathering and classifying data and technologies while at the same time keeping them private in the context of the organization. While Computer security and IT security are defined as the means of security and how they translate to computers, their network infrastructures, and the data encompassing the databases that store this data and making sure they are kept safe and classified.... [tags: Computer security, Security, Information security]
2293 words (6.6 pages)
- To: Incoming Computer Science Students From: Christopher Beberness Subject: Vulnerability Assessment Analysis Date: October 8, 2016 Purpose The vulnerability assessment is used in the cyber security field of the computer science. The purpose of this report template is to effectively convey information conducted from a penetration test on a company’s network. Background The vulnerability assessment report is comprised of any exploit or possible weaknesses found in a company’s network while conducting a penetration test as well as a level of risk and how it can be addressed .... [tags: Computer security, Computer, Security]
1049 words (3 pages)
- In computer security, a vulnerability is a weakness which allows an attacker to reduce a system 's information assurance. Vulnerability is the intersection of three elements: a system susceptibility or flaw, attacker access to the flaw, and attacker capability to exploit the flaw. To exploit vulnerability, an attacker must have at least one applicable tool or technique that can connect to a system weakness. In this frame, vulnerability is also known as the attack surface. (Wikipedia). With this previous definition we can assume that a threat occurs when a weakness is Identified and attacked from an outside source for malicious purposes.... [tags: Internet, Computer, Computer security]
716 words (2 pages)
- Introduction Computers have become a part of our life. They are playing an important role almost in everything such as business, education, banking, medical sector, and so on. However, in order to protect all this information, we really need to have a good computer security. Why computer security is very important in our life. Here we go, Cybercrime is one of the greatest threats that is facing in the United States, and this has become an enormous implications for our national security, economic and so on.... [tags: Computer security, Security, Information security]
724 words (2.1 pages)
- “In HYPERLINK "https://en.wikipedia.org/wiki/Computer_security" computer security, a vulnerability is a weakness which allows an HYPERLINK "https://en.wikipedia.org/wiki/Hacker_(computer_security)" attacker to reduce a system 's HYPERLINK "https://en.wikipedia.org/wiki/Information_assurance" information assurance”. In other words some entity you may or may not have done direct business with has a flaw in their data flow or storage that allows an attacker access and the ability to move forward a secure level without invitation or permission.... [tags: Computer security, Internet, Attack]
843 words (2.4 pages)
- Computer Network Security Alternatives Computer network security and integrity is a large concern among all types and sizes of companies. The options for solving security risks are as varied as the companies themselves. However, it is possible to break down the methods for dealing with security risks into three major categories. Companies have the option to: 1. Select best of breed products for their various security needs and assemble the products together to form their own customized solutions.... [tags: Computer Network Security Essays]
776 words (2.2 pages)