Preview

Chapter 3 Review

Powerful Essays
Open Document
Open Document
1240 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Chapter 3 Review
Chapter 3 Review
1. What is the difference between law and ethics?
The difference between law and ethics is that law is a set of rules and regulations that are universal and should be accepted and followed by society and organizations. Ethics on the other hand was derived from the latin word mores and Greek word Ethos means the beliefs and customs that help shape the character of individuals and how people interact with one another
2. What is civil law, and what does it accomplish?
A wide variety of laws that govern a nation or state and deal with the relationships and conflicts between organisational and entities and people.
3. What are the primary examples of public law?
Criminal, administrative and constitutional law.
4. Which law amended the Computer Fraud and Abuse Act of 1986, and what did it change?
The National Information Infrastructure Protection of 1996 amended the Computer Fraud and Abuse Act of 1986. It modified several sections of the CFA Act, and increased the penalties for selected crime.
5. Which law was specifically created to deal with encryption policy in the United States?
The Security and Freedom through Encryption Act of 1999.
6. What is privacy in an information security context?
Privacy is not absolute freedom from observation, but rather it is a more precise “State of being free from unsanctioned intrusion”.
7. What is another name for the Kennedy-Kassebaum Act(1996), and why is it important to organisations that are not in the health care industry?
The Health Insurance Portability and Accountability Act of 1996(HIPAA) protects the confidentiality and security of health-care data by establishing and enforcing standards and by standardising electronic data interchange. It impacts all health-care organisations including doctors practices, health clinics, life insurers, and universities, as well as some organisations which have self-insured employee health programs or manage data related to health-care.
The act requires organisations that

You May Also Find These Documents Helpful

  • Good Essays

    “This bill would require state agencies and businesses that maintain computer data systems that contain personal information to disclose, as specified, any breach of the security of the systems, as defined, to any person whose personal information was, or may have been, accessed by an unauthorized person. This bill would also make a statement of legislative findings and declarations regarding privacy and financial security (SB 1386 Senate Bill – AMENDED, 2000).”…

    • 577 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Australian Oh&S Essay

    • 831 Words
    • 4 Pages

    2. Where can you find out more about the Act and regulations for your state or jurisdiction?…

    • 831 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Chapter 6 Review

    • 1684 Words
    • 7 Pages

    1) Which of the following must a firm in a market economy do today to succeed?…

    • 1684 Words
    • 7 Pages
    Better Essays
  • Good Essays

    The Health Insurance Portability and Accountability Act (HIPAA), became law in 1996. It requires health care providers, insurance companies and others involved in health care transactions to provide security on any system containing personal health information, store and transmit that information according to standardized rules, and place an automatic audit on files to help keep track of who should have access to them and whether those access rules have been violated. HIPAA complaints and violations that aren't fixed quickly are subject to a fine of between $100 per incident or a maximum of $25,000 per year for violation of a specific rule.…

    • 783 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    1.3 – Explain the purpose of legal and organisational requirements for the security and confidentiality of information.…

    • 802 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The Health Insurance Portability and Accountability Act of 1996 (HIPAA) was created to develop regulations to protect the privacy and security of certain health information; which shouldn’t be accessible to individuals without the need to know. The U.S. Department of Health and Human Services (HHS) is responsible for HIPAA compliance within the Privacy Rule as well as the Security Rule. This Privacy Rule develops national standards for protecting certain health information while the Security Rule establishes a national set of security standards for protecting specific health information that is held or transferred in electronic form.…

    • 470 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    In this document I will be discussing the laws that are related to security and privacy of datas, I will explain how they relate to the security and privacy of data.…

    • 1633 Words
    • 7 Pages
    Good Essays
  • Powerful Essays

    3.1, Summarise the main points of legislation and procedures covering confidentiality, data protection and the disclosure of information…

    • 2059 Words
    • 9 Pages
    Powerful Essays
  • Better Essays

    Hippa and Nursing

    • 963 Words
    • 4 Pages

    The protection and privacy of HIPAA (Health Insurance Portability and Accountability Act) which became law in ,1996. Subtitle F of Title II of HIPAA, entitled "Administrative Simplification, "requires the Secretary of Health and Human Services to adopt national standards for certain information- related activities of the health care industry. This law works to make the efficiency and effectiveness of the health care system by mandating the development of standards and requirements to enable the electronic exchange of certain health information. Section 262 of subtitle F added a new Part C to Title XI of the Act. Part C (42 U.S.C. 1320d - 1320d-8) requires the Secretary to adopt national transactions, such as code sets and certain unique health identifiers. Recognizing that the industry trend toward computerizing health information, which HIPAA encourages, may increase access to that information, the statute also requires national standards to protect the security and privacy of the information." The Privacy Rule is defined as "HIPAA Privacy the Protections and privacy of all health information." HIPAA.101.com: the rules, (2006, ¶HIPAA Security Rule, this rule "mandates the security of Electronic medical records (EMR). This rule addresses the technical aspects of protecting electronic health files." HIPAA.101.com: HIPAA: the rules (2006:¶ 3).…

    • 963 Words
    • 4 Pages
    Better Essays
  • Good Essays

    What were the advances in information technology that resulted in new ethical issues necessitating the creation of each act?…

    • 604 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The security and privacy standards have had a major impact on the collection and distribution of information and will continue in the years to come. One of the purposes is to protect individuals from losing their health insurance when leaving and/ or changing jobs and by providing portability. This will also increase the government’s authority over fraud and abuse while the data is transferred from one facility to another. In addition, patients benefited from the ongoing health care management’s promise to provide high quality of care. This is important because there are many risks of security breaches. Hospital staff is being tempted to sell private information and HIPAA helps set standards and the facilities enforce the consequences of breaking the rules. Another advantage for patients is the privilege of accessing their own…

    • 921 Words
    • 4 Pages
    Good Essays
  • Good Essays

    The advances in information technology have resulted in new ethical issues necessitating the creation of many important acts. Two in particular acts are Health Insurance Portability and Accountability Act (HIPAA) and Children’s Internet Protection Act (2000). Both of these acts were implemented to protect humans from harmful content and healthcare information.…

    • 461 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    I. Electronic Communications Privacy Act The United States Congress passed the Electronic Communications Privacy Act (ECPA) in 1986 in order to broaden the government’s reach regarding wiretapping and electronic eavesdropping.1 Specifically, in addition to the wiretapping of telephone calls, this act allows the government to wiretap electronic data transmissions by computer as well. Privacy issues have arisen since its inception; however, since the explosion of technology and the increased use of the World Wide Web, the inadequacies of the ECPA’s privacy standards became a prevalent and recurring issue for the courts to address.…

    • 5591 Words
    • 219 Pages
    Powerful Essays
  • Good Essays

    Regulating Technology

    • 840 Words
    • 4 Pages

    Since the 1970’s, information technology has completely changed the world. Technology is an ever evolving machine whose possibilities are endless. This generation has seen more technological advances than any other generation in history. By having the ability to access and relay information so quickly, computers and other technological devices have proven to be both a blessing and a curse. Users have the ability to compile, analyze, store, retrieve and utilize information to make business processes more efficient; however, if compromised by unauthorized individuals for malevolent purposes, there can be a multitude of negative consequences. The Computer Fraud and Abuse Act, 1986 (CFAA) was designed to prevent such instances by deeming it a Federal offense to knowingly access a protected computer without authorization or exceeding one’s authorized access and as a result, causes damage. The Telephone consumer Protection Ac, 1991 (TCPA) is another Federal legislative action that governs the practices of telemarketer. The act was created to ensure a balance between protection of consumer rights and permitting companies to effectively utilize telemarketing. As a result of a myriad of technological tools, ranging from cell phones and laptops to government protected software, the U.S. Government recognized the need to create legislation that would facilitate the use of such technology to enhance our society by maintaining a secure structure for all parties.…

    • 840 Words
    • 4 Pages
    Good Essays
  • Good Essays

    cyber law

    • 2426 Words
    • 12 Pages

    Cybercrime, also known as computer crime, Any use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child pornography and intellectual property, stealing identities, or violating privacy. Cybercrime, especially through the Internet, has grown in importance as the computer has become central to commerce, entertainment, and government.…

    • 2426 Words
    • 12 Pages
    Good Essays