Percy A. Grisby II
Computer Ethics
January 16, 2015
Professor Sonya M. Dennis
Describe the security issues of BCBST in regard to confidentiality, integrity, availability, and privacy based on the information provided in the BCBST case.
To begin with the enforcement movement coming about because of HITECH Breach Notification Rule: Blue Cross Blue Shield of Tennessee (BCBST) has consented to pay the U.S. Bureau of Health and Human Services (HHS) $1,500,000 to settle potential infringement of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) Privacy and Security Rules, Leon Rodriguez, Director of the HHS Office for Civil Rights (OCR), affirmed today. BCBST has likewise consented to …show more content…
HHS Office for Civil Rights implements the HIPAA Privacy and Security Rules. The HIPAA Privacy Rule gives people rights over their secured health data and sets governs and confines on who can take a gander at and get that health data. The HIPAA Security Rule ensures health data in electronic structure by obliging elements secured by HIPAA to utilize physical, specialized, and authoritative shields to guarantee that electronic ensured health data stays private and secure.
The HITECH Breach Notification Rule requires secured elements to report an impermissible utilization or revelation of ensured wellbeing data, or a "rupture," of 500 people or more to HHS and the media. Littler breaks influencing short of what 500 people must be accounted for to the secretary on a yearly premise. (HHS settles HIPAA case with BCBST for $1.5 million, 2012)
Describe the HIPPA security requirement that could have prevented each security issue identified if it had been …show more content…
(Mullen, 2012)
Analyze the security issues and the HIPAA security requirements and describe the safeguards that the organization needs to implement in order to mitigate the security risks. Ensure that you describe the safeguards in terms of administrative, technical, and physical safeguards. Security risk examination should be the first request of business, if this hasn’t been performed in the previous year. There needs to be verification that all regions have been investigated and taken care of from a security standpoint. When you take for granted something you think is immaterial you could end up with a security problem that is paramount, trying to address it then will have you playing catch up. To date this is no evidence of any abuse of information from the stolen hard drives as indicated by BCBST. The organizations’ reaction incorporated the encryption of all of its information and additional examinations. Tena Roberson, security officer for BlueCross stated in an announcement, “since the burglary, we have worked industriously to restore the trust of our partners by showing that we are restricting the dangers from this wrong doing and making critical ventures to guarantee that their data is protected at all times,” this was announced to HC