EXPLAINING HIPPA,SOX, & PCI
ITT TECH
HIPPA
HIPAA which stands for the Health Insurance Portability and Accountability Act was passed in 1996. It was made to make sure that health or medical information data is protected. But it 's not just used by the health care industry, employers that offer health insurance must abide by HIPAA. HIPAA defines health information as any data is created or received by health care providers, health plans, public health authorities, employers, life insurers, schools and universities, and health care clearinghouses. This data relates to the health of any individuals past, present, and future health, their physical and mental health and what kind of condition they are …show more content…
Security standards are used to protect any stored data, the use of data, and the transmission of data. The Privacy standards makes companies not share any information without the patient 's consent. It also informs you of practices used to keep your health information private. If the rules of HIPAA cannot be followed than there are penalties: for making mistakes you can be fined up to $100 per violation and $25,000 per year. Knowingly obtaining or releasing data can result in $50,000 in fines and one year in prison. Obtaining or disclosing data under false pretenses can range to $100,000 in fines and 5 years in prison. Obtaining or disclosing data for personal gain or malicious harm you will have to pay a fine of $250,000 and serve up to 10 years in …show more content…
It was created by the PCI Security Standard Council in which several major credit card companies gave input. The PCI DDS was established to ensure that the Name, Credit card number, expiration date and security code was not compromised in any way. There are several requirements and many more principles that are part of these requirements. Building and maintaining a secure network: install and maintain a firewall, and do not use defaults, such as in passwords. Protecting the cardholder data: protecting the stored data and using encrypted transmissions. Maintain a Vulnerability Management program: use and update antivirus software and develop and maintain secure systems. Implement strong access control measures: restrict access to data, use unique logons for each user, and restrict physical access. Regularly monitor and test networks: track and monitor all access to systems and data and regularly test security. Maintain an Information security policy: maintain a security policy. Merchants using credit cards must comply with the standards and regulations of PCI DSS and is monitored by the acquirer. This is a three part process. First the merchant assess by identifying an existing cardholder and then analyzing the data and checks for vulnerabilities. Second the merchant Remediates by correcting any vulnerabilities and storing data