Preview

Security and Privacy

Powerful Essays
Open Document
Open Document
1517 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Security and Privacy
Security and Privacy
Patrick Jean Lemur
HSC 533
January 7, 2013
Penelope Pattalitan EdD, MSN, FNP-BC, RN-BC

Introduction
Identity theft is becoming very easy due to technological advancements. Protecting patient information must include all efforts from medical facilities, employees, and consumers. Society has the right to be protected from any misuse of personal data. An effective protective program starts with front-end preventive safeguards and ends with follow-through that reaches wherever incorrect information has flowed
Identity theft has become a very popular topic for the past decade or so, the number of complaints has increased and is costing more than anyone wants to be spending on that issue. The Federal Trade commission estimates that as many as nine million Americans have their identity stolen each year, resulting in over 50 billion dollars of financial loss (Mercuri, 2006). Very common on Television to hear news and commercials warning about identity theft or some company trying to sell their services, helping in the fight to prevent it. In this paper, there will be discussions on the disadvantages of the break in privacy dealing with identity theft and on possible action plan to prevent the incident.
What are your Reactions? Identity theft is a fraud that occurs when one identity is taken away and used in order to gain services or something usually of financial nature. Criminal identity theft occurs when a victim’s name, address, and mostly social security number is used by a different individual other than the actual owner. Oftentimes, the imposter would obtain that information from someone with access to a data bank where personal information is stored; it may be a hospital, social security department, company that collects data for the purpose of providing financial services. The information may be sold and used to open accounts, gain access to services fraudulently, which the actual owner, a victim of the theft will be charged for.



References: American Health Management Association, [AHIMA]. “Online, On Message, On Duty: Privacy Experts Share Their Challenges.” April 2008. Available online in the FORE Library: HIM Body of Knowledge at www.ahima.org. American Health Management Association, [AHIMA] e-HIM Work Group on Regional Health Information Organizations (RHIOs). “Using the SSN as a Patient Identifier.” Journal of AHIMA 77, no. 3 (Mar. 2006): 56A–D. Retrieved from www.ahima.org Mercuri, R. T. (2006, June). Security Watch: Scoping identity theft. Communications of the ACM, Retrieved from: www.citeseerx.ist.psu.edu O’Brien, Jenny. “Responding to Identity Theft: One Organization’s Effort to Turn a Negative Event into a Positive Result.” Journal of AHIMA 79, no. 4 (Apr. 2008): 40–41. Retrieved from www.ahima.org

You May Also Find These Documents Helpful

  • Better Essays

    In the period 1896 – 1915, the condition of Italy was relatively in a terrible state in many ways with various political, economic and social problems that hindered the country’s progress. Italy’s Liberal Governments during this period were generally very unsuccessful in dealing with these inherited and growing problems clearly contributing to the end of Liberalism in Italy. More so, the Liberal Government under the rule of Giolitti saw Italy progressing in some circumstances regarding the socio-economic concerns. Nonetheless, it is very comprehensible that the Liberal Governments lacked solving the problems that they faced.…

    • 1196 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Harrison J., & Booth N. (2003). Applying new thinking from the linked and emerging fields of digital identity and privacy to information governance in health informatics. Informatics in Primary Care Journal, 11(4), 223-8. Retrieved from CINAHL database.…

    • 1186 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Identity theft is when someone steals another person’s identity through the internet. The identity stolen can be personal information such as account names and security numbers to use it for their own benefit. For example, a Facebook user can steal another Facebook user’s personal details by either hacking or visiting their profile, uploading their profile picture, gaining personal details and using it to create a fake account of that Facebook…

    • 769 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Wojna, Lisa. Identity Theft in Canada. Outrageous Tales and Preventions Strategies, 2012. Wed. 8 October 2014…

    • 2325 Words
    • 10 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Cm220 - Final Project

    • 3514 Words
    • 15 Pages

    Identity theft is an issue faced on a daily basis for those that are living in our wonderful state of California. For some it is common knowledge to protect your identity but for those that are not familiar with the practices of these common crooks, will cost a lifetime of savings and irreparable damage to ones credit and finances. According to the California Office of Privacy Protection, “there were more than 11 million victims of Identity Theft in the United States in 2009, and more than one million of those victims were Californians…. (Office of the Attorney General, 2009)…

    • 3514 Words
    • 15 Pages
    Satisfactory Essays
  • Better Essays

    When it comes to privacy it has become a major concern to both patients and the medical staff. HIPAA and privacy rules help to protect the patient’s privacy. “The HIPAA Privacy Rule establishes national standards to protect individuals’ medical records and other personal health information and applies to health plans, health care clearinghouses, and those health care providers that conduct certain health care transactions electronically (2003).” Over time many studies have been conducted that shows that patient want to be in control over who can access their information. The privacy of patients has increased over the years with many different ways to keep personal information private.…

    • 1058 Words
    • 5 Pages
    Better Essays
  • Best Essays

    References: Author Unknown. Breach Report 2010, Redspin Inc. Dec. 2010. Retrieved from http://www.redspin.com/resources/whitepapers-datasheets/index.php on April 19, 2012. Badzek, L., Gross, G. Confidentiality and Privacy: At the Forefront for Nurses. The American Journal of Nursing, Vol. 99, No. 6 (June, 1999), pp.52-54. Lippincott Williams & Wilkins. Retrieved April 18, 2012 from http://www.jstor.org/stable/3472150. Byfield, E. 315,000 Patients ' Information Disappears From Emory Healthcare. WSBTV. Retrieved April 18, 2012 from file:///F:/Ethics%20information%20age/315,000%20patients%27%20information%20disappears%20from%20Emory%20Healthcare%20_%20www.wsbtv.com.htm Dixon, P. MEDICAL IDENTITY THEFT: The Information Crime that Can Kill You, March 3, 2006. World Privacy Forum. Retrieved from http://www.worldprivacyforum.org/pdf/wpf_medicalidtheft2006.pdf on April 24, 2012. Foreman, Judy (26 June 2006). "At Risk of Exposure”. Los Angeles Times. Retrieved April 23 , 2012. Gellman, R. Fact Sheet 8a: HIPAA Basics: Medical Privacy in the Electronic Age. Privacy Clearing House. March, 2012. Retrieved April 19, 2012 from http://www.privacyrights.org/fs/fs8a-hipaa.htm. Health Insurance Portability and Accountability Act of 1996, 42 U.S.C. § 1320d-9 (2010).…

    • 1982 Words
    • 57 Pages
    Best Essays
  • Powerful Essays

    Patient privacy has been a major issue within the healthcare field for many years. With the increasing use of medical information technology more and more people are being authorized to view patient health information. Not only do physicians and nurses have access; but this has broadened to include allied health professionals, billing specialists, quality assurance employees, social workers, medical records technicians etc... (Pendrak & Ericon, 1998). All of these healthcare professionals have a duty to take any steps necessary to protect the patient 's right to privacy when it comes to their health information.…

    • 1410 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    IS 4560 Week 1

    • 309 Words
    • 2 Pages

    Data breaches that could lead to identity theft, by sector - the danger of data breaches are of particular importance for organizations that store and manage large amounts of personal information. Not only can compromises that result in the loss of personal data undermine customer and institutional confidence, result in costly damage to an organization’s reputation, and result in identity theft that may be costly for individuals to recover from, they can also be financially debilitating to organizations.…

    • 309 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Morton, Heather "Identity Thieves: Let 's Catch Them If We Can." State Legislatures (2004). Academic Search Premier. EBSCO. Web. 21 Sept.…

    • 626 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Identity theft is an important crime in society today and it needs to be heavily enforced and prosecuted. According to Transunion.com, As of 2015, 9.9 million Americans are victims of identity theft, with an incident happening on average every 19 seconds. This proves just how important of a crime identity theft is and that it should be better protected and have harsher consequences. The legal definition of identity theft according to Dakota Family Bank and Foundations of Computer Society is “the fraudulent acquisition and use of a person's private identifying information, usually for financial gain.” Identity theft is in relation to the crime of stealing as if someone is committing Identity Theft, then they are taking the name of someone…

    • 928 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Security and Privacy

    • 1863 Words
    • 6 Pages

    Protecting patient’s privacy is of the most important when it comes to the health care field. There are many individuals who want to steal information which is not theirs, but allows them to this information to get what they want and this is, called identity theft. This paper will take a look at the incident at St. John’s Hospital and what should be done with patient information and what not to do with unwanted files. This paper will also take a look at the management plan and code of conduct.…

    • 1863 Words
    • 6 Pages
    Better Essays
  • Better Essays

    The debate is still going on today about what can and cannot be done legitimately with patients health information. There are worries about who should be able to access the patient’s information and for what reasons do they have to be accessing the patient’s health information. While on the other side there is an increasing need for performance assessments, efficient health guard, and a proficient administration for more and better information. Health care services are now starting to realize that they have a lot of work to do to be in compliance with the current health laws on the state and federal level guidelines when it comes to dealing with protecting patient data.…

    • 1142 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    According to Federal Trade Commission, “over the last 20 years over a trillions of dollars has been lost by innocent people and many businesses.” That’s more than enough money that could be used to help fix the roads, schools and other important environmental/everyday things. “The average person who has had their identity stolen or misused lost close to $2,000 and the average company or business loses approximately $15,000.” (Rotter) In 2012 a survey showed that around 16.6 million people have experienced at least one identity theft innocent and did not report it to any type of authority or try to do anything about it. Identity theft has been a growing issue affecting billions of people nation-wide, and we need to find a solution to save all…

    • 1179 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Electronic Health Records

    • 1996 Words
    • 8 Pages

    The 2007 report, The Health Privacy Project indicated many patients do not trust their providers and that one in five American adults believes that their information may have been improperly used. In order for patients to truly understand these rules and regulations proper education needs to take place. The patient needs to trust their healthcare provider and understand that their information is truly protected by…

    • 1996 Words
    • 8 Pages
    Powerful Essays

Related Topics