Verified Document

Breach Notification White Paper

Breach Notification The confidentiality of medical and personal information of every patients or other individual is a serious issue in the health sector. However, governments such the United States and European Union have put into operation data breach notification rules that cover the health care fraternity. Therefore, breach notification can be defined as rules and regulation which protects or control the unlawful access to data of an individual (Jim Tiller, 2011).

Mostly data breach normally occurs when there is a loss or theft of or access to unauthorized information with sensitive private information which might result to comprise of confidentiality or integrity of the data. Therefore, the United States (U.S.) and the European Union (EU) enacted laws to regulate the breach of personal data of patients. (Gina Stevens, 2012). For example, in the United States, "HITECH Act, Pub L. 111-5 Title XIII," was the first federal health breach notification law to be initiated to protect personal data. In Europe, the governments enacted European Union Privacy Directive, 2009/136/EC which called for tougher privacy protection for data held by electronic communication providers (Gina Stevens, 2012).

However, in last decade several cases of healthcare breach have...

Therefore, according to Howard Anderson (2009) on Healthcare Tally breach, he stated that in September 2009 approximated four hundred and nine cases were reported which affected 19.2 million individuals across the United States (Howard Anderson, 2009). The cases graphically scaling yearly, because early January 2011 alone more than one hundred and forty five breaches were reported and the trend continues to scale up. Therefore, the right laws and strict measures are needed to ensure that the law is adhered to in away to safe the confidentiality of the personal data (Howard Anderson, 2009).
Moreover, the breach notification is categorized as major and minor depends with magnitude of the effects it causes. These however caused by hacking, some involve "Tricare," carelessness in handle healthcare information, breach of ethnic code which state the confidentiality of personal data stored by healthcare facilities across the country. Again, some of the data breach is caused by employees, when he/she reviles the content of patient's data in the hospital. Therefore, HIPAA Privacy Rule has been enacted to restore confidence in health care sector (Jim Tiller, 2011.

HIPAA Rule

In HIPAA…

Sources used in this document:
Reference

Patrick Kierkegaard (23 March 2012) Medical data breaches: Notification delayed is notification

Denied http://www.sciencedirect.com/science/article/pii/S0267364912000209

Gina Stevens (2012)Data Security Breach Notification Laws

http://www.fas.org/sgp/crs/misc/R42475.pdf
Cite this Document:
Copy Bibliography Citation

Related Documents

E-Mail Security Breach Why Did
Words: 894 Length: 3 Document Type: Research Paper

The next thing is to immediately contact the FOIP Coordinator, Privacy Officer, Responsible Affiliate as well as any other person who is responsible for the organization's it security. Evaluation of the Risks Associated with the Breach There is a need to evaluate the risks associated with the privacy breach. This should be done with a consideration of personal as well as health information (Social Insurance Number, financial information or any other

Confidentiality Breach and Unfair Dismissal Law
Words: 1435 Length: 5 Document Type: Memorandum

Milestone 1 I. Introduction As an intern at the legal department of Greene’s Jewelry Wholesale, I am convinced that the company does indeed have significant strengths in as far as its legal claim is concerned. This is more so the case given that Jennifer Lawson did indeed sign a confidentiality agreement whereby she made a commitment to keep any information gathered relating to the creation of Ever-Gold secret. It is important to

Data Breaches and Social Engineering
Words: 1639 Length: 5 Document Type: Essay

victims of an organization's data breach? The largest data brokers, government agencies, retailers, Internet businesses, financial institutions and educational institutions of the nation have disclosed a number of computer intrusions and data breaches. A data breach can take place in case of theft or loss of, or some kind of illegal access to the data that contains sensitive information which is personal and can compromise the integrity or confidentiality of

Sony Reels From Multiple Hacker Attacks
Words: 2089 Length: 6 Document Type: Essay

Sony Reels From Multiple Hacker Attacks In the past, many organizations - from Sony to NASA to the New York Times - have fallen victim to hacking incidents. In addition to costing organizations money, data breaches have also taken a significant toll on the trust customers have on affected businesses. It is therefore important to note that as entities continue to accumulate more PII of clients, the relevance of having in

Data Privacy and Security
Words: 2026 Length: 5 Document Type: Term Paper

Security Management Plan John's Hospital Privacy of client information is an assurance that every patient wants and this assurance is what the hospital can build patient confidence on. The lack of it therefore may have consequences such as loss of confidence in the hospital, loss of clientele and the emergence of a poor reputation. This paper looks at the St. John's Hospital which has experienced the leakage of confidential information a problem

Computer Science Legislative, Ethical, and
Words: 1588 Length: 5 Document Type: Term Paper

One can also set up policies and procedures to respond to and reduce the effects of the loss or damage to ones it environment (Capability: Security Process, 2012). The assess phase should decide the fitting security needs for an organization and which processes are presently in place. Security requirements can vary radically from company to company or institution to institution based, for instance, on dimension, industry or field, regional laws,

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now