Cloud computing can also lessen the risks by making it more difficult to actively 'transport' data away from secure premises. "According to an HHS database, more than 40% of medical data breaches in the past two and a half years involved portable media devices such as laptops or hard drives" (Schultz 2012)
Q3. How can we minimize injury and harm after such incidents occur?
First and foremost, it is important to inform the affected patients of the nature and extent of the security breach. Patients can take action by putting a credit freeze on their accounts, if they are at risk for identity theft. Offering patients free credit protection might be one way to reduce anger and concern. Passwords must be changed to ensure that repeated breaches do not take place, and the system must be thoroughly audited for vulnerabilities. It must be determined if the breach was a one-time event or is part of...
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now