Verified Document

Crisis Management The E Mail Security Breach By The KP Online Pharmacy Case Study

How serious was this e-mail security breach? Why did the Kaiser Permanente leadership react so quickly to mitigate the possible damage done by the breach?

The e-mail security breach by the KP online Pharmacy was grave because it violated various HIPPA and State laws that protect patients from health information disclosure without prior consent. Moreover, such a breach of confidential and private information could cause harm and affect the patients' dignity. For instance, disclosing a patient's health data could result in embarrassment, stigma, or discrimination (Drolet et al., 2017). Protection of patients' information usually promotes quality care by enhancing effective communication and information sharing between physicians and patients. Furthermore, according to HIPPA security rule, Kaiser Permanente's mandate is to adopt applicable procedures and policies that ensure that patients' information is contained, protected from any form of a security breach. Also, that such policies and procedures can detect and correct any attempt to patient information security breach before it happens. Therefore, Kaiser Permanente leadership had to immediately contain and correct the e-mail security breach because it could cancel their trading license and legal action against the Pharmacy (Cohen et al., 2018).

Assume...

After the initial apologies, what recommendations would you make for investigating the root cause(s) of the breach? Outline your suggested investigative steps.

In evaluating and determining the exact root cause of such a security breach, Kaiser Permanente, the first step would be to determine when and where the clear violation occurred...

…any access or attempt to access the electronic patient health information database. In addition, the administrative leadership of Kaiser Permanente should implement and conduct training on security awareness for all the members of the workforce. Such training programs opt to encompass how addresses can be protected from malicious software and management of password and monitoring log-ins. Furthermore, the organization should implement a contingency plan to ensure proper testing and revision procedures whenever a new code or program is used to manage patient health information. Adoption of such testing plans will ensure that security breach is not permitted. Lastly, the administrative leadership of Kaiser Permanente should execute periodic nontechnical and technical evaluations to respond to any security threats or system changes that may compromise the security of electronic patient health information (Drolet…

Sources used in this document:

References


Cohen, I. G., & Mello, M. M. (2018). HIPAA and protecting health information in the 21st century. Jama, 320(3), 231-232.


Drolet, B. C., Marwaha, J. S., Hyatt, B., Blazar, P. E., & Lifchez, S. D. (2017). Electronic communication of protected health information: privacy, security, and HIPAA compliance. The Journal of hand surgery, 42(6), 411-416.


Cite this Document:
Copy Bibliography Citation

Related Documents

Security Breach Case Scenario 1: Security Breach
Words: 1969 Length: 7 Document Type: Essay

Security Breach Case Scenario 1: Security Breach Hospitals have the opportunity and responsibility to integrate sound policies and procedures in relation to the protection of the confidential client information (Rodwin, 2010). St. John's Hospital in no different to this notion has the organization seeks to enhance the security and confidentiality of the information of its clients. The organization is a role model to other institutions within the geographical area on the essential

Security Breach at Target
Words: 580 Length: 2 Document Type: Essay

Computer Security Breaches Internal Controls and Receivables On December the 19th Target publicly acknowledged they had suffered a data breach, which had resulted in the loss of 40 million customer payment card details, along with their names, expiry dates, and the encrypted security codes (Munson, 2013), At the time this was one of the largest security breaches, with the firm suffering not just because they were targeted by criminals, but as a

E-Mail Security Breach Why Did
Words: 894 Length: 3 Document Type: Research Paper

The next thing is to immediately contact the FOIP Coordinator, Privacy Officer, Responsible Affiliate as well as any other person who is responsible for the organization's it security. Evaluation of the Risks Associated with the Breach There is a need to evaluate the risks associated with the privacy breach. This should be done with a consideration of personal as well as health information (Social Insurance Number, financial information or any other

Crisis Management at the United Nations Though
Words: 944 Length: 3 Document Type: Essay

Crisis Management at the United Nations Though an admirable organization, the United Nations does not always function like a smoothly oiled machine. This is because of the organization's sheer size, but also of its many inefficiencies. However, if there is one department in which there should not be any kind of delay or misunderstanding, it is the department of communications. This department, because of the nature of the organization, is vital

Crisis Management the Prevailing Literature
Words: 2453 Length: 8 Document Type: Term Paper

The authors noted that experience played a factor in the results of the simulation, yet during a crisis experience alone cannot be relied upon to restabilize the situation. Roux-Dufort's thoughts on crisis management are particularly prescient for organizations, but may not be applicable in specific micro-level contexts (such as with Moorthy's surgeons). What the literature highlights is that the divide in thought and perspective that was identified by Pearson and

Crisis Management Bomb Threat the Most Important
Words: 941 Length: 3 Document Type: Essay

Crisis Management Bomb Threat The most important step in the crisis management is gathering situational information. Decisions and responses should be based on the information at hand, evaluated on a situation-by-situation basis. If the bomb threat occurs in a school, it must be taken seriously. However, "many school bomb threats have been made by students seeking to disrupt the school day and to get out of school," (National School Safety and Security

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now