Protected Health Information (PHI) in a Small Business

Author(s):  
James Suleiman ◽  
Terry Huston

Compliance with regulatory guidelines and mandates surrounding information security and the protection of privacy has been under close scrutiny for some time throughout the world. Smaller organizations have remained “out of the spotlight” and generally do not hire staff with the expertise to fully address issues of compliance. This case study examines a project partnership between an information-technology (IT) consultant who specializes in small business and a diminutive medical practice that sought support with compliance issues surrounding a research study it was conducting. Other small medical practices were contributing to the research; consequently, information sharing while concurrently adhering to the regulations of the Health Insurance Portability and Accountability Act (HIPAA) of 1996 was a significant aspect of the project. It was also critical that numerous other security and privacy legislative requirements were met. The issue of data security is often neglected in IT instruction. This case study provides a foundation for examining aspects of information security from the perspective of the small-business IT consultant.

2013 ◽  
pp. 1208-1218
Author(s):  
James Suleiman ◽  
Terry Huston

Compliance with regulatory guidelines and mandates surrounding information security and the protection of privacy has been under close scrutiny for some time throughout the world. Smaller organizations have remained “out of the spotlight” and generally do not hire staff with the expertise to fully address issues of compliance. This case study examines a project partnership between an information-technology (IT) consultant who specializes in small business and a diminutive medical practice that sought support with compliance issues surrounding a research study it was conducting. Other small medical practices were contributing to the research; consequently, information sharing while concurrently adhering to the regulations of the Health Insurance Portability and Accountability Act (HIPAA) of 1996 was a significant aspect of the project. It was also critical that numerous other security and privacy legislative requirements were met. The issue of data security is often neglected in IT instruction. This case study provides a foundation for examining aspects of information security from the perspective of the small-business IT consultant.


Author(s):  
Bamidele Ola ◽  
Iyobor Egho-Promise

The emergence of ecommerce almost three decades ago has completely transformed the approach to purchasing goods and services across various countries in the world. Almost every country in the globe, now have some form of ecommerce operations, this has further been enhanced by the stay at home COVID-19 induced lockdowns. The value and volume of transactions has also increased in transactions. However, there has been security concerns impacting ecommerce operations, which has in part, led to increasing adoption of hosting ecommerce systems in the public cloud. Threat modelling offer mechanisms to enhance the security of information technology (IT) systems. In this paper, we apply different threat modelling techniques to decompose the migration of an on-premise hosted ecommerce system to the public cloud and also evaluate these threat modelling techniques.


Author(s):  
Mike Gregory ◽  
Cynthia Roberts

The Health Insurance Portability and Accountability Act of 1996 (HIPAA) was initially enacted as an administrative simplification to standardize electronic transmission of common administrative and financial transactions. The program also calls for implementation specifications regarding privacy and security standards to protect the confidentiality and integrity of individually identifiable health information or protected health information. The Affordable Care Act further expanded many of the protective provisions set forth by HIPAA. Since its implementation, healthcare organizations around the nation have invested billions of dollars and have cycled through numerous program attempts aimed at meeting these standards. This chapter reviews the process taken by one organization to review the privacy policy in place utilizing a maturity model, identify deficiencies, and lead change in order to heighten the maturity of the system. The authors conclude with reflection related to effectiveness of the process as well as implications for practice.


Author(s):  
Kathleen Moffitt

The intention of the case study is to show a less-than-successful attempt at the introduction and use of information technology in a small business. Contrary to what is reported in the general and computer press, the application and understanding of technology is lacking in many small businesses that could benefit greatly from its use.


2011 ◽  
pp. 154-161
Author(s):  
Jeffrey W. Seifert ◽  
Harold C. Relyea

The United States is frequently ranked among the most advanced e-government countries in the world (Accenture, 2004; United Nations, 2003; West, 2004). While many of these surveys emphasize the importance of technological issues, such as Web sites, interoperable data standards, and security protections, considerably less attention has been focused on the legislative environment that either facilitates or hinders the development of e-government at the national level. Like all countries, the United States has long grappled with the problem of how to centrally coordinate a diverse and sometimes incongruous collection of departments and agencies to achieve improved efficiencies, while maintaining a level of flexibility that enables these entities to carry out their specialized responsibilities effectively. This challenge can be made harder by the integration of information technology into government, by reifying organizational boundaries in the form of so-called “stove pipes” and “islands of automation.” To combat these problems, national governments are attempting to use legislative means to harmonize a cacophony of independent initiatives, and establish benchmarks for oversight. On December 17, 2002, President George W. Bush signed the E-Government Act of 2002 (116 Stat. 2899; P.L. 107-347) into law. Although there are many existing laws regarding issues such as information technology (IT) management, privacy, and information security, the E-Government Act of 2002 is the first national law that specifically addresses e-government in the United States. Prior to the passage of the E-Government Act, the law frequently cited as the most comprehensive information technology-related law was the Clinger-Cohen Act, signed into law in 1996, just 5 years after the development of the World Wide Web (1991) and at a time when the potential uses of the Internet were just beginning to be recognized by the larger, general public. The Clinger-Cohen Act provisions focus primarily on a narrow range of issues, including the decentralization of IT management within the U.S. federal government, pilot testing of new IT procurement procedures, and the establishment of chief information officer (CIO) positions in the major departments and agencies. In contrast, the provisions of the E-Government Act, described in greater detail below, address a much more comprehensive range of issues, suggesting that the integration of IT into government operations has reached a critical turning point. Some of these provisions include information security, IT management and training, the digital divide, and the creation of an Office of Electronic Government to coordinate and oversee e-government initiatives government-wide, among other duties.


Author(s):  
B. Dawn Medlin ◽  
Charlie C. Chen

The price of privacy intrusion and security breaches is often due to the ubiquitous connectivity of networks.  National entities as well as other governing bodies have passed laws and regulations to assist individuals in their quest to protect their information as it is being transmitted as well as received over these networks.  An international perspective of information privacy and security laws and regulations can provide an insightful view concerning how each country differs as well as the important drivers for these differences. Policy makers can learn from the comparisons made in relation to similarity and/or differences of privacy and security laws as well.  In chapter 9, authors have selected different countries and regions around the world due to the growth of security and privacy threats that has grown over the past 10 years as well as their legislative practices.


Author(s):  
Mike Gregory ◽  
Cynthia Roberts

The Health Insurance Portability and Accountability Act of 1996 (HIPAA) was initially enacted as an administrative simplification to standardize electronic transmission of common administrative and financial transactions. The program also calls for implementation specifications regarding privacy and security standards to protect the confidentiality and integrity of individually identifiable health information or protected health information. The Affordable Care Act further expanded many of the protective provisions set forth by HIPAA. Since its implementation, healthcare organizations around the nation have invested billions of dollars and have cycled through numerous program attempts aimed at meeting these standards. This chapter reviews the process taken by one organization to review the privacy policy in place utilizing a maturity model, identify deficiencies, and lead change in order to heighten the maturity of the system. The authors conclude with reflection related to effectiveness of the process as well as implications for practice.


2020 ◽  
Vol 4 (3) ◽  
pp. 142-153
Author(s):  
Hanna Yarovenko ◽  
Olha Kuzmenko ◽  
Mario Stumpo

The consequences of the fourth industrial revolution caused an increase in the level of computerization and digitalization of society, which led to problems related to the protection of information of individual users, companies and the state as a whole. The aim of this paper is to analyze the effectiveness of the information security system of countries in terms of its ability to counter information threats. Two groups of input indicators were used for this purpose. The first group was formed by 12 indicators of the country’s world development, which were selected from the World Bank database and based on the results of correlation analysis. The second group includes 5 information technology indicators that characterize certain areas of information security: information technology development, digitalization of the country, countries’ commitment to cybersecurity, readiness to counter cyber threats and use the latest information and communication technologies. The country’s information security threat index is used as a starting point. Data from 159 countries of the world for 2018 were taken for the analysis, as for this number of countries and period there is a complete set of data on selected indicators. Country data were considered based on clusters, which allowed the use of 7 groups. The analysis was performed using the analytical tool Frontier Analyst. The study built CRR and BCC models, among which CRR was preferred, which allowed a more critical assessment of the potential of countries. The paper analyzes the structural effectiveness of socio-economic development indicators and information security indicators of countries, considering the current level of the information security threat index. As a result, the following were identified: an increase in government security spending for zero-cluster countries; the need to transform the information technology component for the countries of the first and second clusters; increasing personal protection, strengthening corruption control and legal regulation for third cluster countries; the need for economic growth and higher social standards for the fourth, fifth and sixth clusters. The obtained models allowed us to estimate the maximum level of growth of the information security threat index with the available resource potential of the country. As a result, it was found that the largest increase in the information security threat index is possible due to the existing potential of the countries of the zero and fifth clusters, which will increase the effectiveness of their response to information threats. Keywords: BBC-model, CCR-model, Data Envelopment Analysis, socio-economic development, information, threat, security.


Sign in / Sign up

Export Citation Format

Share Document