Sunday, April 7, 2019

Security and Privacy Essay Example for Free

Security and silence EssayIntroduction personal identity stealth is becoming very(prenominal) easy due to technological advancements. protect patient knowledge must entangle all efforts from aesculapian facilities, employees, and consumers. Society has the right to be defend from either misuse of personal info. An effective protective program starts with front-end forecloseive safeguards and ends with follow-through that reaches wherever nonsensical information has flowed Identity theft has become a very popular topic for the past go or so, the number of complaints has increased and is costing more than anyone wants to be spending on that issue. The Federal traffic commission estimates that as many as nine million Americans have their individuality stolen each year, resulting in over 50 billion dollars of financial loss (Mercuri, 2006). Very common on Television to visualise news and commercials warning or so identity theft or some bon ton trying to make do thei r services, helping in the fight to veto it. In this paper, there will be discussions on the disadvantages of the look into in privacy dealing with identity theft and on possible action excogitate to prevent the incident.What ar your Reactions?Identity theft is a fraud that occurs when one identity is taken away and use in order to tuck services or something usually of financial nature. Criminal identity theft occurs when a victims name, address, and mostly social security number is used by a different individual other than the actual owner. Oftentimes, the imposter would obtain that information from someone with access to a data bank where personal information is stored it may be a hospital, social security department, company that collects data for the purpose of providing financial services. The information may be sold and used to open accounts, gain access to services fraudulently, which the actual owner, a victim of the theft will be charged for. though many have tried to find ways to prevent and fight that kind of invasion of privacy, it stiff an issue and a very expensive one. Identity theft is the fastest growing crime in United States it affects 13 persons per minute, 799 per hour, or 19,178 per day (Mercuri, 2006).When it comes to personal identity theft, elaborate steps must be taken to repair identity, all creditors and banks must be contacted in order to freeze accounts and limit the traumas. some(prenominal) financial activities that were non approved should be reversed and inquired and any opened accounts closed. New identification card game should be provided, depending on the extent of the situation legal counseling may be necessary. Whichever way it happens, identity theft remains a burden for all non only individuals, but also for companies who scat the burden of screening employees in order to protect their customers from such occurrence. No one would welcome such calamity, not only the loss of privacy, the financial burden, but more so the trauma of not being able to prevent it completely.What are the Disadvantages of the Break in seclusion?The disadvantages of the crush in privacy are for the hospital as intumesce as the victims. Big corporations are kept accountable for all data collected from their clients and are liable for any misuse of that information no matter the use. Personal information are trusted to be used for an individual benefits in the help securing a service it should not be sold or used without consent for others benefits. Once information has been compromised, it is the duty of the corporation which allows the dissolve to occur to remedy the problem. Remediation can be very costly, the company is liable for the break, cause outline is necessary to find the leak and establish preventive measures. Which bear upons retraining personnel and maybe adding more doing the hiring, break down screening process make all(prenominal) one accountable for work involvement. It is a costly p rocess but necessary. It is a federal offense and as an HIPAA violation all perpetrators will be fined, it is a mandate. Victims of identity fraud bear the burden of regaining their identity and find any measure to prevent future occurrence.Such fraud creates a financial burden, all major federal instutions such as social security department, internal revenue services, banks and creditors must be informed of the fraudulent act in the lead identity can be restored. All activities under the victim name must be corroborate and investigated, that will require to work with the fraud departments of all banks where accountswas opened or compromised. It can be very costly not only to restore identity, but also mostly once the damages are discovered it will take a lot of time and money to correct the wrong done. The federal trade commission must be contacted they collect information that is shared with law enforcement agency investigation identity fraud. Consumer Credit reporting agencies must be informed and a credit reports requested to investigate whether the victim history has been compromised.The motor vehicle and passport agency must be contacted as well, in such a case all possible areas must investigated for possible damages. It takes time and resources to correct break in privacy. Medical identity theft may be very difficult to discover, an individual my not have any idea that he or she has been the victim until late and the damages result in a mounts of debts and loss of revenue for providers and insurers. One victim hired an attorney to sort out the damage to her records. She avoided the hospital where the identity thief was treated, because of the inaccuracies in her health record as a result of the medical identity theft (AHIMA, 2008).What are the Possible Actions Plans to prevent the Incident?Preventing any incident requires individuals as well as corporations to be very diligent in safeguarding personal data. It requires a team effort on the part of a ll parties, corporations must be willing to put in mail service the necessary resources in the respect, although the first line of defense rest with the individuals seeking services. Some of the preventive measures include, but not particular(a) to Share personal and health insurance information only with trusted providers. * Monitor the explanation of benefits acquire from insurers and obtaining a summary of all the benefits paid in the patients or guarantors name. * Question free medical services or treatments. Individuals should always question what is being offered and who is paying the cost. If not satisfied with the answers, they should decline the offer. * Protect health insurance information. Individuals should safeguard insurance cards, explanation of benefits, and health plan correspondence in the same way they would safeguard credit cards. * Obtain and maintaining personal health records that include copies of significant health information from each healthcare provide r (OBrien, 2008).Furthermore it is very important that every hospitals or anycorporations having access to individuals personal data, to empower every consumer to be very diligent about personal data. It is necessary educate the public about the threat of identity theft. Increase awareness of the consequences and cake measures. Institute sophisticated security monitoring measures and implement a broadly accepted, executive-supported information security exact for effective security policy and governance (American health Management Association, AHIMA, 2008). HIPAA rules require that a risk abbreviation of any system be conducted that would address administrative, technical and physical safeguards.HIPAA security rule does not point on technology but administration (American Health Management Association, AHIMA, AHIMA, 2008). It requires that any data collected of consumers be protected according to its security rule. Corporations must develop guidelines that protect consumers, bu t also that would minimize employees incidents of mismanagement of data. The process should start from hiring, to training and setting up steps that would raise red flags with any questionable occurrence.ConclusionMedical identity theft is becoming very complex and must involve the effort of all consumers, providers and insurers to battle and prevent occurrences. Consumer involvement is very important and necessary, they must be do aware of the threat to their privacy and educate on ways to prevent any occurrence. The public deserves to be protected from any mismanagement of personal data, it incumbents on every corporation to put in place process that safeguards all data collected. An effective protective program starts with front-end preventive safeguards and ends with follow-through that reaches wherever false information has flowed (American Health Management Association, AHIMA, 2008).ReferencesAmerican Health Management Association, AHIMA. Online, On Message, On Duty Privacy Experts Share Their Challenges. April 2008. Available online in the FORE Library HIM Body of Knowledge at www.ahima.org. American Health Management Association, AHIMA e-HIM Work Group on Regional Health Information Organizations (RHIOs). Using the SSN as a Patient Identifier. Journal of AHIMA 77, no. 3 (Mar. 2006) 56AD. Retrieved from www.ahima.orgMercuri, R. T. (2006, June). Security Watch Scoping identity theft. Communications of the ACM, Retrieved from www.citeseerx.ist.psu.edu OBrien, Jenny. Responding to Identity Theft One Organizations Effort to Turn a Negative Event into a Positive Result. Journal of AHIMA 79, no. 4 (Apr. 2008) 4041. Retrieved from www.ahima.org

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.