[Solved] 4-2 Short Paper: Fraud and Identity Breaches
Systems, approaches, and/or tools to keep data protected
from an identity breach
Protecting
health information should at all times be given top priority by the care
administrators and management. According to Al-Issa et al. (2019), gaining the
trust of individuals that their sensitive health information is secure and
private is fundamental in achieving the promise of delivering quality
healthcare through digital health information management. As care
administrators, we are tasked with ensuring the safety of the patients’
sensitive health information. In this regard, at Mercy Vale, we have ensured
that our system is built on a secure network and constantly monitor the system through
weekly risk assessments and the annual HIPAA security analysis to ensure that
it is up to date as required by the law. Moreover, we have also implemented
sophisticated data encryption, firewalls, and anti-virus software to protect
PHI when shared or accessed on other devices, such as the doctors personal
computers and smartphones.
The role that firewalls and encryption play in
protecting data
Kruse et al. (2017)
explained that firewalls and encryption are significant in data protection
since they are technical safeguards. They are primarily used to provide access
control limits and only give access to authorized users to an electronic
resource. Care organizations such as Mercy Vale collect, store, and provide
security to PHI, which is very significant in maintaining the patients trust,
the legal requirements for care organizations, and its ethical obligation to the
users.
Click to view the full document!
View Document