[Solved] 4-2 Short Paper: Fraud and Identity Breaches

Systems, approaches, and/or tools to keep data protected from an identity breach

Protecting health information should at all times be given top priority by the care administrators and management. According to Al-Issa et al. (2019), gaining the trust of individuals that their sensitive health information is secure and private is fundamental in achieving the promise of delivering quality healthcare through digital health information management. As care administrators, we are tasked with ensuring the safety of the patients’ sensitive health information. In this regard, at Mercy Vale, we have ensured that our system is built on a secure network and constantly monitor the system through weekly risk assessments and the annual HIPAA security analysis to ensure that it is up to date as required by the law. Moreover, we have also implemented sophisticated data encryption, firewalls, and anti-virus software to protect PHI when shared or accessed on other devices, such as the doctors personal computers and smartphones. 

The role that firewalls and encryption play in protecting data

Kruse et al. (2017) explained that firewalls and encryption are significant in data protection since they are technical safeguards. They are primarily used to provide access control limits and only give access to authorized users to an electronic resource. Care organizations such as Mercy Vale collect, store, and provide security to PHI, which is very significant in maintaining the patients trust, the legal requirements for care organizations, and its ethical obligation to the users. 

Click to view the full document!

View Document