Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Howard university hospital security breach

05/12/2021 Client: muhammad11 Deadline: 2 Day

Patient Privacy

Patient Privacy Issues

Name

Class

Date

Professor

Patient Privacy Issues

New technology has brought many benefits to the healthcare industry but it has also resulted in challenges involving keeping patient information private and confidential. As more and more healthcare facilities go digital the threat of the private patient record going public is an alarming problem. Not only do patients risk someone hacking into their private patient file there is also the risk of their information being sold. Patient privacy is no longer as secure as it was in the past with the written record. Keeping a patients record from being accessed requires the healthcare facility to take steps to properly secure this information. Even then this private information is at risk from internal and external sources at the healthcare facility.

One situation where the private information of the patient becomes vulnerable is a case where an employee sold patients private information for illegal gains. An employee at Howard University Hospital named Laurie Napier used her position as a hospital tech to access private hospital records and to sell them to criminals so they could be used for criminal purposes (Shultz, 2012). In this situation the employee was caught selling the private information of patients. This private information includes name, address, birth date, Medicare health numbers, and social security number. This private information can be used by criminals to create fraudulent accounts, open credit cards, and create new identities.

The employee was able to steal the private information of tens of thousands of patients because the patient files were password protected but the information was not encrypted to prevent theft. Not only did patients become vulnerable to fraud, the reputation of the healthcare facility also becomes damaged due to their inability to protect patient records. As a result of the illegal actions of Napier she was charged under the HIPPA law. The Health Insurance Portability and Accountability Act (HIPPA) privacy rule ensures the healthcare facility does not release the private information of the patient without their express permission.

The Privacy Rule is balanced so that it permits the disclosure of health information needed for patient care and other important purposes but also ensure this information is held in confidence (DHS, 2015). The Security Rule defines the necessary security safeguards required to be put into place by the healthcare facility, business associates, and healthcare clearinghouses that share patient’s healthcare information. When Laurie Napier stole the private information of over 34,000 patients she violated the privacy rights of the patients and broke the law. Her violation was criminal but they hospital was also at fault due to their failure to protect private patient information.

Prior to the Napier theft the hospital had a previous situation where another employee downloaded patient files in order to sell them. Under federal law Napier was charged with wrongful disclosure of patients’ individually identifiable health information. Because she yielded less than $5,000 dollars for her crime she received house arrest with three years probation. Napier is responsible for paying a fine of $2,100 dollar fine and will have to complete 100 hours of community service (Narasi, 2012). Before she can go on house arrest Napier must first six months in a halfway house.

Hospitals are considered covered entities under the HIPPA. All covered entities are responsible for taking the necessary steps to protect the patient’s private information. This includes taking steps to block the information from being stolen electronically. While Howard University Hospital placed password protection on patient files it was not sufficient to stop employees from stealing the information and selling it to others. When the first theft occurred by an employee the hospital should have taken immediate steps to rectify the security issues. If the hospital had simply placed encryption software on hospital computers any stolen information would have been unreadable.

While the employee is responsible for her illegal behavior she took advantage of an opportunity to steal information that was not properly protected. If the hospital had the proper protections in place the two breaches would never have occurred. New reporting rules require that the healthcare facility warn the patient, the public, and the media of the breach. Because the healthcare agency is required by law to report these breaches there has been a growing number of cases were the private records of the patient are breached. In November of last years the countries larges data breach in the healthcare industry when thieves stole the private information of five million patients of TRICARE, a military healthcare insurance agency.

According to an HHS database, more than 40 percent of medical data breaches in the past two and a half years involved portable media devices such as laptops or hard drives (Shultz, 2012).In the Napier case and the case earlier in the year a laptop was used in order to obtain the private information. When private information is accessed through a third party device it increases the security risk especially when the private data is not encrypted.

If Howard University Hospital was in full compliance with HIPPA the security breach would have been prevented but the hospital was not in full compliance of the law. HIPPA requires that health care entities, under the Security Rule, apply administrative, physical, and technical safeguards to ensure the private information of the patient is secure. By failing to protect this information the company is vulnerable to private information being lost. When this happens patients have the right to sue the hospital for their failure to protect patient privacy. In response to the two security breaches the administration of the hospital claimed they were taking steps to fix the problem.

Healthcare facilities have an ethical duty to their patients that includes upholding their privacy. When Howard University Hospital failed to take the steps to protect the patients they failed in their ethical duty. If a healthcare organization fails to displays the ethical behavior expected of them it can result in damage to the reputation of the hospital and result in a loss of trust by patients. Healthcare organizations have other ethical duties to the patient but making sure the confidentiality of the patient is upheld is an important one especially in the 21st century. When a patient’s private information is not properly secured it becomes vulnerable to security threats. The Howard University Hospital has a legal and ethical duty to properly secure the patients private information.

In order to prevent security breaches in the healthcare setting the same level of security applied to financial sector should be applied to the healthcare industry. The financial sector has long recognized the need to develop a comprehensive, multi-tiered, security plan that will ensure no avenue is left open for the criminal to breach the private data of the hospital. This begins with conducting an assessment to identify security vulnerabilities and then developing a plan to address the vulnerabilities. In the case of Howard University Hospital the hospital failed to recognize the vulnerability associated with not using encryption software to protect employee files and the vulnerabilities associated with the use of third party devices accessing sensitive hospital data.

The first step is to place encryption software on all hospital data and to add additional layers of security. This would include placing computers servers in a secure location that can only be accessed by personnel with the authority to access the sensitive data. When too many people have access to passwords and computer servers it can create security breaches. Lastly the hospital needs to restrict the use of third party devices to access sensitive hospital data unless the device is assigned by the hospital after it has been properly secured.

The healthcare industry is changing. It is no longer a simple matter to keep track of patient information in patient files that could simply be locked up. With new electronic patient files the healthcare industry has no choice but to enter the 21st Century and make sure that patient information is properly protected. This means restricting access to patient files and putting the proper security measures in place. The Howard University Hospital was negligent when they failed to properly secure patient files especially after the first incident. In order to ensure security breaches like the one committed by Napier do not happen again the hospital needs to be in compliance with HIPPA and establish a more effective security approach to protecting patient information.

References

Narasi, S. (2012). Hospital employee sold 40 patients’ protected health information. Retrieved

January 23, 2015 from http://www.healthcarebusinesstech.com/hospital-employee-sold-40-

patients-protected-health-information/

Shultz, D. (2012). As Patients’ Records Go Digital, Theft And Hacking Problems Grow. Kaiser

New Health. Retrieved January 23, 2015 from http://kaiserhealthnews.org/news/electronic-

health-records-theft-hacking/

U.S. Department of Health & Human Services. (2015). Understanding Health Information

Privacy. Retrieved January 23, 2015 from

http://www.hhs.gov/ocr/privacy/hipaa/understanding

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Top Academic Tutor
Calculation Master
A Grade Exams
Top Quality Assignments
Ideas & Innovations
Best Coursework Help
Writer Writer Name Offer Chat
Top Academic Tutor

ONLINE

Top Academic Tutor

As an experienced writer, I have extensive experience in business writing, report writing, business profile writing, writing business reports and business plans for my clients.

$29 Chat With Writer
Calculation Master

ONLINE

Calculation Master

I am an experienced researcher here with master education. After reading your posting, I feel, you need an expert research writer to complete your project.Thank You

$20 Chat With Writer
A Grade Exams

ONLINE

A Grade Exams

I am a PhD writer with 10 years of experience. I will be delivering high-quality, plagiarism-free work to you in the minimum amount of time. Waiting for your message.

$35 Chat With Writer
Top Quality Assignments

ONLINE

Top Quality Assignments

I have read your project details and I can provide you QUALITY WORK within your given timeline and budget.

$16 Chat With Writer
Ideas & Innovations

ONLINE

Ideas & Innovations

I have written research reports, assignments, thesis, research proposals, and dissertations for different level students and on different subjects.

$25 Chat With Writer
Best Coursework Help

ONLINE

Best Coursework Help

I have done dissertations, thesis, reports related to these topics, and I cover all the CHAPTERS accordingly and provide proper updates on the project.

$48 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Dr nikhil dhurandhar appointment - Disney annual report 2006 - The tale of the eloquent peasant sparknotes - Example Memo Prompt - Communication During Covid - How to write a special occasion speech outline - How to make a beer's law plot in excel - Alloytec coolant temp sensor location - Malcolm in the middle season 1 episode 16 - 1 week cycle menu - Bsac diving medical referees - Platespin migrate step by step - Cdu summer semester units 2021 - Warthog nozzle rebuild kit - Calculate optimal portfolio weights excel - Joe calleja apex steel - Who attacks macbeth and banquo - 11 ikara place peakhurst - Student handouts word search - The boarded window by ambrose bierce - Role of a lawyer - Acting character development worksheet - How do ethics morals and values interrelate - Ucd medicine entry requirements - Tier 3 words examples - Kim Woods only - THE US NAVY AIRCRAFT CARRIER IMPORTANCE - Uniform gradient present worth excel - Economic assignment - Woody allen short story madame bovary - Boroondara hard rubbish collection - Chapter Fifteen - Discussion Board Option #1 - Favorite Work - Density of diesel in kg mm3 - An assembly consists of two mechanical components - Evaluating the twelve tables of early roman law answer key - Kamal fatehl production manager of kennesaw manufacturing - Carlos tarajano heart attack - Discussion - Class matters chapter 1 summary - Proposal Essay - Discussion - How did marketing strategies contribute to the great depression - On the job training plan template - Ansoff matrix advantages and disadvantages - Solid editing tools in autocad - How would you describe mcdonald's business strategy - Country club casino accommodation - W4-2 - Brimington crematorium funerals today - Research - Cell city phone specials - Kwais meaning in english - Ivan franko national university of lviv - Essentials of negotiation lewicki 5th edition pdf - Lewis dot structure for b - Willowbrook school case study - Thermocouple plug color code - Financial markets and institutions test bank chapter 5 - Marketplace live simulation tips quarter 4 - Aub lebanon phone number - Cj hauser fiance - Discussion question, 150 words, APA style,at least two recent reference citations(2019-2020) - Describe each of the activities that comprise strategy evaluation - Primary and secondary sources worksheet - Stores material within the cell - Safety Stock - The lion's bride analysis - Mitosis and meiosis lab 5 answers - A 2.0 mm diameter glass bead is positively charged - Audience benefits and the you view - Monash tone of voice - Lolita nabokov pdf ita - What is sr2 in multiple regression - Misplaced affections discharge for sexual harassment - Assignment order 303 - Celosia twisted hot pink - Anthraquinone contains only carbon hydrogen and oxygen - Hunger games symbolism worksheet - Fifty springs are little room meaning - Answer the Following Quetstions - Advantages and disadvantages of market penetration ansoff matrix - Cpp - What is the original sleeping beauty story - Advantages of radio waves - Hanuman gada found in sri lanka tv9 - Why was ruth upset when walter gave travis the money - American HISTORY ASSIgnment - Case Study - Missed Opportunities - Left sided heart failure concept map - W8 - Responses - You were hired as a consultant to quigley company - Nature of job analysis in hrm - ARR HIST 2 - Dr sue ellen silburn - Respond post to other classmate only need 2 paragraph 2 classmates - Management accounting for decision makers 7th edition - Blue devil 2 airship - Submit a report that discusses the techniques used by malware developers to disguise their code and prevent it from being analyzed. Give suggestions on how these techniques should be classified and ranked in the disaster recovery documentation. - Leaving cert physics experiments - 360 Guided Learning Hours (GLH)-Level 5 Diploma in Education and training