Influence of Technology on Confidentiality Response
response discussion: Influence of Technology on Confidentiality
RE: Discussion – Week 4
COLLEAGUES POST: Deborah Best
An incident at the health and human service outpatient practice, involving the loss of protective health information (PHI) on 20 patients with HIV/AIDS was investigation after a patient reported her documents were lost. These documents were lost on March 9, 2009, when an employer commuting to work on a subway left their laptop with the documents of several patients. Under the resolution agreement, the agency agreed to pay a resolution amount and implement a strong CAP that requires: developing and implementing a comprehensive set of written policies and procedures governing: (1) physical removal and transport of PHI; (2) laptop encryption; and (3) USB drive encryption to ensure PHI is protected when removed from the premises (U.S. Department of Health and Human Services, 2012).
While a covered entity can encrypt its end of the email transport, it’s difficult to ensure the security of the email once it leaves the organization’s server, so for a completely encrypted email communication to be achieved, the patient would need to use an email service that supports HIPAA-level encryption (Rodocker, 2015). The Privacy Rule recognizes this, and grants individuals access to ePHI in the format that they wish to receive it, in unencrypted email (Rodocker, 2015). Nowadays, the issue of encryption is becoming less and less of a concern as email services such as Google and Yahoo! are implementing stricter security policies every day. To bridge the gap in information leakage organizations should update their technology systems.
References
Britz, J. J. (nd). Technology as a threat to privacy: Ethical Challenges to the Information Profession. Department of Information Science. Retrieved fromhttp://web.simmons.edu/~ch
Rodocker, B. (2015). The facts about HIPAA and Email/SMS Communication with Patients. Retrieved from https://www.bridgepatientporta
Stair, R.M. (1992). Principles of Information Systems. A Managerial Approach. Boston: Boyd & Fraser. Retrieved from http://web.simmons.edu/~chen/n
U.S. Department of Health and Human Services. (2012). Annual Report to Congress on HIPAA Privacy, Security, and Breach Notification Rule Compliance. Retrieved fromhttps://www.hhs.gov/sites/
Answer preview
I agree with your post Deborah that although technology has helped in improving productivity, it invades people’s privacy through the electronic monitors. At times, the electronic monitors may record confidential information that may end up in the hands of malicious people. Another way technology might influence confidentiality is in the cloud computing activities. Previously, data was retrieved from user data and programs whereby the information was stored on local drives and this prevented program vendors from accessing information and usage statistics. Today, in cloud computing, the data and programs are all in the cloud, and the issue of concern is that it is not clear what authorities can demand access to the information in the cloud. Therefore, such gaps left in cloud computing may put confidential information stored in the cloud at risk with the increased hacking activities…
(200 words)