Friday, December 20, 2019

Breaching the Security of an Internet Patient Portal Essay

NI Topic: Breaching The Security of An Internet Patient Portal Nur-531 May 18, 2013 Introduction Kaiser Permanente is a health system which serves over eight million members in nine states and the District of Columbia. In the 1990’s the KP Northern California region created an Internet Patient Portal known as â€Å"Kaiser Permanente Online† (KP Online)(Wager, 2009). KP Online provides members access to request appointments and prescription refills, obtain health information, and receive medical advice from staff. In August 2000, a breach occurred when an Operations technician applied patches to servers in support of a new KP Online pharmacy refill application. Subsequently, the†¦show more content†¦The member would have the opportunity to give valuable insight to how their group functions will be impacted during the implementation phase. Future Security Breaches Data security is the responsibility of the information system team. Three responsibilities of this team are making sure the data is accurate, protecting the data from unauthorized users, and correcting the data if it is damaged. This includes protecting the system by firewalls, gouging phishing, and protecting data from a hardware or software loss. If Kaiser Permanente did not take steps to quickly resolve the issues within the group and organization they might face a HIPAA violation. HIPAA Violators can be sentenced for up to 10 years in prison and fined up to $250,000 in criminal penalties for failure to comply. In addition, civil penalties can be imposed that include $100 per violation and up to $25,000 per person, per year for each violation (, 2002). Course of Action The Course of Action that the administration should take to ensure that KP Online is secure, is improvising precautionary measures that are in place for the health information technology; which make up the HIT trust framework. This starts with an assessment of risk and is carefully applied through the system. Risk management, informs the organization of possible risks, such as natural disasters and maliciousShow MoreRelatedBreaching The Security Of An Internet Patient Portal Essay892 Words   |  4 PagesBreaching the Security of an Internet Patient Portal Introduction This paper will discuss the security breach of an internet patient portal, the reaction of the administrative leadership of the system breached, root causes of the breach, potential for future security breaches, and what steps the administrative leadership needs to take to improve online security from future security breaches Background Information Kaiser Permante is a large integrated health care system that serves 8 million membersRead MoreBreaching The Security Of An Internet Patient Portal1846 Words   |  8 PagesCase 14: Breaching The Security Of An Internet Patient Portal Case Synopsis Kaiser Permanente is a large health care delivery system that serves over eight million individuals across nine states, and the District of Columbia. In 1990 Kaiser Permanente developed a internet patient portal, KP Online. KP Online enabled members to make appointments, request prescription refills, seek clinical advice, obtain health care information, and interact with patients in forums. In August 2000, Kaiser PermanenteRead MoreThe Health Care System Has Come A Long Way From Pen And Paper1213 Words   |  5 Pagescomputer and keeping files on a floppy dicks and CDs. Now we are able to utilize an electronic computer charting system and a development of electronic health records. EHR is now a standard of handling information as well as storage and sharing of patient medical information that many people use and some people abuse. Electronic health record is defined â€Å" as an electronic version of a patient’s medical history, that is maintained by the provider over time, and may include all of the key administrativeRead MoreHealthcare Reform And Healthcare Information Systems2091 Words   |  9 PagesOfficer (CIO) The HITECH legislation included reassurances to the public of the privacy and security of their protected health information (PHI) through an expanded scope of HIPAA privacy and security rules. The expansion includes a substantial increase in civil monetary penalties for violations stemming from willful neglect to protect PHI. In addition, the new rules require covered entities to notify every patient of a breach or possible breach of their PHI (Nelson, 2010). According to Healthcare ITRead MoreManagement Information Systems22991 Words   |  92 PagesSurvival C) Customer and supplier intimacy D) Improved decision making 2) Journalist Thomas Friedman s description of the world as flat referred to: A) the flattening of economic and cultural advantages of developed countries. B) the use of the Internet and technology for instantaneous communication. C) the reduction in travel times and the ubiquity of global exchange and travel. D) the growth of globalization. 3) The six important business objectives of information technology are: new products

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.