HOW SECURE IS OUR HEALTHCARE DATA?
Discussion Questions:
1. What type of security breaches of medical record are commonly today?
Answer:
Some types of network security breaches happen
simply because someone, somewhere, forgot to do what they should have. One of
the most popular cases of this in recent years occurred when a former auto
dealership employee disabled 100 cars which had been installed with equipment
that makes the cars inoperable if the owner isn’t making their payments. This
happened not because he hacked the network but because no one had considered
that he might still have login and password information.
2. What measures are being taken by the government and private industry to
safeguard EHR's?
Answer:
Healthcare organizations are entrusted with the most private information of
their patients and employees. They have a legal, moral, and ethical duty to
protect all clinical and research information by ensuring that security and
privacy safeguards are in place. A higher degree of control is necessary to prevent
unauthorized access to especially sensitive information. This is particularly
true within the context of the electronic health record (EHR).
3. How do you think the implementation of ARRA
will affect the privacy of our healthcare and personal data? What breaches do
you foresee? How can they be forestalled?
Answer:
Security breaches have been committed not only by these
institutions but also by outside contractors that they hire to achieve
their IT objectives. ARRA also requires healthcare institutions to notify
individuals who are affected by security breaches, provides for increased
fines for noncompliance, and authorizes state attorneys general to
prosecute institutions violating HIPAA regulations.
Discussion Questions:
1. How does Google's business model use personal
data?
Answer:
Google is firmly committed to the privacy of our advertisers and
users. While Google does add a cookie to a user's computer when he/she clicks
on an ad, this cookie expires in 30 days, and Google does not associate a
user's search activity with his/her ad click history. Further, Google does not
collect or track personally identifying information, and does not reveal
individual information to third parties. Users who do not wish to participate
in tracking activities can easily disable Google's conversion tracking cookie
in their Internet browser's user preferences settings. These users will not be
included in your conversion tracking statistics.
2. What do you think are the major privacy
concerns raised by Google's business model and applications?
Answer:
The major privacy concerns raised by Google's business model and
applications is there technology was very open to the public and so others can
sneak on it
3. Do you think Google has taken adequate
measures to protect its user's privacy? Explain your answer.
Answer:
Yes!!!
Google justified its actions as a benefit to users, however. “When
someone is searching for the word ‘jaguar,’ Google would have a better idea of
whether the person was interested in the animal or the car. Or the firm might
suggest e-mailing contacts in New York when it learns you are planning a trip
there.”
“Trust is hard to earn, easy to lose, and nearly impossible to win
back.” This statement seems to ring true in the constantly changing world of
business. In a time where technology is developing faster than ever before, it
is very difficult to regulate information privacy. Consumers have chosen to
trust many companies with their private information in exchange for services
that are used on a daily basis. Google is in the middle of the debate about
information privacy with its internet based services that collect and store
enormous amounts of data about its users. Through a detailed privacy policy, a
consumer’s ability to choose between internet services and a trustworthy
reputation Google has convinced consumers to use their products despite
collecting and storing enormous amounts of personal information. To a certain
degree information gathering can be ethical and very useful; however, Google
has stepped over the boundary of ethics because of the amount of information
they are gathering through their various products and their loose privacy
policy that allows for third party exposure. This behavior is unethical because
it does not “most dutifully respect the rights of all affected”
No comments:
Post a Comment