Free Essay

Hippa Confidentiality

In:

Submitted By beached4evr
Words 1584
Pages 7
HIPAA Confidentiality
Rhonda Hogan
HCR/220
Fonzette Mixon
April 3, 2011

HIV and AIDS affect millions of people worldwide. Some of these people have HIV, only testing positive, whereas others already are diagnosed with AIDS. Still others who have not yet been diagnosed at all may be suffering inside and have no idea he or she is inflicted with this horrible disease. Confidentiality becomes more sensitive when interacting with HIV or AIDS patients. The Health Insurance Portability and Accountability Act (HIPAA) is the law that was enacted “in response to growing concerns about individual’s health information potentially being used inappropriately, causing barriers to health care coverage, and related job mobility impediments” (Biel-Cunningham, 2003). Acquired immunodeficiency syndrome (AIDS) is exactly what it states, an immunodeficiency (HIV) turned syndrome that is acquired. In other words, AIDS is caused by and acquired from HIV. The virus enters the body, via blood, semen, or an infected mother during birth, whereby attaches onto T-cells while working to grow inside. After replicating and destroying the T-cell, the virus moves onto other healthy T-cells until they have been taken over. Once enough T-cells are destroyed, the person’s immune system no longer functions. When acquiring a serious infection, the body’s lack of fight for the infection is because of an extreme low T-cell count, and a diagnosis of AIDS will be determined. As far back as the Hippocratic Oath, physicians have been required to keep knowledge of individual patients a secret. “Personal health information is maintained not only by physicians, but also in the records and/or databases of hospitals and clinics that provide treatment or diagnostic services, laboratories that perform tests, pharmacies, and insurance companies and managed care organizations to which claims are submitted or coverage is made” (AHIMA, 2008). The law mandates that patient’s health information is to be private as well as secure and is known as the Health Information Portability and Accountability Act of 1996. HIPAA consists of four parts: Portability, Transaction, Privacy, and Security. Portability indicates the protection of an individual to obtain health insurance under a pre-existing medical condition. Transaction regulates how information is reported regarding enrollment, eligibility, claims, and payment. Privacy provides standards for protected health information, such as name, address, phone number, medical record and social security numbers, and so forth. Security defines “who has access to PHI and how much of the patient information is accessible” (Biel-Cunningham, 2003). Concerning the health information of some illnesses and sicknesses, sensitivity is not as frequent as with patients diagnosed with HIV or AIDS. Breaching of protected health information, especially HIV or AIDS related, is more than just a blatant disregard for the law but can bring forth unnecessary grief and hardship for the suffering person. Even though there may not be visible signs and symptoms, a person may not want his or her condition revealed. “The need to collect sensitive data on HIV infection and AIDS has drawn attention to the issues of authority and confidentiality in public health” (CDC, n.d.). There must be a balance regarding individuals’ privacy rights in comparison to forewarning of others regarding the potential of HIV exposure. Most states require that AIDS and HIV positive test results be reported; however there are several variances. A person’s identity, the certainty of a positive diagnosis, and penalties imposed for breaches in confidentiality are a few of the state law variances regarding reporting requirements. Whenever a person visits a physician’s office, the receptionist asks the patient to complete or update his or her paperwork. A good deal of the time, people pay very little attention to what the paperwork is for, they just fill it out and usually complain. Providing the most private of personal information requires a high standard of privacy and security once the paperwork is turned in for processing. This includes safeguarding computer screens so no one else can see the PHI. Fax transmissions must contain a confidential communication clause on the cover sheet to comply with HIPAA rules and regulations. Information of individuals suffering from HIV or AIDS is highly sensitive because of all the stigmatism associated with these diseases. Homosexuality and drug-users become the social stigma for anyone with HIV or AIDS. If diagnosed with HIV or AIDS, most of the public will pre-judge. An automatic fixation on the negative side of acquiring this disease is the focus when people discover one’s HIV status. People will wonder if this person does drugs, or is a homosexual, rather than thinking about a botched bag of blood the person received a few years ago from an automobile accident or maybe had unprotected sex after a party with someone already HIV positive. “Disclosure of information has led to discrimination in housing, employment, and insurance as well as to loss friends, family and community support” (CDC, n.d.). These are only some of the hardships and grief brought about from improperly releasing confidential information. “According to an article published in AIDS Care in 2001, fears of breaches in confidentiality resulted in individuals actually not accessing treatment in order to prevent the release of sensitive information” (Biel-Cunningham, 2003). To prevent the release of sensitive information is one of the very reasons HIPAA passed into law. Whether legal or illegal, HIV positive individuals as well as with AIDS suffers from discrimination when their disease is made public. Because these diseases are a sensitive subject, there are social ramifications when PHI is wrongly disclosed. Not only does discrimination creep into play, but people who do not have the disease live in fear that they may “catch” it. Of course, unless spread by blood, semen, or bodily fluid transaction, HIV or AIDS is not contagious, such as the common cold or flu. What was once thought of as friends turn into strangers that have faded away with time. Word of mouth, or gossip, about HIV status or AIDS can ruin a person’s social environment. The legal ramifications can be severe if PHI is improperly disclosed. These legal ramifications include protection from an employer’s discrimination as well as protection from the medical professionals not practicing honesty and integrity. For example, when faxing medical records to a patient’s new health care provider, a mistake happened when the records were faxed to the patient’s employer instead. Of course this is only an example, but depending on who looked at the fax on the employer’s end is anyone’s guess. The patient received several apologies, but the medical employee received a written disciplinary warning as well as the office received training on proper faxing procedures. Receiving a written disciplinary warning may appear to be a slap on the wrist for such a mistake. For some people, a disciplinary warning would be considered a minor offense, but for the patient, his or her world may come crumbling down. Safeguards within medical facilities must follow all HIPAA rules and regulations, no matter how minute. Fines can become quite steep, and if convicted, jail time may be required. Loss of licensure for physicians can occur if offenses are repetitious, which could ultimately close down a facility. HIV and AIDS also affect the employer as well as the patient, and there are many laws passed and implemented to protect both. With the age spread of 25-44 for people infected with HIV, these particular individuals are found in the workplace, so it is important to know the laws that will help protect the patient as well as the employer. For instance, “the Americans with Disabilities Act of 1990 (ADA) prohibits employment discrimination on the basis of disability” (The Body, n.d.). The Occupational Safety and Health Administration (OSHA) saves lives, prevents injuries, and protects American workers’ health by mandating safety precautions for health care workers when interacting with patients who have been diagnosed with HIV or AIDS. The Family Medical Leave Act of 1993 (FMLA) allows eligible employees entitlement to a total of 12 weeks of unpaid leave during any 12-month period to care for an immediate family member, including HIV/AIDS. With so many people in the world inflicted with a positive HIV status or AIDS, the need for confidentiality regarding protected health information is of vital importance. Not only will improper disclosure be a disregard for the law but can inflict additional pain and grief on the already suffering individual. The social ramifications are many, such as exclusion, discrimination, and rejection from family, friends, and co-workers that can bring forth unnecessary grief and hardships. A code of ethics must always be followed when working in the health care field that requires honesty and integrity at all times. Legal ramifications include warnings, terminations, fines, incarceration, and loss of licensure. Put in place to protect the confidentiality of patient information, HIPAA rules and regulations must be followed and enforced on a continual basis, no matter if an individual is suffering from this season’s flu, HIV, or AIDS.

References
AHIMA. (2008). Confidentiality of Medical Records. Retrieved from http://library.ahima.org/xpedio/groups/public/documents/ahima/bok2
Biel-Cunningham, S. (2003). HIPAA: Understanding Your Rights of Insurance Portability and Privacy. The Body: The Complete HIV/AIDS Resource. Retrieved from http://www.thebody.com/content/art32201.html
CD. (n.d.). Issues concerning HIV and AIDS. Retrieved from http://www2a.cdc.gov/phtn/legal-basis/Mod2.pdf
The Body. (n.d.). Basic Facts about HIV and the Law. The Body: the Complete HIV/AIDS Resource. Retrieved from http://www.the body.com/content/art45205.html

Similar Documents

Premium Essay

O Matter

...newspaper ads that deal with confidentiality and the HIPPA rules and regulations that limit doctors from giving patient information to a third party. Doctors are not able to give out patient information without the consent of the patient, in this paper though it will be talking about nurse administrator’s privacy. This document is going to explain the issues in this topic and its impacts that it has on populations it affects the most. Describe the facts that used in an article to support proposed solutions. Describe the ethical and legal issues reported to administrative issue. Explain the managerial responsibilities related to administrative ethical issues, and lastly this document will present information on proposed solutions. Administrative Ethics Paper Patients have the right to privacy especially when giving away their information in order for them to get medical help patient information such as name, number, initials, or hospital numbers are not allowed to be published in written descriptions, photos, etc. Any patient information is only allowed to be given away or talked about to a third party if there is consent from the patient himself. Patient consent must be written and archived with the authors, journal, or both, as dictated by local regulations or laws. Many patients are unaware and misunderstand their legal or ethical rights to medical confidentiality protections, which then leads them to both over- and underestimate confidentiality protections. The possibility...

Words: 1524 - Pages: 7

Premium Essay

Hcs 335 Administrative Paper

...Running Head: PATIENT PRIVACY Patient Privacy By: University of phoenix Patient privacy has been a major concern for patients and medical staff for many years. Patient privacy goes hand in hand with HIPPA and the privacy rule. This protects the privacy of any person of all health information (U.S. Department of Health and Human Services, 2010). Even with this a concern for many, a study conducted by Zogby Internation studies more than 2000 adults to obtain their views on patient privacy. This studied determined that individuals would rather have individual choice and control over personal health information instead of others (Patient Privacy Rights, 2010). In the article written by Profacgillies, the issue is what really constitutes confidential information and access to sensitive data. These issues are very serious for many individuals. These issues affect the entire population that is identifiable. Even though there is no specific population that is affected, I believe that there are individuals who are more concerned about these issues. The population that has many medical records and medical information are more concerned about their confidentiality than others who have less information on their medical records (Profacgillies, 2009). There are legal and ethical responsibilities to keep personal patient information private. When its concerning legal issues, they are different from place to place; they are not the same at every facility...

Words: 1331 - Pages: 6

Premium Essay

Confidentiality, Privileges, Mandated Reporting and Duty to Warn

...CONFIDENTIALITY, PRIVILEGES, MANDATED REPORTING AND DUTY TO WARN Name of Student Institutional affiliation Abstract In this paper, I will be focusing on a brief summary of a therapy video that delves into counseling. Actors in this video are looking at real life cases involving high court ruling on issues such as confidentiality, privilege, reporting and the duty to warn. I will also look at my own findings in statures and laws as far as North Carolina is concerned. Additionally, I will give a summary of each. Finally, I will discuss my reflection and how I can put these into action in my counseling career. The presentation of this video is quite interesting. It gives room for actors to look deeper into real cases and get a deeper grasp in the areas of confidentiality, privilege, reporting and duty to warn. It also gives a more vivid picture of how the above mentioned things, though looking similar, are quite different in a myriad of ways. The very first case to be looked into was of a young boy who was taken to hospital by his foster parents. His conditions were not good at all for he had bruises on his spine and another bruise slightly below his eye. The nurse happened to questioned her about the same. She said it was as a result of being jostled in seat in the car. The nurse kind of didn’t make any note of this observation. Moreover, she happened to fail to call CPS to report the possible...

Words: 1443 - Pages: 6

Premium Essay

Agreement

...INDEPENDENT CONTRACTOR AGREEMENT This Independent Contractor Agreement ("Agreement") is made and effective this 12, September, 2013, by and between ________________________________________ ("Consultant") and IQ Group et. al. LLC, IQ Homes, Larry Morgan ("Company"). Now, therefore, Consultant and Company agree as follows: 1. Engagement. Company hereby engages Consultant, and Consultant accepts engagement, to provide to Company the following services: Engineering, Marketing, Sales, Construction, Planning, Project Managment, Management, Budgeting, Training, and any related areas per agreement 2. Term. Consultant shall provide services to Company pursuant to this Agreement for a term commencing on 12, September, 2013 and ending on 12, September, 2015. 3. Place of Work. Consultant shall render services primarily at Consultant's offices, but will, upon request, provide the services at Company offices or such other places as reasonably requested by Company as appropriate for the performance of particular services. 4. Time. Consultant's daily schedule and hours worked under this Agreement on a given day shall generally be subject to Consultant's discretion, provided that Consultant and Company anticipate that Consultant shall work on average [Expected Time Working] hours per week in the performance of services pursuant to this Agreement. Company relies upon Consultant to devote sufficient time as is reasonably necessary to fulfill the spirit and purpose of this Agreement. 5. Payment....

Words: 1060 - Pages: 5

Premium Essay

Graded Project Ethics 00805000

...EXAMINATION 00805000 Monday ABA MODEL RULES: 5.5 (b) 1.6 (a) NFPA ETHICAL CONSIDERATIONS: 1.7 (a) 1.5 (a) 1.8 (a) Carl violated UPL for failure to identify himself to Jane and Zeke as a paralegal, setting fees and giving legal advice. Carl violated confidentiality by allowing Zeke to sit in on the meeting. Carl and Howe violated confidentiality by allowing Jane and Zeke in Howe’s office where confidential files were in plain view. Carl violated confidentiality by speaking about Jane’s case in the reception area where other clients could hear. Carl violated UPL by giving legal advice. Howe allowed Carl to engage in UPL and did not properly supervise Carl. TUESDAY ABA MODEL RULES: 5.5 (b) 1.2 (d) 3.4 NFPA ETHICAL CONSIDERATIONS: 1.7 1.8 (a) 1.5 (a) 1.3 (a) 1.3 (b) 1.3 (e) 1.2 (C) 1.2 (b) Howe allowed Carl to engage in UPL and did not properly supervise Carl. Carl did not identify himself as a paralegal. Carl gave legal advice by stating for Jane to lower her income so she could obtain more money than Jane is entitled to. Carl answered the phone and discussed in front of Jane another clients case, disclosing confidential information about another client. Carl did not take Jane’s actual monthly expenses, he doubled Jane’s expensed which is fraud. Carl engaged in conduct that affects the dignity of the case by asking unfounded personal questions, not relevant to the case. Carl did not prepare accurate, honest billing records. WEDNESDAY ABA MODEL RULES: 5.5 1.1...

Words: 604 - Pages: 3

Premium Essay

Importance of Data Collection

...Introduction This report will give an overview of the aim behind collecting data, types of data collected, methods used and how the collection of the data supports the department’s practices. It will also give a brief outlook on the importance of legislation in recording, storing and accessing data. Why Organisations Need to Collect Data To satisfy legal requirement: every few months there is some request from the government sector to gather, maintain and reports lots of information back to them on how many people do we have in the organization, working hours, how much our expenses for the whole year, we should keep data stored in case information is needed to defend the company legal actions that could arise at any time To provide documentation in the event of a claim: safety legislation and health required that require that records are kept of accidents , whenever an employee make claims to employment tribunals and the employer need to defend such a case he will demands on the accuracy and comprehensive of personal records To provide the organization with information to make decision: since the computer software is developed the information is more readily available, will aid identify problems and helps in taking decision in relation to promotion and salary increases. Types of data that is collected within the organization and how each supports HR or L&D practices There are 2 types of Data that is collected by HR Functions and below is a description of...

Words: 643 - Pages: 3

Free Essay

Confidence

...This essay will discuss the need for confidentiality and the nurse’s duty to keep information he/she is privy to, confidential. Brown et al (1992) suggest that a duty of confidentiality can be described as information that is disclosed which ought not to be disclosed further except within the relevant limits. Confidentiality is generally defined as the process of the protection of personal information, and is regarded as an integral part of a nurse’s role. The Nursing and Midwifery Council (NMC) are the regulatory body of registered nurses and midwives in the United Kingdom, and clause 5 of the NMC code of professional conduct states that registrants have a duty to protect confidential information (NMC, 2006). Failure to adhere to this clause could result in removal from the register, as confidentiality is something all nurses must respect and be aware of. So what is patient confidentiality and why is it so important? The Department of Health (2003) says “A duty of confidence arises when one person discloses information to another (e.g. patient to clinician) in circumstances where it is reasonable to expect the information will be held in confidence.” Confidential information (in the authors opinion as a healthcare student) includes but is not limited to information pertaining to an individual, e.g. name, contact details, medical details. When in a position of trust and having access to confidential information, it is a good idea to ask yourself ‘what would I regard as confidential...

Words: 324 - Pages: 2

Premium Essay

Security Policy of the Company in the Use of E-Mail.

...but has a high-risk level in the traffic of the information. The security policies of this company, determines that all e-mail must have a formal means of communication within or without of the company. E-mail is more efficient than other media such as voice mail, Fax, or regular Mail. For this reason, people can misunderstand that this is an informal means. However, the information in a e-mail, like a letterhead letter, must have complete integrity, being truthful and maintain a confidential information. As everyone know, the e-mail is not encrypted, thus it is transiting within a public network as unencrypted text, which may cause an information leak when it is intercepted and read by third parties and may cause a violation of confidentiality. It is very important have a more careful with the documents attached to sent email, because the risk of confiability grows up according increasing the information. When someone send an e-mail can commit different types of errors like send a e-mail to wrong person. This wrong can occur when a person type the first three or four letters of the word, and the system automatically recognizes a previously email address used. Another common wrong is when people send email with "reply all" instead of "reply". All employees of the company should take special care in the e-mail they receive, because a unknown addresses can contain malicious scripts or viruses that may violate safety barriers of our company. All e-mails flowing in the network...

Words: 362 - Pages: 2

Premium Essay

Doc, Docx, Pdf, Wps, Rtf, Odt

...attempting to find another source of printing ink | R&D | h) Cost of defining the book size so that a standard- sized box is filled to capacity | Design | QUESTION 2 List the four standards of ethical conduct for management accountants. For each standard, give an example that demonstrates compliance with that standard. There are four standards of ethical conduct for management accountants, and they are as follows: 1) Competence: - the ability of an individual to do a job properly. For example:- * Follow applicable laws, regulations standards. * Maintain professional competence * Prepare complete and clear reports after appropriate analysis * Follow applicable laws, regulation and standards. 2) Confidentiality: - is the non-disclosure of some information except to an authorized person. For example:- * Ensure that subordinates do not disclose confidential information * Do not use confidential information for personal advantages * Do not disclose confidential information unless...

Words: 432 - Pages: 2

Premium Essay

The Expanded C.I.A. Triangle

...information can be items like a social security number or a birth date, while sensitive business information can be either patented designs or even customer contact databases. Keeping information like this secure requires methodologies such as the usage of the three tenants of information or otherwise known as the C.I.A. triad (Kim & Solomon, 2011). The three most important parts that makes up this triad are: “Confidentiality”, “Integrity”, and “Availability”. The expanded version of the C.I.A. triad actually contains seven critical characteristics that further emphasize the important role of keeping sensitive information secure. The following paragraphs will explain the nature and detail of each of these seven characteristics. The first characteristic of ensuring information security is confidentiality. This characteristic defines who or what has authorized access to an entity’s sensitive information. The overall goal of this characteristic is to keep access to this information restricted to only those that need to know. A good example of confidentiality is where a car company’s authorized car design team has access to confidential design schematics on a secure computer server for a particular new car but the car company’s competitor does not. Integrity is the next characteristic whereas its goal is in ensuring that the sensitive information is intact, unmodified, and is free of any alterations or corruption. Sensitive information that is altered can be useless...

Words: 274 - Pages: 2

Free Essay

Ethics in Information Security

...customers to know how confidential information will be treated. Instead of hoping a financial services company will treat their personal data as confidential, consumers will receive an explicit disclosure of how such information will be used by the firm. Weakness: * GLBA notices are confusing and limit the transparency of information practices. GLBA assumes a company will explain a complex set of legal definitions added to numerous exceptions to the law in a way that will allow for an informed choice and in transparent language. There are reservations about a company's desire to do this. Health Insurance Portability and Accountability Act (HIPAA) The Health Insurance Portability and Accountability Act of 1996 protect the confidentiality and security of health care data by establishing and enforcing standards and by standardizing electronic data exchange. Strengths: * Allows patients the legal right to see, copy, and correct their personal medical information. Also it enabled patients with pre-existing conditions to change jobs without worrying that their conditions would not be covered under a new employer's health plan * Prevented employers from accessing and using personal health information to make employment decisions Weaknesses: * Now health care providers, insurance providers, and even the consumers are bombarded by overwhelming amounts of paperwork which consume time and money that could be better spent elsewhere.  Digital Millennium Copyright...

Words: 629 - Pages: 3

Premium Essay

Case Study

...Case Study Andrew Madriaga HCA 400 Healthcare Leadership Professor Hilleary Upon becoming a member of the hospital Board of Directors members must sign a confidentiality agreement form. The members of the board will be bound to this agreement for the time they are part of the board up until they leave the group. In addition board members must return the board of directors manual along with any confidential documents upon the resignation or completion of their term. A breach of any confidential information is to be reported to the board president. If I were in administrator Sparky’s place after I read the leaked reports on the front page paper I would have immediately responded by explaining that the discussions that were ongoing were simply discussions and nothing more. I would further explain that nothing is imminent however the ongoing discussions were appropriate due to the fact that the chief surgeon was retiring. I would essentially be doing damage control to ensure things don’t get bad before any real decisions have been reached. I would change the composition of the Board of Directors and my hospital leadership by first eliminating the tension between the CIO and the DON. I would eliminate the tension by privately clearing the air between the two to further understand the situation that I am dealing with. I would then analyze whether or not the two can cooperate and contribute accordingly to the decisions of the team or if they are just distractions....

Words: 527 - Pages: 3

Premium Essay

M&a Process

...The M&A Sales Process FINA 6222: Mergers and Acquisitions Agenda Auction Process Overview Organization and Preparation First Round Second Round Negotiations and Closing • Stakeholders • Broad vs. Targeted Processes • Valuation and Due Diligence • Marketing Material and Confidentiality Agreement Preparation • First Buyer Contact • Initial Bids and Buyer Selection • Management Presentations and Data Room • Final Bids • Evaluate Bids and Select Winning Bidder • Financing and Approvals Process Map Seller Retains Advisor and Signs Engagement Agreement Advisor Performs Internal Due Diligence Advisor Prepares Marketing Materials Advisor Approaches Prospective Buyers Interested Buyers Sign Confidentiality Agreement Interested Buyers Receive In-Depth information and Submit a Bid Seller and Advisor Choose Participants in Second Round Management Presentations and Buyer Due Diligence Second Bids Submitted Price and Sale Agreement Negotiated Deal is Closed Stakeholders Seller Incentive: Highest Multiple • Private Equity Fund • Large Corporate Entity • Entrepreneur Advisors Incentive: Highest Fee • Investment Bank • Legal Counsel • Auditors and Consultants Buyer Incentive: Lowest Multiple • Private Equity Firm • Large Corporate Entity Auction Process Overview Organization and Preparation First Round Second Round Negotiations and Closing Broad vs. Targeted Processes • Broad Process • • • • • 20/20 rule: generally, 20% of...

Words: 1359 - Pages: 6

Premium Essay

Data Classification Hicca

...[pic] Data Classification Policy Disclaimer of warranty—THE INFORMATION CONTAINED HEREIN IS PROVIDED "AS IS." HAWAII HEALTH INFORMATION CORPORATION (“HHIC”) AND THE WORKGROUP FOR ELECTRONIC DATA INTERCHANGE (“WEDI”) MAKES NO EXPRESS OR IMPLIED WARRANTIES RELATING TO ITS ACCURACY OR COMPLETENESS. WEDI AND HHIC SPECIFICALLY DISCLAIM ALL WARRANTIES, EITHER EXPRESSED OR IMPLIED, INCLUDING BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL HHIC OR THE HIPAA READINESS COLLABORATIVE (“HRC”) BE LIABLE FOR DAMAGES, INCLUDING, BUT NOT LIMITED TO, ACTUAL, SPECIAL, INCIDENTAL, DIRECT, INDIRECT, PUNITIVE, EXEMPLARY OR CONSEQUENTIAL, COSTS OR EXPENSES (INCLUDING ATTORNEY'S FEES WHETHER SUIT IS INSTITUTED OR NOT) ARISING OUT OF THE USE OR INTERPRETATION OF HRC POLICIES OR THE INFORMATION OR MATERIALS CONTAINED HEREIN. This document may be freely redistributed in its entirety provided that this notice is not removed. It may not be sold for profit or used in commercial documents without the written permission of HHIC. While all information in this document is believed to be correct at the time of writing, this document is for educational purposes only and does not purport to provide legal advice. If you require legal advice, you should consult with an attorney. The information provided here is for reference use only and does not constitute the rendering of legal, financial, or other professional advice or recommendations...

Words: 1047 - Pages: 5

Premium Essay

Er Diagram

...Week 3 & 4 Research Paper Rajesh Chilivery Professor: Blake Arnold Week 3 & 4 Paper: Write a research paper/presentation on data security and leakage preventive solutions in the market. List all the regulations that apply to Financial Services, HealthCare industry. Data Security Summary: The major purposes of database security are confidentiality, accessibility, and honesty. The characteristics of these three are distinctive but they are correlated to each other. The information which is available in the database should be secured, must be spared from being assaulted, and to save the data or information which is secured to be done in a strong or effective way. Confidentiality is all about telling or giving the information with security. Secrecy of the information is all that much identified with the mystery. Secrecy in another word can be defined as privacy or confidentiality. Besides this, all the information or data which is stored need to be secured and also should be very easy to access to right persons. Accessibility is all about the accessibility of the information for the approved client at any given point where the customer or client needs it without any disturbance or discomfort to the client and at the same time security should strong enough that third person cannot access without permission. However, the approved client can get the way through to have access the available data. The troubles or problems occurred while accessing the data has its...

Words: 653 - Pages: 3