Huwebes, Mayo 17, 2012

Chapter 4 - Case Study

HOW SECURE IS OUR HEALTHCARE DATA? 

Discussion Questions:


1. What type of security breaches of medical record are commonly today?

Answer:

                Some types of network security breaches happen simply because someone, somewhere, forgot to do what they should have. One of the most popular cases of this in recent years occurred when a former auto dealership employee disabled 100 cars which had been installed with equipment that makes the cars inoperable if the owner isn’t making their payments. This happened not because he hacked the network but because no one had considered that he might still have login and password information.

2. What measures are being taken by the government and private industry to safeguard EHR's?

Answer:

        Healthcare organizations are entrusted with the most private information of their patients and employees. They have a legal, moral, and ethical duty to protect all clinical and research information by ensuring that security and privacy safeguards are in place. A higher degree of control is necessary to prevent unauthorized access to especially sensitive information. This is particularly true within the context of the electronic health record (EHR).


3. How do you think the implementation of ARRA will affect the privacy of our healthcare and personal data? What breaches do you foresee? How can they be forestalled?

Answer:

       Security breaches have been committed not only by these institutions but also by outside contractors that they hire to achieve their IT objectives. ARRA also requires healthcare institutions to notify individuals who are affected by security breaches, provides for increased fines for noncompliance, and authorizes state attorneys general to prosecute institutions violating HIPAA regulations.

 Discussion Questions:

 

1. How does Google's business model use personal data?

Answer:

       Google is firmly committed to the privacy of our advertisers and users. While Google does add a cookie to a user's computer when he/she clicks on an ad, this cookie expires in 30 days, and Google does not associate a user's search activity with his/her ad click history. Further, Google does not collect or track personally identifying information, and does not reveal individual information to third parties. Users who do not wish to participate in tracking activities can easily disable Google's conversion tracking cookie in their Internet browser's user preferences settings. These users will not be included in your conversion tracking statistics.


2. What do you think are the major privacy concerns raised by Google's business model and applications?

Answer:

       The major privacy concerns raised by Google's business model and applications is there technology was very open to the public and so others can sneak on it


3. Do you think Google has taken adequate measures to protect its user's privacy? Explain your answer.

Answer:

       Yes!!!
      Google justified its actions as a benefit to users, however. “When someone is searching for the word ‘jaguar,’ Google would have a better idea of whether the person was interested in the animal or the car. Or the firm might suggest e-mailing contacts in New York when it learns you are planning a trip there.”   

    “Trust is hard to earn, easy to lose, and nearly impossible to win back.” This statement seems to ring true in the constantly changing world of business. In a time where technology is developing faster than ever before, it is very difficult to regulate information privacy. Consumers have chosen to trust many companies with their private information in exchange for services that are used on a daily basis. Google is in the middle of the debate about information privacy with its internet based services that collect and store enormous amounts of data about its users. Through a detailed privacy policy, a consumer’s ability to choose between internet services and a trustworthy reputation Google has convinced consumers to use their products despite collecting and storing enormous amounts of personal information. To a certain degree information gathering can be ethical and very useful; however, Google has stepped over the boundary of ethics because of the amount of information they are gathering through their various products and their loose privacy policy that allows for third party exposure. This behavior is unethical because it does not “most dutifully respect the rights of all affected”

Walang komento:

Mag-post ng isang Komento