Question

In: Computer Science

The Health Insurance Portability and Accountability Act (HIPAA) Security Rule defines the types of protected information...

The Health Insurance Portability and Accountability Act (HIPAA) Security Rule defines the types of protected information and the safeguards that must be in place to ensure appropriate protection of electronic protected health information. For this activity, you will identify protected health information (PHI) that will require protection and identify control types to be placed on the protected HIPPAA data. For your initial post, consider the scenario below. Tom Jones completed his yearly medical checkup, and the doctor found that he had a small growth on his kidney that will require additional testing. Using what you have learned in this week, carefully evaluate the tables below with consideration of the HIPAA governance requirements. Table 1 has common personal information about Tom that you may see on most hospital visit forms.

Table 2 has information about individuals and entities with some type of relationship with Tom. In your initial post, identify from Table 1 all the rows that are considered PHI. Evaluate the information and explain which should be encrypted at storage and which information should be left in clear text. Additionally, identify from Table 2 all the rows you believe HIPAA considers as associates of Tom. Support your statements with evidence from your sources.

Table 1 Tom Jones’ Diagnostics: Liver Issue (Nephropathy) Name Telephone Number Electronic email address Social Security Number Medical Record Number IP address of his computer Toms’ Hobby Toms’ Driver’s license number Table 2 Tom’s circle and relationship Doctor Kidney Specialist Pharmacist Priest Medical Billing Organization Insurance company Children Wife Best Friend Soccer Coach Your initial post should be a minimum of 150 words.

Table 1

Tom Jones’ Diagnostics: Liver Issue (Nephropathy)

Name

Telephone Number

Electronic email address

Social Security Number

Medical Record Number

IP address of his computer

Toms’ Hobby

Toms’ Driver’s license number

Table 2

Tom’s circle and relationship

Doctor

Kidney Specialist

Pharmacist

Priest

Medical Billing Organization

Insurance company

Children

Wife

Best Friend

Soccer Coach

Solutions

Expert Solution

For table 1:

  • As it can be seen in the above information that the data present in the table 1 has personal information related to the patient (i.e Tom Jones). This information is going to remain same for all his visits to doctors.
  • We need to take care of the data from the table that has potential of uniquely identifying a person.
  • From the table we can see that Phone number, email address, IP address, Medical record number (assuming to be unique to everyone),Social security number and driving licence number are unique to everyone.
  • Having information of any one can give the person's details, so we should consider it for encrypting.
  • However name and Hobby can be found similar among various people, so breach of such information wont reveal person's identity.

For table 2:

  • For the information in table 2, the relationships of persons are mentioned.
  • There are many entities which have many to many relationships like doctor, coach , pharmacist. Kidney specialist,best friend, priest, Medical billing organization and Insurance company. This entities have many relationships with persons or patient. For instance a doctor has to dealt with many patient and same goes to priest as well.
  • So this information wont lead to a unique person and hence we don't need to encrypt it.
  • However children and wife are related to one single person only. So Breach to such kind of data could lead to easily identifying the patient or person. As the relationship is one to one i.e many children can have one father and one wife can have one husband. So it is recommended to encrypt these two fields.

From the above it can be concluded that the data points which have potential to uniquely identify an individual's identity needs to be encrypted so that whenever there is data breach, personal identity cannot be revealed.


Related Solutions

This chapter introduces the Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule. It presents the...
This chapter introduces the Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule. It presents the history, purpose, and goals of the rule along with a detailed discussion of how it compares to other laws and standards that protect patient information. Central to this chapter are the who and what that the Privacy Rule addresses, with discussion about covered entities, business associates, and the elements that comprise protected health information. It also introduces the reader to basic HIPAA terminology such...
Describe the components of the Health Insurance Portability & Accountability Act (HIPAA). Discuss the importance of...
Describe the components of the Health Insurance Portability & Accountability Act (HIPAA). Discuss the importance of following HIPAA regulations.
Discuss how the Health Insurance Portability and Accountability Act (HIPAA) affects and impacts the use of...
Discuss how the Health Insurance Portability and Accountability Act (HIPAA) affects and impacts the use of electronic health records (EHRs).
Discuss the Health Insurance Portability and Accountability Act (HIPAA). Include the following: 1. Why was the...
Discuss the Health Insurance Portability and Accountability Act (HIPAA). Include the following: 1. Why was the law implemented. 2. What are the major aspects of HIPAA? 3. What are some examples of HIPAA violation?
9. The Health Insurance Portability and Accountability Act (HIPAA) was passed to Assist other countries that...
9. The Health Insurance Portability and Accountability Act (HIPAA) was passed to Assist other countries that are struggling with health care crises Track and monitor chronic conditions and illnesses Provide universal health care coverage to Americans Ensure that a patient's health care information is kept confidential 10. Which one is an instrumental activity of daily living (IADL)? a) Bathing oneself b) Feeding oneself c) Paying bills d) Using the toilet 11. Which one is not true of social martketing? Social...
Choose two of the following and define and summarize. Health Insurance Portability and Accountability Act (HIPAA)...
Choose two of the following and define and summarize. Health Insurance Portability and Accountability Act (HIPAA) Privacy Security Code Sets National provider Identification (NPI) Current Procedural Terminology (CPT) Healthcare common Procedure Code Sets (HCPCS)
Discuss the importance of confidentiality and Healthcare Insurance Portability and Accountability Act (HIPAA)?
Discuss the importance of confidentiality and Healthcare Insurance Portability and Accountability Act (HIPAA)?
Regulatory requirements such as Health Insurance Portability and Accountability Act (HIPAA) and Payment Card Industry Data...
Regulatory requirements such as Health Insurance Portability and Accountability Act (HIPAA) and Payment Card Industry Data Security Standard require that an organization should conduct a risk analysis if a mobile device is lost or if the data on it are stolen. Discuss the following. How would this affect the business? If an employee's mobile device is lost, how would it affect the employer?
The Health Insurance Portability and Accountability Act of 1996 (HIPAA) mandated national standards for electronic exchange...
The Health Insurance Portability and Accountability Act of 1996 (HIPAA) mandated national standards for electronic exchange of administrative and financial healthcare transactions. Discuss all of the standards adopted. Did these standards improve healthcare reporting? If so, why? If not, why not? Did this Act put more burden on the physicians and their offices that did not relate to the quality of health care to the patient?
Assess the main possible Health Insurance Portability and Accountability Act (HIPAA) violations that your facility risks...
Assess the main possible Health Insurance Portability and Accountability Act (HIPAA) violations that your facility risks by having a third party monitor the integrated database, and recommend at least one (1) method of preventing or addressing each identified violation.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT