In: Computer Science
You received a call from a patient today whose identity has been stolen. he blames your facility for the breach. You have researched his complaint and do not find any indication that there has been a breach of the patient's data. You decide to call your business associates to see what they find. The coding consultant company admit that they had a security breach several months ago, and patient information was accessed. This patient information included social security numbers. The company had not notified you of their breach as per the business associate agreement.
1a . Identify the privacy and security violations that have occurred.
1b. What privacy and security recommendations will you give the coding company?
1a. There are some privacy and security violations are occurred which are explained below;
1b. Privacy and security recommendation for a coding company;
There is a need to follow the crypto coding standard rule. Along with this follow defence coding documents because it provide guidelines for improving software security through secure coding.As well as perform automated application security testing as part of as a part of the overall application testing process.