ISOL-633
Topic Selection Worksheet
Proposed Topic (Identify the law or regulation that you are proposing to address in your research paper regarding its influence on information security governance.)
Health Insurance Portability and Accountability Act (HIPAA) influence on information security governance
Justification of Selection (In 1-2 paragraphs, justify your selection by explaining the importance of understanding the impact of the selected law or regulation.)
Health records are among the most sensitive pieces of information about everybody. The results of an unauthorized disclosure of health records could be devastating. As the public became aware of the potential negative consequences should this type of information be unsecure, a demand for control of disclosure became evident. As a result, the U.S. Congress addressed this concern as part of a larger initiative called the Health Insurance Portability and Accountability Act of 1996, or HIPAA. Sensitive and confidential records are now defined as Protected Health Information (PHI), and this HIPAA legislation outlines certain information security governance requirements needed to ensure that ePHI is protected.
Information security or, INFOSEC has become an important aspect of everyday life for the information manager. One of the major reasons for this is the pervasiveness of fraud, perpetrated by hackers, identity thieves, and even trusted employees. Information security typically employs three elements with which to formulate policy: confidentiality, integrity, and availability. These same elements are used regarding health information and play a vital role in upholding the tenants of HIPAA. The possibility of sensitive or confidential information being used in inappropriate or even unlawful ways is ever-present and measures must be taken to prevent instances as much as possible. As the backbone of a trusted information resource, information security is responsible for ensuring the security of ePHI and upholding the regulations of the established laws.
Available sources (Identify at least 4 sources that you will be able to use to build your research.)
· Noyes, C. (July,2011). Information Security Policies and Governance to Safeguard Protected Health Information. Retrieved on Nov 1,2019 from https://pdfs.semanticscholar.org/bc4d/9e5ea7ad36655a5b74d2f257ed638240bbc2.pdf
· Chute, C. G., Beck, S. A., Fisk, T. B., & Mohr, D. N. (2010). The enterprise data trust at Mayo Clinic: A semantically integrated warehouse of biomedical data. Journal of the American Medical informatics Association, 17(2), 131-135. Retrieved on Nov 1, 2019 from
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC3000789/pdf/jamia002691.pdf
· Lorence, D. P., & Churchill, R. (2005). Incremental adoption of information security in healthcare organizations: Implications for document management. IEEE Transactions on Information Technology in BioMedicine, 9(2), 169-173. doi: 10.1109/TITB.2005.847137.
· Geffert, B. T. (2004). Incorporating HIPAA security requirements into an enterprise security program. Information Security Journal: A Global Perspective, 13(5), 21-28. Retrieved on Nov 1,2019 from http://dx.doi.org/10.1201/1086/44797.13.5.20041101/84906.4
2
Applied Sciences
Architecture and Design
Biology
Business & Finance
Chemistry
Computer Science
Geography
Geology
Education
Engineering
English
Environmental science
Spanish
Government
History
Human Resource Management
Information Systems
Law
Literature
Mathematics
Nursing
Physics
Political Science
Psychology
Reading
Science
Social Science
Home
Homework Answers
Blog
Archive
Tags
Reviews
Contact
twitterfacebook
Copyright © 2022 SweetStudy.com