CHAPTER 13 Privacy Confidentiality Security and Integrity of
- Slides: 13
CHAPTER 13 Privacy, Confidentiality, Security, and Integrity of Electronic Data
• Privacy • Person’s desire to limit the disclosure of personal information • Confidentiality • The responsibility to limit access to information • Security • Measures implemented to protect information and systems • Integrity • The accuracy and comprehensiveness of data
Using Computer Systems for Storing Data • Threat to any data element • Legal and ethical implications related to storing personal data • Medical identify theft
Privacy and Confidentiality • Personal Privacy and Confidentiality • Center for Democracy and Technology (CDT) • Patient Privacy and Confidentiality • Health Insurance Portability and Accountability Act of 1996 (HIPAA)
Safety and Security • Innocent Mistakes • Inappropriate Access by Insiders for Curiosity Reasons • Inappropriate Access by Insiders for Spite or for Profit • The National Enquirer • Unauthorized Intruders Who Gain Access to Patient Data • Vengeful Employees and Outsiders
Computer Crime • Prosecution of Computer Crime • Selected Laws Related to Computing • Freedom of Information Act of 1970 • Federal Privacy Act of 1974 • U. S. Copyright Law of 1976 • Electronic Communication Privacy Act of 1986 • Computer Security Act of 1987 • U. S. Copyright Law of 1995, Amendment
Computer Crime • National Information Infrastructure Protection Act of 1996 • U. S. Copyright Law of 1997 (No Electronic Theft Act) • Digital Millennium Copyright Act of 1998 • Children’s Online Protection Act of 2000 • USA Patriot Act of 2001 • Homeland Security Act of 2002
Computer Crime • Cyper Security Enhancement Act (CSEA) of 2002 • Controlling the Assault of Non-solicited Pornography and Marketing Act of 2003 (CANSPAM ACT) • Computer Fraud and Abuse Act (CFAA) of 1984 • Identify Theft Enforcement and Restitution Act of 2008
Protection of Computer Data and Systems • Develop ongoing educational programs • Restrict access to data with passwords • Develop encoding procedures • Use transaction records to document access • Develop biometric methods to identify users
Protection of Computer Data and Systems • Protect systems from natural disasters • Develop backup procedures and redundant systems • Develop and enforce policies for breaches of security • Store only needed data • Dispose of unneeded printouts by shredding • Develop alerts that identify potentially inaccurate data
Managing Data Responsibly • Avoid distractions • Refuse to share a password or sign-in • Attend implementation/orientation classes • Keep information out of view of others • Develop passwords that are not easy to identify • Keep the individual’s own password • Report unusual computer activity • Encourage patients to understand their rights • Keep harmful materials away from computers
Tools for Protecting Your PC • Antivirus Software • Anti-spyware Software • Adware • Cookies • Firewall • Web Browser Security Settings • Password Protection
User Guidelines for Protecting Your PC • Protecting Your Email • Downloading Files • Using the Internet • Protecting Your Computer Hardware and Software • Protecting Your Data • Protecting Your Personal Identify
- Confidentiality and privacy controls
- Confidentiality integrity availability
- Privacy awareness and hipaa privacy training cvs
- Chapter 9 privacy security and ethics
- Chapter 9 privacy security and ethics
- Chapter 9 privacy security and ethics
- Contextual integrity definition
- Azure pci dss responsibility matrix
- Hipaa privacy and security awareness training
- Computer security safety ethics and privacy
- Private secuirty
- Database security methods
- Uintegrity
- Explain database security