CHAPTER 13 Privacy Confidentiality Security and Integrity of

  • Slides: 13
Download presentation
CHAPTER 13 Privacy, Confidentiality, Security, and Integrity of Electronic Data

CHAPTER 13 Privacy, Confidentiality, Security, and Integrity of Electronic Data

 • Privacy • Person’s desire to limit the disclosure of personal information •

• Privacy • Person’s desire to limit the disclosure of personal information • Confidentiality • The responsibility to limit access to information • Security • Measures implemented to protect information and systems • Integrity • The accuracy and comprehensiveness of data

Using Computer Systems for Storing Data • Threat to any data element • Legal

Using Computer Systems for Storing Data • Threat to any data element • Legal and ethical implications related to storing personal data • Medical identify theft

Privacy and Confidentiality • Personal Privacy and Confidentiality • Center for Democracy and Technology

Privacy and Confidentiality • Personal Privacy and Confidentiality • Center for Democracy and Technology (CDT) • Patient Privacy and Confidentiality • Health Insurance Portability and Accountability Act of 1996 (HIPAA)

Safety and Security • Innocent Mistakes • Inappropriate Access by Insiders for Curiosity Reasons

Safety and Security • Innocent Mistakes • Inappropriate Access by Insiders for Curiosity Reasons • Inappropriate Access by Insiders for Spite or for Profit • The National Enquirer • Unauthorized Intruders Who Gain Access to Patient Data • Vengeful Employees and Outsiders

Computer Crime • Prosecution of Computer Crime • Selected Laws Related to Computing •

Computer Crime • Prosecution of Computer Crime • Selected Laws Related to Computing • Freedom of Information Act of 1970 • Federal Privacy Act of 1974 • U. S. Copyright Law of 1976 • Electronic Communication Privacy Act of 1986 • Computer Security Act of 1987 • U. S. Copyright Law of 1995, Amendment

Computer Crime • National Information Infrastructure Protection Act of 1996 • U. S. Copyright

Computer Crime • National Information Infrastructure Protection Act of 1996 • U. S. Copyright Law of 1997 (No Electronic Theft Act) • Digital Millennium Copyright Act of 1998 • Children’s Online Protection Act of 2000 • USA Patriot Act of 2001 • Homeland Security Act of 2002

Computer Crime • Cyper Security Enhancement Act (CSEA) of 2002 • Controlling the Assault

Computer Crime • Cyper Security Enhancement Act (CSEA) of 2002 • Controlling the Assault of Non-solicited Pornography and Marketing Act of 2003 (CANSPAM ACT) • Computer Fraud and Abuse Act (CFAA) of 1984 • Identify Theft Enforcement and Restitution Act of 2008

Protection of Computer Data and Systems • Develop ongoing educational programs • Restrict access

Protection of Computer Data and Systems • Develop ongoing educational programs • Restrict access to data with passwords • Develop encoding procedures • Use transaction records to document access • Develop biometric methods to identify users

Protection of Computer Data and Systems • Protect systems from natural disasters • Develop

Protection of Computer Data and Systems • Protect systems from natural disasters • Develop backup procedures and redundant systems • Develop and enforce policies for breaches of security • Store only needed data • Dispose of unneeded printouts by shredding • Develop alerts that identify potentially inaccurate data

Managing Data Responsibly • Avoid distractions • Refuse to share a password or sign-in

Managing Data Responsibly • Avoid distractions • Refuse to share a password or sign-in • Attend implementation/orientation classes • Keep information out of view of others • Develop passwords that are not easy to identify • Keep the individual’s own password • Report unusual computer activity • Encourage patients to understand their rights • Keep harmful materials away from computers

Tools for Protecting Your PC • Antivirus Software • Anti-spyware Software • Adware •

Tools for Protecting Your PC • Antivirus Software • Anti-spyware Software • Adware • Cookies • Firewall • Web Browser Security Settings • Password Protection

User Guidelines for Protecting Your PC • Protecting Your Email • Downloading Files •

User Guidelines for Protecting Your PC • Protecting Your Email • Downloading Files • Using the Internet • Protecting Your Computer Hardware and Software • Protecting Your Data • Protecting Your Personal Identify