“Securing Health Care Information Systems” Please respond to the following:

  • From the e-Activity, give your opinion as to whether or not the new procedures that the hospital implemented efficiently resolve the issues in this case. Next, suggest an additional procedure that the hospital could utilize in order to secure patient privacy regarding medical condition and treatment plan. Justify your response.
  • Identify the key threats (e.g., internal, external, intentional, and unintentional, etc.) to the security of health care information. Select the single most significant threat, and suggest one (1) way to minimize the threat that you have chosen. Provide a rationale to support your suggestion.


Following HIPPA laws can be very simple yet complex. You can’t release any private information or give information to the families in an emergency situation. At my last practice there was many occasions that a family member called and we could not release any medical information, unless a HIPPA formed was signed. It also had to have the specific person’s name on the list to release the information. The hospital put into place procedures that would protect the privacy of the patient. I do believe that these measure should have already been in place, but they do help maintain HIPPA and its measures. The challenge that many health professionals encounter is trying to get a hold of a patient if a specimen or pathology comes back with questionable results. If the patient needs to see a specialist rather quickly, then the medical staff has to try their best to convey that without violating HIPPA. It can be frustrating and difficult at times. Internal threats to privacy and computer information are employees and other staff that have access to it. You have to entrust your staff to keep it private and safe. External threats are hackers and other individuals or companies that want to gain access to medical information. They can do harmful things to an individual or a company should they gain this access. Intentional can come from external or internal sources. These are the individuals that want to obtain the information for harmful purposes. Unintentional threats are when an employee accidentally leaves a computer screen on and another patient is able to look at it. This can also be when two employees are speaking with each other and a unintended party overhears the medical information. The single most threat to an organization that stores medical information are external individuals. These are the hackers that are attempting to do harm. The best way to combat this challenge is to always make sure the computers utilize firewalls, passwords and encryption to help prevent any obtaining of information. At a health care facility level always hide passwords and only allow those who need it to gain access to certain information. 

Health Information Privacy, (2017), “Hospital Implements New Minimum Necessary Policies for Telephone Messages”, Retrieved from https://www.hhs.gov/hipaa/for-professionals/compliance-enforcement/examples/all-cases/index.html#case19

Show more

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
The price is based on these factors:
Academic level
Number of pages
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more

Order your essay today and save 10% with the coupon code: best10