HIPAA

Security Basics (Part Fourteen) HIPAA Security Rules

Posted by Thomas Davon on

The Health Insurance Portability and Accountability Act (HIPAA) has three major rules; the Privacy Rules, the Security Rule and the Breach Notification Rules. Each of these rules covers a specific area of health information. The aim of the Health Insurance Portability and Accountability Act (HIPAA) Security Rules is to protect the confidentiality, integrity and availability of electronic Protected Health Information (ePHI). To this end the HIPAA Security Rules specifies safeguards that must be implemented by health care providers who are Covered Entities (CE) and their Business Associates (BA) in order to protect the confidentiality, integrity, and availability of electronic Protected...

Read more →


Security Basics (Part Thirteen) Enforcement Of the HIPAA Privacy, Security and Breach Notification Rules

Posted by Thomas Davon on

When laws are made, they are meant to be implemented and enforced to ensure compliance with the laws by all those who should. If laws are not implemented and enforced after they are made, then there was no need making the laws. There will always be people who would deliberately or ignorantly contravene set laws. This is why there must be an agency saddled with the responsibilities of enforcing the laws to ensure compliance by those concerned. The enforcement of the Health Insurance Portability and Accountability Act (HIPAA) Privacy, Security and Breach Notification Rules is the sole responsibility of the...

Read more →


Security Basics (Part Twelve) Confidentiality as Key Principle of Information Security

Posted by Thomas Davon on

A core focus of information security is protecting the confidentiality of information. By confidentiality it means that the information must not be exposed or disclosed to unauthorized persons. Information is said to be confidential when it is only accessed or known by authorized persons or systems. Yes, systems without authorization cannot be granted access to information. The confidentiality security plan ensures that no unauthorized persons or systems are given access to the information. It will be a breach of confidentiality once information is shared or used by unauthorized persons or computer systems. This is also a violation of the information...

Read more →


Security Basics (Part Eleven) INTEGRITY AND INFORMATION SECURITY

Posted by Thomas Davon on

One of the core goals of information security is to protect the integrity of information. This is very important because when the integrity of information is compromised, it puts the information at risk and the persons or assets concerned as well. The integrity of information asset is in its wholeness, completeness, and uncorrupted nature. When information is exposed in such a way that it becomes corrupt, that information’s integrity has been compromised and is no longer authentic. Information can be corrupted during storage or transmission. This is one of the problems of the electronic information system. Computer systems and gadgets...

Read more →


Security Basics (Part Ten) INFORMATION SECURITY PROJECT TEAM

Posted by Thomas Davon on

Information security is one thing that cannot be done by a single individual successfully, it involve a team work. A team that understands the goal of the organization as it concerns information security, the national and state information security laws and what needs to be done to ensure that information is well protected. Information security is a process and a continuous one. It should be taken as a project with the project team comprising of a number of individuals who have enough experiences in one or many facets of the needed technical and nontechnical areas. Sometimes some of the skills...

Read more →