Friday, May 22, 2020

Hipaa Compliance Laws And The Iso 17799 Security Standard...

THE HIPAA COMPLIANCE LAWS AND THE ISO 17799 SECURITY STANDARD Unit VII – Research Paper Margarita Olguin ITC 4390 Columbia Southern University September 14, 2016 THE HIPAA COMPLIANCE LAWS AND THE ISO 17799 SECURITY STANDARD The Health Insurance Portability and Accountability Act came into existence in 1996. It is part of government legislation that was created to safeguard medical information and any health records related to an individual. Government gave providers a deadline, April 14, 2003, for them to become HIPAA compliant, meaning, they had to have a plan in place to keep medical records private. The legislation directives are given by the Department of Health and Human Services (HHS). The directives of the HIPAA compliance law indicate that any covered entities and their business associates must all comply in accordance with this law. In order to be compliant, there are four rules that must be looked at and implemented: HIPAA Compliance Rules 1. Privacy Rule 2. Security Rule 3. Enforcement Rule 4. Breach Notification Rule The HIPAA privacy rule requirements states that the entities and their associates must have administrative, physical and technical safeguards to ensure the security, integrity, and confidentiality of a person’s health information. The HIPAA Security Rule is more complex than rule number one as it entails several parts. There are three safeguards that must be implemented, Technical, Physical and Administrative. TheShow MoreRelatedThe ISO 17799 Framework621 Words   |  3 PagesISO 17799 ISO 17799 is a detailed security standard organized into major areas of business continuity planning, system access control, system development and maintenance, physical and environmental security, compliance, personnel security, security organization, computer and operations management, asset classification, and control and security policy (Violino, 2005). This framework provides a high level of assurance in various areas of business. It is the most obvious for security and coversRead MoreTft2 Cyberlaw, Regulations, and Compliance1320 Words   |  6 PagesRunning Head: Policy Statements 1 Policy Statements Kevin Corey Western Governors University Policy Statements 2 Internationally security techniques and standards, such as ISO 17799, establish guidelines that organizations must implement in order to maintain information security. Information must be protected from those without a readily need to know to perform organizational business functions. Unauthorized access to information can have a detrimental impact on an organizationRead MoreBusiness Information Systems31162 Words   |  125 PagesReference: p. 18 27. Inadequate data management is an example of the ___________ dimension of business problems. a. technical b. organizational c. people d. management Answer: a Difficulty: Medium Reference: p. 18 28. Legal and regulatory compliance is an example of which dimension of business problem? a. Management b. Organizational c. People d. Ethical Answer: c Difficulty: Hard Reference: p. 18 29. Aging hardware and outdated software are examples of which dimension of business problem

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.