Chapter 5 Discussion Questions 2. Discuss the impacts of a breach to healthcare information systems, especially the financial and privacy impacts. According to Glandon, Smaltz & Slovensky (2008), protection of the privacy of health information is a major issue faced by all healthcare organizations. Protected health information, privacy and security must be made priority in healthcare. Despite the requirements in the Health Information Technology Act for Economic and Clinical Health (HITECH) Act of 2009 to provide stronger safeguards for patient data, healthcare organizations are still being found with data breaches incidents, which bring cost impact. According to a study by the Ponemon Institute in Traverse City, Michigan, data breaches cost the healthcare system an estimated $6 billion annually (DeGaspari, 2011). The study found that some healthcare organizations have inadequate resources to secure patient records or securing patient data is not their priority. The study also noted that the top three causes of breaches are unintentional employee action, lost or stolen computing devices and third-party snafu. “HIPAA has improved the state of data record security and has enabled better privacy practices” but it is believed that most organizations will not make the investment but instead they will look for ways to just barely meet the requirements (DeGaspari, 2001). 3. What is HIPAA? What are the potential benefits to healthcare organizations to be gained by compliance with HIPAA standards? What are the potential drawbacks? HIPAA stands for Health Insurance Portability and Accountability Act of 1996. HIPAA was enacted on August 21, 1996 to publicize standards for the electronic exchange, privacy and security of health information known as the Administrative Simplifications Provisions (www.hhs.gov/ocr). The U.S. Department of Health and Human Services (HHS) issued the Privacy Rule to implement the requirement of HIPAA. The standards address the use and disclosure of individuals’ health information – called protected health information as well as standards for individuals’ privacy rights to understand and control how their health information is used (p. 1). The rule permits important use of health information and at the same time protecting the privacy of people who are seeking care. Allowing the flow of information will provide and promote high quality healthcare (p. 1). Complying with the HIPAA standards comes with benefits for the healthcare organization. According to Glandon, Smaltz & Slovensky (2008), HIPAA improved quality by enhancing efficiency of electronic transmission through a standardized identifier called the National Provider Identifier (NPI) that uniquely identified the provider and payer source (p. 119). It also reduced paper consumption, increased coordination of insurance benefits and payments. Health care organizations are able to move away with health plan specific reporting and filing requirements and they are able to maintain patient’s personal health information in a secure and confidential manner (Bowers, 2001). One of the drawbacks of the Act for healthcare organizations is cost especially for larger organizations, as they had to hire extra staff, a dedicated privacy officer, to keep up with HIPAA requirements (www.finweb.com). There were costs associated with compliance. The federal mandate came about during the time healthcare organizations were experiencing reimbursement reduction due to the Balanced Budget Act. Healthcare organizations also believed that some elements of the privacy rules impeded their ability to treat patients (Bowers, 2001). 8. What concepts are important to information security policies and procedures? What effect does HIPAA have on healthcare organizations’ policies and procedures? Are there any other laws that may affect them? According to Glandon, Smaltz & Slovensky (2008), there are two essential elements that are important to security policies and procedures to maintain data security, privacy and confidentiality of information. First is protecting against system failures or external catastrophic events such as fires, storms, deliberate sabotage, and other acts of God; where critical information could be lost and second is controlling access to computer files by unauthorized personnel (p. 125-126). HIPAA forced healthcare organizations to review their policies and procedures related to data and information management. Development of comprehensive plans for security and policy revision were necessary. There was a need to review the organization’s confidentiality policy to cover necessary elements such as access rights, release of information, special handling of specific information, availability and integrity of medical information, and approved methods of information (p. 127). According to Ferrell (2001), HIPAA security rules resemble a collection of recommended best practices. If the healthcare organization has already adopted sound security practices, there will be no huge effort necessary to update policies and procedures. Another law that may affect healthcare organizations is the American Recovery and Reinvestment Act of 2009 (ARRA). The Act has provisions that affect health information management including technology adoption incentives and health information privacy. The privacy provision came about due to concerns over the confidentiality and transparency of electronic information. It relates as part of the HIPAA privacy rule to increase the protection of patient information and increase transparency of how information are used. (Rhodes, 2010). Also the requirements set forth by the Health Information Technology Act for Economic and Clinical Health Act of 2009 (HITECH) also may affect healthcare organizations. References Bowers, D. (2001). The health insurance portability and accountability act: is it really all that bad. PMC Journal. 14(4). Retrieved from http://www.ncbi.nlm.nih.gov/pmc/articles/PMC1305898 DeGaspari, J. (2011). Data breaches cost healthcare system billions. Healthcare Informatics. Retrieved from http://www.healthcare-informatics.com/article/databreaches-cost-healthcare-system-billions Feller, T. (2001). Impact of HIPAA security rules on healthcare organizations. SANS Institute InfoSec Reading Room. Retrieved from http://www.sans.org/readingroom/whitepapers/policyissues/impact-hipaa-security-rules-healthcareorganizations4957 Financial Web. (nd). 5 disadvantages of HIPAA. Retrieved from http:// www.finweb.com/insurance/5-disadvantages-of-hipaa.html#axzz2gJ4BZM9u Glandon, G. L., Smaltz, D. H., & Slovensky, D. J. (2008). Austin and Boxerman’s information systems for healthcare management (7th ed.). Chicago, IL: Health Administration Press. Rhodes, H. (2010). HIPAA, too many ARRA privacy provisions amend HIPAA, not create new regulation. Journal of AHIMA 81(1). Retrieved from http://www.library.ahima.org