HIPAA, CIA, and Safeguards

1633 Words4 Pages

The Health and Human Services (HHS) settled a case with Blue Cross Blue Shield of Tennessee (BCBST) for $1.5 million for violating the Health Insurance Portability and Accountability Act (HIPAA) and security rules. There are security issues with BCBST in regard to confidentiality, integrity, availability, and privacy. There are also security requirement by HIPAA which could have prevent the security issue if it has been enforced. There are correction actions taken by BCBST which were efficient and some may have not been adequate. There are HIPAA security requirements and safeguards organization need to implement to mitigate the security risk in terms of administrative, technical, and physical safeguards.
On 5 October 2009, computer equipment from a network data closet was stolen from BCBST. The items stolen were 57 unencrypted hard drives which contained over 300,000 video recording and over one million audio recordings. According to Whitman & Mattord (2010), confidentiality, integrity, and availability makes up the C.I.A triangle which is the basis of Committee on National Security model for information security, an industrial standard, (Whitman & Mattord, 2010). Confidentiality can be a synonym for encryption but also means only the people with the correct permission can access the information. One of the major security issue is the hard drives were not encrypted. The hard drives should be encrypted to prevent people from reading the information the computer. Software can be purchased which will encrypt files on hard drive with such as Folder Lock, SensiGuard, Secure IT, and more. There are open source encrypting software which are free for use which could have been used. If the hard drives were not needed, the data should hav...

... middle of paper ...

...earn from other companies who have been involved with the breaches on how to protect information. Training employees on HIPAA, policies and procedures would help mitigate risks to unauthorized access to information. Meeting the requirements set by HIPAA will protect the company, the employees, and the people private information within the company computer network.

Works Cited

Easttom, C. (2006). Network defense and countermeasures. (p. 10).
Upper Saddle River, NJ: Pearson Education, Inc.

Grama, A. (2011). Legal issues in information security. (p. 170).
Burlington, MA: Jones & Barlett Learning.

Whitman, M., & Mattord, H. (2010). Management of information security. (3rd ed., p. 6). Boston, MA: Cengage Learning.

Whitman, M., & Mattord, H. (2011). Reading & cases in information security: law & ethics. (2011 custom ed., p. 264). Boston, MA: Cengage Learning.

Open Document