Challenges Associated with Privacy in Health Care Industry: Implementation of HIPAA and the Security Rules

This paper discusses the challenges associated with privacy in health care in the electronic information age based on the Health Insurance Portability and Accountability Act (HIPAA) and the Security Rules. We examine the storing and transmission of sensitive patient data in the modern health care system and discuss current security practices that health care providers institute to comply with HIPAA Security Rule regulations. Based on our research results, we address current outstanding issues that act as impediments to the successful implementation of security measures and conclude the discussion and offer possible avenues of future research.

[1]  Rajshekhar Sunderraman,et al.  Health Level-7 compliant clinical patient records system , 2004, SAC '04.

[2]  Young B. Choi,et al.  A quantification model using P3P in privacy control for telecommunications service management , 2005, Int. J. Serv. Stand..

[3]  L. Volonino,et al.  Principles and Practice of Information Security , 2003 .

[4]  Eddy Ac A critical analysis of Health and Human Services' proposed health privacy regulations in light of the Health Insurance Privacy and Accountability Act of 1996. , 2000 .

[5]  Ilene V. Goldberg Electronic medical records and patient privacy. , 2000, The health care manager.

[6]  D Essex,et al.  The many layers of workflow automation. , 2000, Healthcare informatics : the business magazine for information and communication systems.

[7]  Stefan Edlund,et al.  The Social Contract Core , 2005, Electron. Commer. Res..

[8]  Rebecca T. Mercuri The HIPAA-potamus in health care data security , 2004, CACM.

[9]  R. Panko Corporate Computer and Network Security , 2003 .

[10]  Mark Hagland Customized automation. Ob/Gyn practices are finding EMR systems designed specifically for them. , 2004, Healthcare informatics : the business magazine for information and communication systems.

[11]  D. Masys Effects of current and future information technologies on the health care workforce. , 2002, Health affairs.

[12]  Raymond R. Panko,et al.  Business Data Networks and Telecommunications , 2008 .

[13]  Krulwich As,et al.  The vulnerability of HIPAA regulations to First and Fourth Amendment attack: an addendum to "Evolving Constitutional Privacy Doctrines Affecting Healthcare Enterprises". , 2001 .