The HIPAA Privacy and Security Rules are a manifestation of the provisions of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) for the privacy of patient information. HIPAA empowered the cabinet secretary responsible for the health docket to make necessary rules to effectuate patient privacy (HHS & ORC, 2013). The privacy rules and security rules complement each other towards the attainment of patient privacy. The HIPAA privacy rules define what patient privacy is and to what extent it is to be maintained. On the other hand, the security rules canvass the information technology aspects of the privacy rules and relate to patient information that has been placed in a computerized system . Among the primary reasons for the privacy rules is the protection of human dignity, attainment of the fundamental right to privacy, and finally ensuring candid professional relationship between the doctor and the patient (Rezaeibagha, Win & Susilo, 2015). This research paper evaluates the nature, purpose, and efficacy of the HIPAA Privacy and Security Rules.
Thesis: HIPAA Privacy and Security Rules are not only important for the protection of the rights and dignity of the patient but also fundamental to the personal health of every American as well as the overall public health of the nation.
Delegate your assignment to our experts and they will do the rest.
Why HIPAA Came with a Need for Privacy.
The need for privacy in healthcare generally.
The extra need for privacy that comes with the commercialization of healthcare such as in the insurance industry.
The advanced information security risk that came with computerization (Rezaeibagha, Win & Susilo, 2015).
The Nature of HIPAA Safety and Security Rules
Overview of HIPAA Safety provisions
Overview of HIPAA security rules.
Application of HIPAA Safety and Security Rules.
Challenges Facing HIPAA Safety and Security Rules and recommendations
Challenges facing HIPAA Safety and Security Rules
Adversities created by these challenges (Hall & McGraw, 2014).
Recommendations or mitigation
Conclusion
References
Hall, J. L., & McGraw, D. (2014). For telehealth to succeed, privacy and security risks must be identified and addressed. Health Affairs , 33 (2), 216-221
HHS & OCR. (2013, July 26). Summary of the HIPAA security rule. Retrieved from https://www.hhs.gov/hipaa/for-professionals/security/laws-regulations/index.html
Rezaeibagha, F., Win, K. T., & Susilo, W. (2015). A systematic literature review on security and privacy of electronic health record systems: technical perspectives. Health Information Management Journal , 44 (3), 23-38