HIPAA Database
Thesis statement:
HIPAA Database is an important Database used by all health care participants who carries their transactions electronically. The database helps in securing sensitive medical information and enables quick access to health information.
Introduction:
Outline:
l HIPAA stands for Health Insurance Portability and Renewability Act
l The Act was enacted by the American Congress and signed into law by the then President of the United States President Bill Clinton in 1996.
l The major objectives of the Act are broadly categorized into two titles:
a. Health care access, Portability and Accountability
b. Prevention of health care fraud and abuse
In order to prevent fraud and abuse, HIPAA outlines privacy and security standards to be followed in storing health information
Aspect of HIPAA Database
l The database should be able to protect the health information stored.
l Privacy of information of different patients is paramount.
l The database should guarantee confidentiality, integrity and easy access of information stored within the database.
How HIPAA Database works
l Health care providers that carry their services through electronic means should comply with HIPPAA database regulations.
l Every entity must monitor and report all events and access to the database.
l All actions of such entities are audited regularly through periodic audits.
Security and privacy of health related data
l HIPAA privacy rules outline the privacy and security measures to be followed when accessing sensitive health information.
l The rules gives federal protection to patient’s health information making the patients has an array of rights to their own information.
l The rules also give conditions on when a patient’s information can be accessed by others for important purposes.
HIPAA Database: Compliant with Cloud Technology
l HIPAA Database have encountered multiple security breaches in either loss or theft of information
l The breaches has mostly being due to loss or stolen electronic or storage devices
l This calls for implementation of IT systems that provides secure sharing of information without necessary storing it in any storage device.
l HIPAA database should also use cloud to minimize risks. This will help in the following ways:
a. PHI user are not transporting unencrypted data
b. The cloud encrypts all data when on transit
c. Costs of audits, certifications and assessments are born by the cloud providers.
Conclusion
Annotated Bibliography ( 10 references )
Research Paper Instructions:
Length 4-5 pages ( 1000-1250 words ) excluding cover page, illustrations, and references
Margins 1.5” top, 1″ left, right, and bottom
Spacing Double-spaced for normal text, single- spaced for long quotes
Font Size 10 – 12 point
Font Styles Times New Roman or Courier
Writing Styles APA
Research paper MUST make use of all 10 references listed in your annotated bibliography.
Illustrations Welcome if of good quality
Cover Sheet Should include topic, course ID, student name, and date