Question

Review the three main statutes that protect our privacy in the healthcare, banking, and credit card...

Review the three main statutes that protect our privacy in the healthcare, banking, and credit card industries. Those being HIPAA, GLBA, and PCI respectively, including a discussion of how the federal and state governments monitor compliance, fines, and other penalties for non-compliance. Find one case for each regulation that illustrates a government case for non-compliance (e.g. U.S. v. CVS) and discuss the merits of the case.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

cybersecurity preparedness in the securities sector. In the healthcare sector, under HIPAA, the Department of Health and Human Services (HHS) has adopted security standards to protect individually identifiable health information, and has, in recent years, launched audits to assess compliance with HIPAA. The healthcare sector was also a focus of the Cybersecurity Act of 2015, which mandated the development of a Health Care Industry Cybersecurity Task Force, a public-private group to develop recommendations on improving sector cybersecurity. The Task Force issued its report in June 2017, identifying six ‘imperatives’ for improving sector cybersecurity, with concrete recommendations for action under each imperative.

At the federal level, numerous agencies impose cybersecurity standards through a variety of regulatory and enforcement mechanisms. For example, the Federal Information Security Management Act (and implementing guidance) establishes cybersecurity standards for federal government agencies and their contractors. Similarly, the Gramm-Leach-Bliley Act (GLBA) and the Health Insurance Portability and Accountability Act (HIPAA) (and implementing regulations and agency guidance) require entities in the financial services and health sectors, respectively, to employ technical, administrative and physical safeguards to protect customer information from unauthorised access or use. Several states have also enacted state parallels to the GLBA and HIPAA requirement. The Federal Risk and Authorization Management Program (FedRAMP) is a government-wide programme that provides a standardised approach to security assessments, authorisation and continuous monitoring for companies providing cloud services to federal civilian agencies.

Beyond regulatory standards, many organisations are subject to voluntary standards or are required by contract to comply with cybersecurity requirements. Of particular note, the payment card industry in the United States establishes its own cybersecurity standards (the Payment Card Industry Data Security Standards (PCI-DSS)) that apply to merchants or vendors that process payment card data. The federal government has also focused substantially in recent years on the establishment of voluntary cybersecurity requirements, particularly for critical infrastructure entities, which are generally entities that provide vital services to a large part of the population. In 2013, President Obama issued Executive Order 13636, ‘Improving Critical Infrastructure Cybersecurity’ to establish a process for the government to create voluntary cybersecurity standards applicable to critical infrastructure entities. Pursuant to this Executive Order, the National Institute of Standards and Technology (NIST) issued a voluntary ‘Cybersecurity Framework’, which provides a risk-based approach to cybersecurity, and references various national and international standards. President Trump’s cybersecurity Executive Order, Executive Order 13800, ‘Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure,’ requires federal agency heads to implement the NIST Cybersecurity Framework, further encouraging broad adoption of the voluntary risk-based standard.

Add a comment
Know the answer?
Add Answer to:
Review the three main statutes that protect our privacy in the healthcare, banking, and credit card...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Area Act Date Description Telecommunications Telecommunications Deregulation and Competition Act of 1996—an update to Communications Act...

    Area Act Date Description Telecommunications Telecommunications Deregulation and Competition Act of 1996—an update to Communications Act of 1934 (47 USC 151 et seq.) 1934 Regulates interstate and foreign telecommunications (amended in 1996 and 2001) Civil legal evidence Federal Rules for Civil Procedure (FRCP) 1938 As updated in 2006, specifies requirements for the storage, protection, and surrender of discoverable electronic data as used in federal civil proceedings Freedom of information Freedom of Information Act (FOIA) 1966 Allows for disclosure of previously...

  • According to Strategic Management 4e by Frank T. Rothaermel. Mini Case 22 UBS: A Pattern of...

    According to Strategic Management 4e by Frank T. Rothaermel. Mini Case 22 UBS: A Pattern of Ethics Scandals (page 524). What is the business situation brief overall description of the business situation - is it a comfortable situation, failure of the product, planning for future, wrapping up a business? UBS WAS FORMED in 1997 when Swiss Bank Corp merged with Union Bank of Switzerland. After acquir ing Paine Webber, a 120-year-old U.S. wealth man agement firm, in 2000, and aggressively...

  • Caterpillar, Inc. Encounters Challenges to Its Ethical Reputation INTRODUCTION Caterpillar, Inc. (CAT) is a global manufacturer...

    Caterpillar, Inc. Encounters Challenges to Its Ethical Reputation INTRODUCTION Caterpillar, Inc. (CAT) is a global manufacturer of construction and mining equipment, machinery, and engines. Best known for its machinery, including its tractors, off-highway trucks, wheel dozers, and backhoe loaders, CAT has more than 500 dealer locations worldwide. In 2014 the company achieved global revenues of more than $55.2 billion. As a result, CAT faces the challenging tasks of managing a complex network of stakeholders. CAT has made a name for...

  • In your judgement, and given only the facts described in this case, should the management of...

    In your judgement, and given only the facts described in this case, should the management of Massey energy Company be held morally responsible for the deaths of the 29 miners? Explain in detail. Suppose that nothing more is learned about the explosion other than what is described in this case. Do you think Don Blankership should be held morally responsible for the deaths of the 29 miners? Explain in detail. Given only the facts described in this case, should the...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT