Question

The practice of least privilege grants users access permission to information based on their duties. Within...

The practice of least privilege grants users access permission to information based on their duties. Within a healthcare facility, differentiate between what information the receptionist and doctor should have based on least privilege. As the security specialist at this facility, what do you think would be the best way to handle instances where one or the other position may need additional information?

0 0
Add a comment Improve this question Transcribed image text
Answer #1

The practice of least privilege granting of permissions based to user access to information is a necessary step to mitigate the high risk of data security breach or violation of individual privacy rights especially in vulnerable sectors like healthcare including insurance and financial services.

Previous self regulation autonomy in the private healthcare and insurance sector failed in monitoring and regulating privacy and data security breaches of patients rights.

Thus, in this context, the US passed a federal law governing such policies and practices called the Health Insurance Portability and Accountability Act (HIPAA). This is one such law which governs the privacy rights of patients and it is mandatory for companies to comply with it or else they can face prosecution and penalties apart from negative publicity and embarrassments. What is essential is that information must be on a 'need-to-know' basis and not otherwise.

A receptionist is a basic or starting level position in an organization having no role or involvement in the medical treatment or case history of a patient and as such must be given very limited online system access or patient file access to check records.

A receptionist can be given access to patients name, contact information, date of last visit/appointment, whether any outstanding payments/bills are pending and details of next appointments in order to schedule or modify/cancel any appointments. Their 'need-to-know' basis is minimal and limited in nature and accordingly such restricted access must be provided.

A receptionist does not need to have access to the doctors examination reports, diagnosis, prescription, medical test reports, etc.

On the other hand, a doctor would require maximum access to study and analyse a patients case history and accordingly requires greater access rights and privileges in the system. A doctor isn't interested in the payment and accounts history of a patient and expects the accounts and receptionist teams to address that while scheduling appointments and tests.

In the event of any unauthorized access it must be reported immediately as a breach and disciplinary action against the violator taken immediately.

As such, the threshold for such breaches must be extremely strong with rare and the security system designed with user-based strong passwords, external firewalls, installation and regular automated updation of anti-virus and anti-tracking software. A system check could be a password requiring bio-metric identification like fingerprint or facial recognition.

In the event of any unauthorized person seeking access permission to any records of any patient stored online or for any offline/hard copy files, they must send a prior email request along with their requirement and the reasons for this access to their head of department. If the head of their department approves this request then the systems administrator can issue access for limited time and restricted to this particular requirement only. This request would be monitored and recorded in written/email so the concerned staff member seeking further permission access would know there are security compulsions and regulation in place which could go against them in case of any misuse of the data. This would be a great systemic check to ensure compliance and regulation while mitigating the risks involved. In turn if the head of a department needs extra access to any data then they should obtain prior permission from the head of the organization in the same procedure for a team member.

This procedural systemic check and balance must be clearly outlined and detailed in a Standing Operating Procedure (SOP) with prior training and awareness to all staff to ensure compliance to the company security policy. This SOP would be created and made by the company's security expert as a single point of contact to streamline monitoring and compliance with minimal security breaches.

Add a comment
Know the answer?
Add Answer to:
The practice of least privilege grants users access permission to information based on their duties. Within...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • CASE 8 Unlocking the Secrets of the Apple iPhone in the Name of access the male...

    CASE 8 Unlocking the Secrets of the Apple iPhone in the Name of access the male San Bernardino suspect's iPhone 5c. Cook stated: Antiterrorism We are challenging the FBI's demands with the deepes respect for American democracy and a love of our country. We believe it would be in the best interest of everyone to step back and consider the implications While we believe the FBI's intentions are good, if would be wrong for the w e nt to force...

  • Title: Partners Health Care Systems (PHS): Transforming Health Care Services Delivery through Information Management According to...

    Title: Partners Health Care Systems (PHS): Transforming Health Care Services Delivery through Information Management According to government sources, U.S. expenditures on health care in 2009 reached nearly $2.4 trillion dollars ($2.7 trillion by the end of 2010).[1] Despite this vaunting national level of expenditure on medical treatment, death rates due to preventable errors in the delivery of health services rose to approximately 98,000 deaths in 2009.[2] To address the dual challenges of cost control and quality improvement, some have argued...

  • Can you Please do analysis and evaluation of the alternatives? please do as soon as possible....

    Can you Please do analysis and evaluation of the alternatives? please do as soon as possible. Thank you. Alternatives/ Recommendations Cost solution: The infrastructure required to host an EMR is expensive, and third-party servers are not always cheap either. Therefore, PHS could eradicate third-party servers that entail an up-front cost, opting instead for a system with monthly fees. If PHS converted current LMR/CPOE systems to a cloud based service with such a monthly fee, small offices will be better able...

  • Can you Please do analysis and evaluation of the alternatives? please do as soon as possible....

    Can you Please do analysis and evaluation of the alternatives? please do as soon as possible. Thank you. Alternatives/ Recommendations Cost solution: The infrastructure required to host an EMR is expensive, and third-party servers are not always cheap either. Therefore, PHS could eradicate third-party servers that entail an up-front cost, opting instead for a system with monthly fees. If PHS converted current LMR/CPOE systems to a cloud based service with such a monthly fee, small offices will be better able...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

  • Ethically, health-care providers should refuse all patients that do not have the ability to pay. refuse...

    Ethically, health-care providers should refuse all patients that do not have the ability to pay. refuse patients when the practice is already oversubscribed. only refuse patients when the provider has announced his or her retirement. refer all low-income patients to a charitable organization instead of providing any health care to these patients. It is never acceptable to withhold information from patients for fear they will refuse treatment. True False Knowledge that, if revealed, would harm not only the client but...

  • THE NEED FOR health information management (HIM) professionals in long-term and post-acute care (LT-ÉAC) settings has...

    THE NEED FOR health information management (HIM) professionals in long-term and post-acute care (LT-ÉAC) settings has grown exponentially in the past decade. With the implementation of setting-specific reimbursement models and quality initiatives, the skill sets that HIM professionals bring to the table are invaluable to any healthcare organization. 'Ihey are a source of expertise in data analysis, documentation, privacy and security, quality, compliance, coding, and information systems. Organizations and HIM professionals from the various LTPAC settings have reached out to...

  • The discussion: 150 -200 words. Auditing We know that computer security audits are important in business....

    The discussion: 150 -200 words. Auditing We know that computer security audits are important in business. However, let’s think about the types of audits that need to be performed and the frequency of these audits. Create a timeline that occurs during the fiscal year of audits that should occur and “who” should conduct the audits? Are they internal individuals, system administrators, internal accountants, external accountants, or others? Let me start you: (my timeline is wrong but you should use some...

  • Based on the information provided in the case study, create an integrated marketing communication (IMC) for...

    Based on the information provided in the case study, create an integrated marketing communication (IMC) for NOBU Hotels. Please include at least 4 promotional mix tools and describe the promotion/activity with sufficient details for each. Traveling in Nobu Style: Converting Restaurant Patrons to Hotel Guests The name “Nobu” is synonymous with an exceptional Japanese dining experience, perfected by chef Nobu Matsuhisa over a more than 30-year career. Matsuhisa, together with actor Robert De Niro and restaurateur Drew Nieporent, opened the...

  • CASE 17: WATSON’S AMBULATORY EHR TRANSITION Major theme: System acquisition Primary care physicians play a key...

    CASE 17: WATSON’S AMBULATORY EHR TRANSITION Major theme: System acquisition Primary care physicians play a key role in the U.S. health care delivery system. These providers integrate internal and external information with their clinical knowledge to determine the patient’s treatment options. An effective ambulatory electronic health record (EHR) is critical to supply physicians with the information they need to provide quality care and maximize their efficiency. This case involves the decision-making process to replace an inadequate EHR system in a...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT