The Purpose of Patient Breach Notifications Discussion
Activity 3: Cyber Breach Activity (100 points)
This activity is comprised of two parts. (100 points) (A two-page response is required for the combination of Parts A and B.)
You work in a healthcare technology company that provides software technology to 100 hospitals throughout the United States. As a result, your software stores patient data for about 10 million patients across all of your customers. To better protect data, you’re working on a project to deploy encryption technology across all locations so that all customer data is encrypted.
The data is segmented and stored in the following ways:
- Five million patient data records in Location A
- Two million patient data records in Location B
- Three million patient data records in Locations C
The encryption project is about 30 percent complete, with Location C being the first to achieve full encryption. Data in this location, even if breached, can’t be viewed or understood by unauthorized individuals. Today, you learned that a breach happened on your network, and hackers were able to gain access to all three locations.
Part A: Discuss the purpose of patient breach notifications and whether patient breach notification is required in this case. If so, how many notifications need to go out, and within what timeframe should they be sent? (50 points)
Resources:
- Page 169 of your textbook
- US Department of Health and Human Services – Health Information Privacy
- US Department of Health and Human Services – Breach Notification
Part B: Select one of the latest breaches reported to HHS in the following link, and draft a breach notification letter to send to those affected. (50 points)
https://ocrportal.hhs.gov/ocr/breach/breach_report.jsf
Activity 1: Classification Activity (100 points)This activity is comprised of two parts. (100 points) (A two-page response is required for the combination of Parts A and B.)Cybersecurity starts with understanding what assets are essential to
protect. Healthcare organizations should have a classification system
based on the value of the information. It’s important to note that this
type of data classification differs from that of computer programming,
which is also called classification, but relates more to labeling the
data to differentiate it into classes and sets. In cybersecurity, data
classification is required to apply a value relative to how sensitive
and critical the information is, as defined by the organization. This
value will determine what level of information protection controls will
be applied to information collected, maintained, retained, used, and
disposed of when no longer needed.Perform data classification analysis on the below list of healthcare
data points and determine how each should be classified. Explain your
thought process and reasoning for each decision. Use the categories of Confidential, Internal Company Use Only, or Open to Public.Part A: Define and describe each of the three categories in your own
terms. Research information security data classification systems and
definitions online. (25 points)Part B: Label each of the data points below the appropriate category and explain your reasoning. (75 points)Patient name, address, and social security numberA hospital blog website with patient health tipsPatient medical history such as medicine and allergy listsPatient laboratory test resultsDoctor name, address, and employee ID numberPatient radiology images (X-ray, MRIs, and so on) and clinical photographs (endoscopy, laparoscopy, and so on)A newsletter for all hospital staffNurse shift schedule for the monthA page on the hospital website that describes how patient data is protectedPrescribed and administered medications for patientsA summary report of a new clinical trial, soon to be published in the public news