Question

A number of federal and state laws have been enacted to protect the privacy of electronic...

A number of federal and state laws have been enacted to protect the privacy of electronic data, including HIPAA, Sarbox, GLBA and the PCI DSS. Do you think these laws are effective in preventing security breaches? Why or why not?

Homework Answers

Answer #1

In my view I don't think that these laws are not effective in preventing security breaches due to the below mentioned reasons:

(i) For the term 'security' there is no permanent solution. With stronger encryption techniques and more secured algorithms the hackers and attackers are also getting updated with newer technologies. So, preventing security breaches permanently is always impossible. This is due to the reason of security and attackers are evolving simultaneously.

(ii) The laws like HIPAA, PCI DSS, etc. can increase the system security but they also affect the companies those handles the data and processes the information. When it comes to preventive approaches in order to stop data security breach, there is always scope for further improvement.

Hope this helps.

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
Why do you think so many safety and health laws have been enacted?
Why do you think so many safety and health laws have been enacted?
Regulation Health care has been subject to many rules, laws and requirements over the years. As...
Regulation Health care has been subject to many rules, laws and requirements over the years. As new requirements are adopted, health care delivery and administration must adapt. Through your readings and experiences, which federal regulations have had the biggest impact on health care and why? Some laws for you to consider in your analysis include: HIPAA, COBRA, OBRA, Health Care Reform, ERISA… Provide your reasons and examples to support your ideas. References please !
Question 61 ​The Electronic Communications Privacy Act (ECPA) of ____, which was enacted before most people...
Question 61 ​The Electronic Communications Privacy Act (ECPA) of ____, which was enacted before most people were using the Internet, does not include rules specifically designed to protect the privacy of persons using websites to conduct transactions. a. ​1996 b. ​1981 c. ​1986 d. ​1991 1 points Question 62 ​The ____ model is the process or processes that a company uses to find new customers, make sales, and deliver the goods or services it sells. a. ​subscription b. ​revenue c....
You are the senior manager of a large health care organization. The senior management team must...
You are the senior manager of a large health care organization. The senior management team must select a HIMS for the organization that will encompass several clinical and administrative departments. You will need to create and deliver a PowerPoint presentation that will persuade your CEO to purchase your chosen HIMS. Your presentation also must describe key aspects of HIMS focusing on the electronic medical record, such as implementation, interoperability, productivity, and support challenges. Instructions: Justify to the CIO the need...
2. Directors of health information services departments, privacy officers, and other HIM professionals may use research...
2. Directors of health information services departments, privacy officers, and other HIM professionals may use research on policies and practices and patients’ access to revise their own departmental policies and procedures. Patients’ access to their health information is protected under law and regulation. Patients access their health information through patient portals and through requests for paper and electronic copies of their health records. However, the laws and regulations protecting this access conflict. Therefore, an HIM researcher conducted a survey study...
privacy on social networking sites Note that the summary does not require including what you liked...
privacy on social networking sites Note that the summary does not require including what you liked or disliked about the paper. Part-3 (4.5 points): We have covered a number of different research methods that can be used for usable privacy and security research. In this part of the assignment, you will pick a research area in usable security and privacy that seems interesting to you (you may use one of the potential ideas listed below or come up with something...
1. Guidelines to protect electronic medical records were developed by this organization in the United States...
1. Guidelines to protect electronic medical records were developed by this organization in the United States Group of answer choices a. Department of Health and Human Services b. Center for Disease Control and Prevention c. World Health Organization d. None of the above HIPAA regulations initially went effect this year Group of answer choices a. 2003 b. 1996 c. 2001 d. 2006 Privacy of medical records is addressed under Group of answer choices a. HIPAA, b. HITECH c. USA Patriot...
cenario The sudden increase in COVID-19 cases worldwide has caused considerable disruption in many countries. However,...
cenario The sudden increase in COVID-19 cases worldwide has caused considerable disruption in many countries. However, a number of countries have started to use an individual tracking approach to try and contain the spread of the virus. A number of countries have developed mobile phone apps that track people and their movements. Tasks After your successful engagement to develop privacy and personal data protection strategies for DAS, you have been engaged by the Department of Health (DoH) to advise on...
An effective Social Media Policy should: Clearly state that employees have no reasonable expectation of privacy...
An effective Social Media Policy should: Clearly state that employees have no reasonable expectation of privacy on company owned electronic assets, including portable devices, and when accessing company systems from remote locations. Clearly state expectations regarding the limits on personal use of email and the internet. Clearly state whether employee electronic usage is monitored. If employee electronic communications are not monitored, it should reserve the right to monitor. Prohibit use of the company image or trademarks without express authorization. Give...
Protecting Patients' Privacy in the Hospital Read the overview below and complete the activities that follow....
Protecting Patients' Privacy in the Hospital Read the overview below and complete the activities that follow. Ann has been a nurse in a Texas hospital for 20 years. "When I started," she says, "we posted the names of patients on the doors to their rooms." Now, as the result of laws passed to protect the privacy of patients and the confidentiality of medical records, Ann and her coworkers must not even admit to unauthorized callers or visitors that a person...