HIPAA Rules and Current Threats for EHR’s

Contributed by David McDaniel
People have placed a premium on the privacy of their health information for generations. For generations, people have been documenting medical history and incidents. Initially, this documentation was for didactic purposes, dating back to 1600 B.C. in ancient Egypt. With the onset of the Information Age and the explosion of Internet accessibility, electronic health records (EHR) has become the standard method of record keeping. The Health Insurance Portability and Accountability Act, also known as HIPAA, was signed into law 1996. In the years since, multiple refinements have been made to the law. In this paper, the author begins with an overview of both privacy and security as it relates to HIPAA. As the current security environment has seen a spike in medical record trafficking in criminal networks, electronic health record (EHR) systems are becoming increasingly targeted by malicious actors. In part II of this paper, the author provides a survey of current threats targeting the confidentiality, integrity, and availability of electronic health record (EHR) systems and their contained electronic protected health information (ePHI).
This document is in PDF format. To view it click here.

Rate this article: 
No votes yet