Skip to main content

The Health Insurance Portability and Accountability Act: Confidentiality, Privacy, and Security

  • Chapter
Healthcare Information Management Systems

Part of the book series: Health Informatics Series ((HI))

  • 432 Accesses

Abstract

On average, $180 million could pay for 90,000 intensive care unit days, 225,000 regular inpatient days, or an extraordinary amount of outpatient care. Yet, that is the amount of money that the federal government, on behalf of the Veterans Affairs Healthcare System, may be spending—not on health care—but to settle a healthcare lawsuit. Filed in the fall of 2000, the lawsuit claims that, due to a lack of security, the computer system at any Veterans Affairs Healthcare facility has enabled workers to access personal and medical information about any patient or employee. Although the Veterans Affairs has installed a “software patch,” one can override this and still gain access to the information. Individuals also cite that their personal information is already noted and being used for criminal activity such as opening up credit cards in their names [1].

HIPAA provisions relating to electronic transactions, security, and privacy must be integrated, not only to protect information, but also to deliver quality health care.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 109.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 139.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Hopper ID. Employees sue Veterans Affairs, claiming breach of their privacy. Pittsburgh Post Gazette 2000 November 3. Sect A: 16.

    Google Scholar 

  2. A guide to the HIPAA rules, technology in practice. EC Media Group 2002 January/ February. p. 26.

    Google Scholar 

  3. Moynihan J, McLure M. HIPAA brings new requirements, new opportunities. Healthcare Financial Management 2000 March. p. 53–54.

    Google Scholar 

  4. Weiss SJ. Countdown to HIPAA compliance, managed care interface. Medicon International 2002 April. p. 57.

    Google Scholar 

  5. http://www.3com.com/Securitynet. “Information Security—It’s Up to You.” Accessed August 22, 2002.

    Google Scholar 

  6. Thieleman W. A patient-friendly approach to the record amendment process. J AHIMA 2002 May. p. 44.

    Google Scholar 

  7. Standards for privacy of individually identifiable health information. Department of Health and Human Services, Office of the Secretary; 2000 December 28; 45 CFR 164.530 j(2).

    Google Scholar 

  8. CPRI Toolkit. Computer-Based Patient Record Institute; 1999 February 1. p. 4: 3

    Google Scholar 

  9. CPRI Toolkit. Computer and information usage agreement. Computer-Based Patient Record Institute; 1999. p. 4: 3.

    Google Scholar 

  10. Bushman J, Krupp A. HIPAA implementation: a step-by-step guide. MGMA Legislative Conference, Washington, DC, April 22, 2002.

    Google Scholar 

  11. Hughes G. Practice brief—destruction of patient health information. J AHIMA 2000 April. p. 64A–64B.

    Google Scholar 

  12. http://www.hipaaadvisory.com/actionsecureqa/secure.htm. Accessed August 22, 2002.

    Google Scholar 

  13. Hughes G. Practice brief—notice of information practices. J AHIMA 2001 May. p. 64L.

    Google Scholar 

  14. Hughes G. Practice brief—patient access and amendment to health records. J AHIMA 2001 May. p. 64S–T.

    Google Scholar 

  15. Neville D. Six steps to compliance for small practices. J AHIMA 2001. p. 42.

    Google Scholar 

  16. Naughton-Travers J. Key to developing a regulatory compliance program. Behavioral Health Management 2001 July/August. p. 36.

    Google Scholar 

  17. Standards for privacy of individually identifiable health information. Department of Health and Human Services, Office of the Secretary; 2000 December 28; 45 CFR 160.306(b)(3).

    Google Scholar 

  18. CPRI Toolkit. Harvard Vanguard Policy on the disciplinary process for breach of patient confidentiality. Computer-Based Patient Record Institute; 1999. p. 4–46.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer Science+Business Media New York

About this chapter

Cite this chapter

Kiel, J.M. (2004). The Health Insurance Portability and Accountability Act: Confidentiality, Privacy, and Security. In: Ball, M.J., Weaver, C.A., Kiel, J.M. (eds) Healthcare Information Management Systems. Health Informatics Series. Springer, New York, NY. https://doi.org/10.1007/978-1-4757-4041-7_30

Download citation

  • DOI: https://doi.org/10.1007/978-1-4757-4041-7_30

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4419-2350-9

  • Online ISBN: 978-1-4757-4041-7

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics