Information Technology and Security Essay

Exclusively available on Available only on IvyPanda® Made by Human No AI

Physical security is a complex of tools and methods that are used to guarantee the safety of particular facilities that contain confidential information (Forte & Power, 2007). Technical security is a range of activities that are focused on the safety of modern technologies with a use of such methods and encryption, authentication, and others (Azuwa, 2015). Data redundancy is the availability of confidential information at more than one place at a time (Huang, Chen, Lin, You, & Peng, 2015).

It is imperative to consider the fact that it is quite important in case an emergency happens. However, it should be minimized most of the time because it dramatically increased the risks, and it should be addressed. Overall, physical security is the most important and should be focused on because it is not possible for third parties to try and hack data if they are not able to get access to it in the first place, and it is hard to argue with importance of such measures. Currently, some laws are focused on the privacy of health care information and are regulated by The Office for Civil Rights (U.S. Department of Health & Human Services, 2015).

It needs to be said that they are quite reasonable because there is a possibility that it can be used for a range of criminal activities. It is also paramount to make sure that such information stays confidential because it may cause issues in personal life. However, it needs to be said that current system is in need of improvement because data is not as secure as it should be, and it is evident that numerous issues are present.

Identifiable patient information is a kind of data that can be used to locate an individual (U.S. Department of Health & Human Services, 2015). It should be said that health care institutions are mostly in compliance with the rules. However, some issues are present. Private practices are especially hard to regulate, and this fact should be considered. It is interesting that there may have been numerous instances of information disclosure, and most patients do not know about it. Also, it is imperative that various scientists pay attention to current issues and try to develop tools and methods that would help to resolve such problems (Prada et al., 2011).

It is especially dangerous if criminals are able to access such information because it can be used in various ways. The government makes sure that such instances are limited. However, it needs to be said that it is still possible, and the information is not as confidential as one may expect. New technologies make it easier to protect data, but there numerous complications may occur. Also, attorneys may have access to the information about the patients if they make a request, and there is a severe responsibility for the disclosure (Miller & Schlatter, 2011).

Overall, it is necessary to collect and process such data but the fact that it may lead to some consequences should be addressed. It is especially problematic because the breach of information may cause numerous problems, and the safety of citizens may be in danger. There is a need of for improvement of the system, but the effectiveness of some methods is still being researched, and it may not be an easy task to implement such systems.

References

Azuwa, M. (2015). Technical security metrics model in compliance with ISO/IEC 27001 standard. International Journal of Cyber-security and Digital Forensics, 1(4), 280-288.

Forte, D., & Power, R. (2007). Physical security – overlook it at your own peril. Computer Fraud & Security, 7(8), 16-20.

Huang, Z., Chen, J., Lin, Y., You, P., & Peng, Y. (2015). Minimizing data redundancy for high reliable cloud storage systems. Computer Networks, 81(1), 164-177.

Miller, R. B., & Schlatter, T. (2011). Can this health information be disclosed? Navigating the intricacies of HIPAA in claims litigation. The Brief, 40(3), 32-39.

Prada, S., Gonzalez-Martinez, C., Borton, J., Fernandes-Huessy, J., Holden, C., Hair, E. Mulcahy, A. (2011). Avoiding disclosure of Individually Identifiable Health Information: a literature review. SAGE Open, 1(3), 1-16.

U.S. Department of Health & Human Services. (2015). Health information privacy. Web.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2021, April 21). Information Technology and Security. https://ivypanda.com/essays/information-technology-and-security/

Work Cited

"Information Technology and Security." IvyPanda, 21 Apr. 2021, ivypanda.com/essays/information-technology-and-security/.

References

IvyPanda. (2021) 'Information Technology and Security'. 21 April.

References

IvyPanda. 2021. "Information Technology and Security." April 21, 2021. https://ivypanda.com/essays/information-technology-and-security/.

1. IvyPanda. "Information Technology and Security." April 21, 2021. https://ivypanda.com/essays/information-technology-and-security/.


Bibliography


IvyPanda. "Information Technology and Security." April 21, 2021. https://ivypanda.com/essays/information-technology-and-security/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
Privacy Settings

IvyPanda uses cookies and similar technologies to enhance your experience, enabling functionalities such as:

  • Basic site functions
  • Ensuring secure, safe transactions
  • Secure account login
  • Remembering account, browser, and regional preferences
  • Remembering privacy and security settings
  • Analyzing site traffic and usage
  • Personalized search, content, and recommendations
  • Displaying relevant, targeted ads on and off IvyPanda

Please refer to IvyPanda's Cookies Policy and Privacy Policy for detailed information.

Required Cookies & Technologies
Always active

Certain technologies we use are essential for critical functions such as security and site integrity, account authentication, security and privacy preferences, internal site usage and maintenance data, and ensuring the site operates correctly for browsing and transactions.

Site Customization

Cookies and similar technologies are used to enhance your experience by:

  • Remembering general and regional preferences
  • Personalizing content, search, recommendations, and offers

Some functions, such as personalized recommendations, account preferences, or localization, may not work correctly without these technologies. For more details, please refer to IvyPanda's Cookies Policy.

Personalized Advertising

To enable personalized advertising (such as interest-based ads), we may share your data with our marketing and advertising partners using cookies and other technologies. These partners may have their own information collected about you. Turning off the personalized advertising setting won't stop you from seeing IvyPanda ads, but it may make the ads you see less relevant or more repetitive.

Personalized advertising may be considered a "sale" or "sharing" of the information under California and other state privacy laws, and you may have the right to opt out. Turning off personalized advertising allows you to exercise your right to opt out. Learn more in IvyPanda's Cookies Policy and Privacy Policy.

1 / 1