Monday, April 29, 2019
Database Design and data security breeches Essay - 1
Database Design and info security breeches - strive ExampleThe selective information with de-identified status can be confoundn to the researcher. This is the information that gives details about a particular group off patients but cannot be narrowed to a specific patient. Such information is exempted from the HIPAA regulations since it is in a general format (Wilson, 2010). Such information do not have all hint of that links the information to a particular patient, such as contacts, names, job number, geographical information, formalised documents, account number, e-mail and medical record number.The current rules and regulation governing health information is HIPAA. This stands for health insurance portability and accountability act. The laws were put in place in the year 1996 by the congress. The rules are meant to give the mandate to transfer and link health insurance coverage and reduce heath information poke fun and fraud. It also give rules on the confidentiality and p rotection of health information.Giving gravel to the certified areas has to involve almost consultations first with the senior administrators. Later the researcher is given access using MySQL 5.1 version which can access different databases. The privileges to be accorded to the academic researcher include being allowed to be a member of the data reader so that he or she can access the data easily. The database system should only facilitate the information needed by the researcher. Other information should be kept private. The SQL statement used should be able to sort the data according to the limited privileges. Such statements include GRANT PRIVILEGE_NAME option. Creation of restricted views of the data are to be created using SQL.The statement retrieves the information that can be accessed by any user. The user name specifies the type of information that is being given. For this case, the user can read and modify (Andrews, 2012).The division of health of Utah had their syste m accessed and personal information stolen. This is where a hacker made the figures
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment