Information security considered as the procedure of protecting information against unauthorized access, disclosure, disruption, modification, use, or destroyed. In other word information security include defending information whatever the form this data may take. Although each organization employ information security to protect its secret data, but security breaches or identity theft may take place, security breach mean illegal access to defined categories of personal information. In other word it mean illegal access to personal information to use, destroy or amend it (Cate, 2008, p.4).
Furthermore, identity theft considered as forgery seeking to use the identifying information of another person without legal authorization or permission. For instance, identity theft may make represent with these crimes: bank fraud, document fraud.
One realistic case include networking security breach and identity theft represent with what happened in Accretive Health in July 211, Accretive Health is known and popular provider of medical billing and revenue management services to hospitals. So the story begin in
…show more content…
The strengths and weaknesses of HIPAA system
It is worth to mention that HIPAA system breached because of some weakness which create a chance to breach it, such weakness according to Blumenthal (2007, p.2) represented with the following:
- The most significant barrier and limitation in successfully publishing an HIPAA algorithm is the urgent and critical need for correct and appropriate exchange of private keys, where these exchange process be done in safe and secure manner. So this transaction usually performed among some type of face to-face meeting, which considered to be not practical in many situations and cases, especially when talking about distance and time into account. And if one expect that security is a risk to start with private key, because of the desire for ideal and safe exchange of data in the first place, so the exchange of keys seems to be