Information Security in Healthcare

Information Security in Healthcare

Information Security in Healthcare

Determine why information security is so important in healthcare by analyzing at least two different types of safeguards for data and elaborate on what standards are looked at for each. Also, identify the types of facilities these safeguards can be used in and what are the expectations.  There may be several different standards for each safeguard but you are required to mention at least two.Discussion responses should be on topic, original, and contribute to the quality of the discussion by making frequent informed references to lesson material. Discussion responses should be around 200 words.

Give your personal opinion to Gabriela Berrios and  Dina Alani  . Opinions should be around 100 words with a total of two pages.

Gabriela Berrios 

Two Safeguards for Data

By having a solid security foundation for security management processes, assignment of responsibility, enforcement of workforce security, information access, training, as well as plans and protocol in the event where a breach occurs, the covered entity can be prepared, with a safeguard that will protect them in reducing the impact or preventing breaches altogether.

  1. Physical Safeguard:

Physical Safeguards are the implementation standards to physical access to information systems, equipment and facilities which can be in reference to access to such systems in and out of the actual building. (Chung, 2014).

This safeguard has physical measures, policies, and procedures to protect a covered entity’s electronic information systems and related buildings and equipment, from natural and environmental hazards, and unauthorized intrusion. (Chung, 2014).

It covers facility access to information systems and equipment, workstation use and security, and management of certain media devices that may contain ePHI. (Chung, 2014). It is in place to work with the administrative and technical safeguards so that the covered entity can place specific procedures in place to protect electronic information systems, buildings facilities, and equipment. (Chung, 2014).

  1. Administrative Safeguard:

The administrative safeguards cover over half of the HIPAA Security requirements and are focused on execution of security practices for protecting ePHI. (Chung, 2014).

This safeguard has administrative actions, and policies and procedures, to manage the selection, development, implementation, and maintenance of security measures to protect electronic protected health information and to manage the conduct of the covered entity’s workforce in relation to the protection of that information. (Chung, 2014).

This implements policies that aim to prevent, detect, contain, as well as correct security violations and is the groundwork of the HIPAA Security Rule. (Chung, 2014).



Chung, D. (2014, August 11). The Three Safeguards of the HIPAA Security Rule Summarized. Retrieved from

 Dina Alani 

Information security is essential in health care settings as first of all information leakage of a patient is a legal offense, and secondly, by the leaked information criminals can make use of it by engaging in medical fraud and for other financial gains. When the security of information is maintained the healthcare industry saves money because the cost of a lawsuit from leaked documents, for example, could spell the end for a healthcare entity and securing the information thus saves a considerable amount of money. The safeguards to protect such information are-

1. Administrative safeguards-

It is related to lawmaking body and most importantly protecting these laws and compelling everyone to follow it. It determines the documentation process, roles and responsibilities, training requirements, data maintenance policies and more.

2.Technical and physical safeguards-

Using technology to safeguard the information regarding health care settings comes under technical safeguard that includes cybersecurity where every document is strictly password protected. Apart from preserving this way security systems are available 24 x 7 like video surveillance, door and window locks, and locations of servers and computers.
%d bloggers like this: