HOW SECURE IS OUR HEALTHCARE DATA?
Discussion Questions:
1. What type of security breaches of medical record are commonly today?
Answer:
We have many types of security breaches, but the most common in are viruses and worms they are viruses that usually appear in the computers or any networks.
Answer:
We have many types of security breaches, but the most common in are viruses and worms they are viruses that usually appear in the computers or any networks.
Answer:
The government has the Health Insurance Portability and Accountability Act (HIPAA), which is an important to protect the privacy of the healthcare and informations or data.
For me, the ARRA has some issues regarding the privacy specially in the health care and data. The security of the data should always be protected all the files inside.
Discussion Questions:
1. How does Google's business model use personal data?
Answer:
For me the main purpose in Google the advertisement of their business.
Answer:
For me the privacy concern in the Google is the personal informations using in the accounts.
Answer:
“Trust is hard to earn, easy to loose, and nearly impossible to win back.”
This statement seems to ring true in the constantly changing world of business. In a time where technology is developing faster than ever before, it is very difficult to regulate information privacy. Consumers have chosen to trust many companies with their private information in exchange for services that are used on a daily basis. Google is in the middle of the debate about information privacy with its internet based services that collect and store enormous amounts of data about its users. Through a detailed privacy policy, a consumer’s ability to choose between internet services and a trustworthy reputation Google has convinced consumers to use their products despite collecting and storing enormous amounts of personal information. To certain degree information gathering can be ethical and very useful; however, Google has stepped over the boundary of ethics because of the amount of information they are gathering through their various products and their loose privacy policy that allows for third party exposure. This behavior is unethical because it does not “most dutifully respect the rights of all affected”
No comments:
Post a Comment