A tech company contracts Luminia, a healthcare information firm, to design an employee wellness program. The President of Luminia recommends that the company implement a secure messaging platform to protect employee’s private health information (PHI). The company’s vice president, however, thinks that the platform is too expensive and that the extra protection is unnecessary.
Three years ago, Dave started his own healthcare information firm, Luminia. The firm has recently received a contract from Samson Solutions, a large tech company that wants to curb its healthcare costs by starting a workplace wellness program. Employees are given the option of participating in the program, and those who do participate will receive a discount on their insurance premiums in exchange for granting Luminia access to their private health information (PHI). Luminia will use this data to develop an app that will predict employees’ health needs and recommend treatment. For example, an employee determined to be at risk for diabetes might get a personalized message through the app suggesting that they visit a doctor or join a weight-loss program.
Every month, Dave meets with Lisa, Samson’s Senior Vice President in charge of human resources, to review Luminia’s progress in designing the application. In one meeting, they begin discussing the security protections that will be built into the application. They agree that employees’ PHI will be stored on a cloud server that meets Health Insurance Portability and Accountability Act (HIPAA) standards for health data encryption. Since many of the employees will be accessing messages from the application on their mobile devices, such as laptops or smart phones, Dave also recommends that they implement a highly-reviewed secure messaging platform. The platform will ensure that PHI remains encrypted while it is in transit between the cloud server and mobile devices, and once it is stored on user’s laptops and smartphones. This way, if one of Samson’s employees has their phone or laptop stolen, the thief will be unable to access employees’ PHI.
Lisa, however, thinks that the secure messaging platform is too expensive. Designing the application has already cost the company more than was anticipated and she is reluctant to make any additional expenditures. “Plus,” she states, “the cloud server already meets HIPAA standards for data encryption, so this would just be unnecessary.”
Dave tells her that he thinks that not purchasing the secure messaging platform is a mistake. It will leave employees’ sensitive health data extremely vulnerable. “Lost and stolen devices have been major causes for data breaches and PHI exposure,” he explains. “Without further encryptions, someone could potentially gain access to information containing employees’ names, Social Security numbers, addresses, and medical conditions.” Lisa refuses to listen to his argument, and will not authorize the extra protection.
Appleby, Julie. “Advocates Urge Protection of Employee Health Data.” CNN. http://www.cnn.com/2015/09/29/health/protecting-employee-health-dataexclusive/index.html.
“HIPAA Encryption Requirements.” HIPAA Journal. http://www.hipaajournal.com/hipaa-encryption-requirements/.
“Patients Warned of PHI Exposure After Premier Healthcare Laptop Theft.” HIPAA Journal. http://www.hipaajournal.com/patients-warned-of-phi-exposure-after-premier-healthcarelaptop-theft-3347/
Jason Ludwig, MS, and Dalton George, MS, are graduates of the Drexel University Center for Science, Technology and Society. June 2017.
Certain research areas are controversial insofar as they raise special ethical concern; one such area is that of research for military or defense purposes – with an offensive or defensive military or security goal. In addition, ethical issues arise for research that may be practiced or ...
Many options have been explored for alleviating global warming, including replacement of fossil fuels by renewable energy sources and/or nuclear power, and removal of carbon dioxide and/or direct intervention in climate (geoengineering). When limited to the context of climate change, ...
The Greek philosopher Aristotle used the word “energy” to indicate the ability to act to reach a goal, whereas the modern view of energy indicates the capability to undertake work. In science and engineering disciplines today, energy has precise technical meanings. Today also, ...
Climate in a geographical area is its typical or average weather. Climate change therefore would be a change in that typical or average weather that endures over time. Usually in conversation today, climate change refers to the global phenomenon of a long term warming trend in temperatures; ...
A straightforward definition of “big data” appears towards the top of a Google search (June 29, 2016) as “extremely large data sets that may be analyzed computationally to reveal patterns, trends, and associations, especially relating to human behavior and ...
It is common to distinguish four species of privacy: physical, informational, decisional, and psychological/mental privacy. In addition, philosopher and legal theorist Anita Allen (2003) distinguishes dispositional privacy. Physical privacy is a restriction on the ability of others to experience a ...
Scientific experiments and measurements are transformed into research data. The term “research data” applies to many different forms of scientific information, including raw numbers and field notes, machine tapes and notebooks, edited and categorized observations, interpretations and ...
That which is done or communicated in trust is confidential. Confidential information is information entrusted to another. The implication is that, for some reason, such as personal privacy or competitive advantage, the person entrusting this information does not wish others to know. Thus ...
Movement of human beings from one location to another is a long-standing characteristic of the species. Today, voluntary migration often occurs when people have options and skills that they will be able to exercise better in a new place. Many countries, including the U.S., encourage and promote ...