Information Privacy
doc
keyboard_arrow_up
School
University of California, Los Angeles *
*We aren’t endorsed by this school
Course
1
Subject
Information Systems
Date
Nov 24, 2024
Type
doc
Pages
3
Uploaded by eshihandamonn
1
Information Privacy
Name
Institution
Professor
Course
Date
2
Information Privacy
WellPoint Inc. breached the principle of information confidentiality. The HIPAA’s
privacy rule requires healthcare organizations to protect and maintain the confidentiality of
patient’s information. WellPoint Inc. breached this rule by making patients’ information
accessible to hackers. The hackers easily accessed confidential data of over 80 million clients.
The stolen information was very critical since the hackers could use it to commit various forms
of crimes, including identity theft. The breach had repercussions on WellPoint. For example, it
incurred financial losses as it had to pay the United States Department of Health and Human
Services $1.7 million. Investigations by the Office of Civil Rights showed that WellPoint Inc.
failed to safeguard their clients’ information as required by HIPAA’s security rule. For instance,
its policies and procedures were inadequate and ineffective in permitting access to online
application databases.
I would have addressed the situation by first containing the cyberattack. This would
prevent further damage by closing all the access that the attackers have to the organization’s
system. The next step would be assessing and repairing the damage. When the organization has
contained the attack, I would evaluate the degree of the damage and initiate strategies for
strengthening the system. I would gather evidence of the attack from sources like audits, disk
images, and memory dumps. A lack of proper evidence can limit digital forensics; hence,
preventing follow-up investigations. The third step would be to communicate with affected
individuals about the attack. Information privacy breaches can result in significant reputational
damage. Therefore, experts advise organizations to collaborate with public relations specialists
who can help them manage the impacts of the crises. The final step would be implementing
3
interventions to prevent more attacks in the future. Some of the interventions include securing
the databases, educating employees about cybersecurity, and creating security policies.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help