Eysenbach G (2001)

Total Page:16

File Type:pdf, Size:1020Kb

Eysenbach G (2001) Journal of Medical Internet Research Impact Factor (2018): 4.945 - ranked #1 medical informatics journal by Impact Factor Volume 3 (2001), Issue 2 ISSN: 1438-8871 Editor in Chief: Gunther Eysenbach, MD, MPH Contents Editorials What is e-health? (e20) G Eysenbach. 3 What is e-Health (2): The death of telemedicine? (e22) Vincenzo Della Mea. 5 Original Papers A Web-Based Distance Education Course in Nutrition in Public Health: Case study (e16) Dirce Sigulem, Tania Morais, Lilian Cuppari, Sylvia Franceschini, Silvia Priore, Kátia Camargo, Reinaldo Gimenez, Viviane Bernardo, Daniel Sigulem. 7 A Framework for an Institutional High Level Security Policy for the Processing of Medical Data and their Transmission through the Internet (e14) Christos Ilioudis, George Pangalos. 20 Comparing Web and Touch Screen Transaction Log Files (e18) David Nicholas, Paul Huntington, Peter Williams. 27 Virtual Sonography Through the Internet: Volume Compression Issues (e21) Olga Ferrer-Roca, Joseba Vilarchao-Cavia, Juan-Mario Troyano-Luque, Matilde Clavijo. 38 Review Ethical Challenges of Medicine and Health on the Internet: A Review (e23) Kirsti Dyer. 55 Short Paper Factors Associated with Intended Use of a Web Site Among Family Practice Patients (e17) Peggy Smith-Barbaro, John Licciardone, Howard Clarke, Samuel Coleridge. 71 Journal of Medical Internet Research 2001 | vol. 3 | iss. 2 | p.1 XSL·FO RenderX Viewpoints Evidence-based Patient Choice and Consumer health informatics in the Internet age (e19) Gunther Eysenbach, Alejandro Jadad. 77 The Patient-Physician Relationship in the Internet Age: Future Prospects and the Research Agenda (e15) Ben Gerber, Arnold Eiser. 88 Journal of Medical Internet Research 2001 | vol. 3 | iss. 2 | p.2 XSL·FO RenderX JOURNAL OF MEDICAL INTERNET RESEARCH Eysenbach Editorial What is e-health? G Eysenbach (J Med Internet Res 2001;3(2):e20) doi:10.2196/jmir.3.2.e20 characterizes not only a technical development, but Introduction also a state-of-mind, a way of thinking, an attitude, Everybody talks about e-health these days, but few people have and a commitment for networked, global thinking, to come up with a clear definition of this comparatively new term. improve health care locally, regionally, and Barely in use before 1999, this term now seems to serve as a worldwide by using information and communication general "buzzword," used to characterize not only "Internet technology. medicine", but also virtually everything related to computers This definition hopefully is broad enough to apply to a dynamic and medicine. The term was apparently first used by industry environment such as the Internet and at the same time leaders and marketing people rather than academics. They acknowledges that e-health encompasses more than just "Internet created and used this term in line with other "e-words" such as and Medicine". e-commerce, e-business, e-solutions, and so on, in an attempt As such, the "e" in e-health does not only stand for "electronic," to convey the promises, principles, excitement (and hype) but implies a number of other "e©s," which together perhaps best around e-commerce (electronic commerce) to the health arena, characterize what e-health is all about (or what it should be). and to give an account of the new possibilities the Internet is Last, but not least, all of these have been (or will be) issues opening up to the area of health care. Intel, for example, referred addressed in articles published in the Journal of Medical Internet to e-health as "a concerted effort undertaken by leaders in health Research. care and hi-tech industries to fully harness the benefits available through convergence of the Internet and health care." Because The 10 e©s in "e-health" the Internet created new opportunities and challenges to the traditional health care information technology industry, the use 1. Efficiency - one of the promises of e-health is to increase of a new term to address these issues seemed appropriate. These efficiency in health care, thereby decreasing costs. One "new" challenges for the health care information technology possible way of decreasing costs would be by avoiding industry were mainly (1) the capability of consumers to interact duplicative or unnecessary diagnostic or therapeutic with their systems online (B2C = "business to consumer"); (2) interventions, through enhanced communication possibilities improved possibilities for institution-to-institution transmissions between health care establishments, and through patient of data (B2B = "business to business"); (3) new possibilities for involvement. peer-to-peer communication of consumers (C2C = "consumer 2. Enhancing quality of care - increasing efficiency involves to consumer"). not only reducing costs, but at the same time improving So, how can we define e-health in the academic environment? quality. E-health may enhance the quality of health care for One JMIR Editorial Board member feels that the term should example by allowing comparisons between different remain in the realm of the business and marketing sector and providers, involving consumers as additional power for should be avoided in scientific medical literature and discourse. quality assurance, and directing patient streams to the best However, the term has already entered the scientific literature quality providers. (today, 76 Medline-indexed articles contain the term "e-health" 3. Evidence based - e-health interventions should be in the title or abstract). What remains to be done is - in good evidence-based in a sense that their effectiveness and scholarly tradition - to define as well as possible what we are efficiency should not be assumed but proven by rigorous talking about. However, as another member of the Editorial scientific evaluation. Much work still has to be done in this Board noted, "stamping a definition on something like e-health area. is somewhat like stamping a definition on ©the Internet©: It is 4. Empowerment of consumers and patients - by making the defined how it is used - the definition cannot be pinned down, knowledge bases of medicine and personal electronic as it is a dynamic environment, constantly moving." records accessible to consumers over the Internet, e-health opens new avenues for patient-centered medicine, and It seems quite clear that e-health encompasses more than a mere enables evidence-based patient choice. technological development. I would define the term and concept 5. Encouragement of a new relationship between the patient as follows: and health professional, towards a true partnership, where e-health is an emerging field in the intersection of decisions are made in a shared manner. medical informatics, public health and business, 6. Education of physicians through online sources (continuing referring to health services and information delivered medical education) and consumers (health education, or enhanced through the Internet and related tailored preventive information for consumers) technologies. In a broader sense, the term http://www.jmir.org/2001/2/e20/ J Med Internet Res 2001 | vol. 3 | iss. 2 | e20 | p.3 (page number not for citation purposes) XSL·FO RenderX JOURNAL OF MEDICAL INTERNET RESEARCH Eysenbach 7. Enabling information exchange and communication in a likely to benefit from advances in information technology, standardized way between health care establishments. unless political measures ensure equitable access for all. 8. Extending the scope of health care beyond its conventional The digital divide currently runs between rural vs. urban boundaries. This is meant in both a geographical sense as populations, rich vs. poor, young vs. old, male vs. female well as in a conceptual sense. e-health enables consumers people, and between neglected/rare vs. common diseases. to easily obtain health services online from global providers. In addition to these 10 essential e©s, e-health should also be These services can range from simple advice to more complex interventions or products such a pharmaceuticals. • easy-to-use, 9. Ethics - e-health involves new forms of patient-physician • entertaining (no-one will use something that is boring!) and interaction and poses new challenges and threats to ethical • exciting issues such as online professional practice, informed - and it should definitely exist! consent, privacy and equity issues. 10. Equity - to make health care more equitable is one of the We invite other views on the definition of e-health and hope promises of e-health, but at the same time there is a that over time the journal will be filled with articles which considerable threat that e-health may deepen the gap together elucidate the realm of e-health. between the "haves" and "have-nots". People, who do not Gunther Eysenbach have the money, skills, and access to computers and networks, cannot use computers effectively. As a result, Editor, these patient populations (which would actually benefit the Journal of Medical Internet Research most from health information) are those who are the least Acknowledgments Based on the author©s speech delivered at UNESCO (Paris), June 2001, Conference of the International Council for Global Health Progress: Global health equity - Medical progress & quality if life in the XXIst century. The article was partly stimulated by the question "what is ehealth?" asked by A. Risk on various mailing lists and in Health Informatics Europe http://hi-europe.co.uk/files/2001/9996.htm. Conflicts of Interest None declared. Submitted 22.12.00; this is a non±peer-reviewed article;accepted 18.06.01; published
Recommended publications
  • CASE REPORT Medical Identity Theft in the Emergency Department
    UC Irvine Western Journal of Emergency Medicine: Integrating Emergency Care with Population Health Title Medical Identity Theft in the Emergency Department: Awareness is Crucial Permalink https://escholarship.org/uc/item/9qw8t7zk Journal Western Journal of Emergency Medicine: Integrating Emergency Care with Population Health, 15(7) ISSN 1936-900X Author Mancini, Michelino Publication Date 2014 DOI 10.5811/westjem.2014.8.22438 License https://creativecommons.org/licenses/by-nc/4.0/ 4.0 Peer reviewed eScholarship.org Powered by the California Digital Library University of California CASE REPORT Medical Identity Theft in the Emergency Department: Awareness is Crucial Michelino Mancini, DO Lakeland Healthcare, Department of Emergency Medicine, St. Joseph, Michigan Supervising Section Editor: Rick McPheeters, DO Submission history: Submitted April 24, 2014; Revision received July 24, 2014; Accepted August 15, 2014 Electronically published September 24, 2014 Full text available through open access at http://escholarship.org/uc/uciem_westjem DOI: 10.5811/westjem.2014.8.22438 Medical Identity theft in the emergency department (ED) can harm numerous individuals, and many frontline healthcare providers are unaware of this growing concern. The two cases described began as typical ED encounters until red flags were discovered upon validating the patient’s identity. Educating all healthcare personnel within and outside the ED regarding the subtle signs of medical identity theft and implementing institutional policies to identify these criminals will discourage further fraudulent behavior. [West J Emerg Med. 2014;15(7):899–901.] INTRODUCTION with the combined efforts of multiple healthcare associates, The crime of medical identity theft is a growing concern including registration clerks, nursing staff, security officers in healthcare institutions.
    [Show full text]
  • Health Informatics (Formerly Computers in Health Care) Kathryn J
    Health Informatics (formerly Computers in Health Care) Kathryn J. Hannah Marion J. Ball Series Editors Deborah Lewis Gunther Eysenbach Rita Kukafka P. Zoë Stavri Holly B. Jimison Editors Consumer Health Informatics Informing Consumers and Improving Health Care With 28 Illustrations With a Foreword by Warner V. Slack Deborah Lewis, EdD, RN, MPH Gunther Eysenbach, MD, MPH Associate Professor and Coordinator Senior Scientist, Centre for Global eHealth Innovation Nursing Informatics Division of Medical Decision Making and Health Care University of Pittsburgh School Research of Nursing Toronto General Research Institute of the UHN Pittsburgh, PA 15261 and USA Associate Professor Department of Health Policy Management and Evaluation University of Toronto Toronto, ON M5G 2C4 Canada Rita Kukafka, DrPH, MA, CHES P. Zoë Stavri, MLS, PhD Holly B. Jimison, PhD Assistant Professor Assistant Professor Medical Informatics Investigator Mailman School of Public Health Oregon Health & Science KP Center for Health Research Division of Sociomedical Sciences University and Department of Medical Informatics and Assistant Professor Columbia University Visiting Assistant Public Health and Preventive New York, NY 10032 Professor, part-time Medicine USA Health Sciences Oregon Health & Science Informatics, SOM, JHU University Chambersburg, PA 17201 Portland, OR 97227-1110 USA USA Series Editors: Kathryn J. Hannah, PhD, RN Marion J. Ball, EdD Adjunct Professor, Department of Vice President, Clinical Informatics Strategies Community Health Science Health Sciences Informatics, SOM, JNU Faculty of Medicine Chambersburg, PA 17201 The University of Calgary Healthlink, Inc. Calgary, Alberta T2N 4N1 Baltimore, MD 21210 Canada and Adjunct Professor The Johns Hopkins University School of Nursing Baltimore, MD 21205 USA ISBN 0-387-23991-X Printed on acid-free paper.
    [Show full text]
  • Privacy in Atlantis*
    Harvard Journal of Law & Technology Volume 18, Number 1 Fall 2004 PRIVACY IN ATLANTIS* Jerry Kang & Benedikt Buchner** TABLE OF CONTENTS INTRODUCTION.................................................................................230 SCENE I: PRIVACY’S FORM...............................................................231 A. Market-Talk..............................................................................231 B. Dignity-Talk .............................................................................234 SCENE II: PRIVACY’S SUBSTANCE....................................................236 A. The Core Similarities ...............................................................237 1. Dignity’s Consent (or the Market’s Initial Allocation) .........237 2. Data Protection Regulations (or Intangible Property Regulations) ....................................................................240 B. Too Little Control.....................................................................244 1. The Problem: Hard Choices ..................................................244 2. The Response: Fortifying the Individual...............................246 C. Too Much Control....................................................................251 1. The Problem: Societal Overrides ..........................................251 2. The Response: Interest Balancing .........................................252 CONCLUSION ....................................................................................255 APPENDIX .........................................................................................257
    [Show full text]
  • 617 Charlotte A. Tschider* Although the First Legal Conceptions Of
    NORTH CAROLINA JOURNAL OF LAW & TECHNOLOGY VOLUME 22, ISSUE 4: MAY 2021 MEANINGFUL CHOICE: A HISTORY OF CONSENT AND ALTERNATIVES TO THE CONSENT MYTH Charlotte A. Tschider* Although the first legal conceptions of commercial privacy were identified in Samuel Warren and Louis Brandeis’s foundational 1890 article, The Right to Privacy, conceptually, privacy has existed since as early as 1127 as a natural concern when navigating between personal and commercial spheres of life. As an extension of contract and tort law, two common relational legal models, U.S. privacy law emerged to buoy engagement in commercial enterprise, borrowing known legal conventions like consent and assent. Historically, however, international legal privacy frameworks involving consent ultimately diverged, with the European Union taking a more expansive view of legal justification for processing as alternatives to consent. Unfortunately, consent as a procedural substitute for individual choice has created a number of issues in achieving legitimate and effective privacy protections for Americans. The problems with consent as a proxy for choice are well known. This Article explores the twin history of two diverging bodies of law as they apply to the privacy realm, then introduces the concept of legitimate interest balancing as an alternative to consent. Legitimate interest analysis requires an organization to formally assess whether data collection and use ultimately result in greater benefit to individuals than the organization with input from actual consumers. This model shifts responsibility from individual consumers having to protect their * Assistant Professor of Law, Loyola University Chicago School of Law and the Beazley Institute for Health Law & Policy. Professor Tschider would like to extend her heartfelt thank you to Professor Anne Klinefelter and the rest of the participants of the N.C.J.L.
    [Show full text]
  • Ohio's “Aggressive” Attack on Medical Identity Theft
    OHIO’S “AGGRESSIVE” ATTACK ON MEDICAL IDENTITY THEFT * STANLEY C. BALL I. INTRODUCTION .................................................................... 111 II. DATA BREACH, IDENTITY THEFT, AND MEDICAL IDENTITY THEFT .................................................................................. 113 A. Data Breach................................................................. 113 B. Identity Theft................................................................ 115 C. Medical Identity Theft.................................................. 117 III. FEDERAL LEGISLATION TO PREVENT MEDICAL IDENTITY THEFT .................................................................................. 122 A. HIPAA.......................................................................... 123 B. The HITECH Act Amends HIPAA ............................... 126 C. Federal Preemption of State Laws .............................. 129 IV. OHIO’S DATA BREACH LAW DOES NOT COVER HIPAA COVERED ENTITIES.............................................................. 131 V. OHIO SHOULD AMEND ITS DATA BREACH NOTIFICATION LAW..................................................................................... 133 A. Ohio’s Data Breach Notification Law Should Apply to HIPAA Covered Entities ............................... 133 B. Ohio’s Data Breach Notification Law Should Have an Acquisition-Based Trigger........................................... 138 C. Ohio’s Data Breach Notification Law Should Require Healthcare Providers to Destroy or Encrypt Discarded Medical Records.........................................................
    [Show full text]
  • Privacy in the Employment Relationship, Practical Law Practice Note 6-517-3422 (2017)
    Privacy in the Employment Relationship, Practical Law Practice Note 6-517-3422 (2017) Privacy in the Employment Relationship by Thomas H. Wilson, Vinson & Elkins LLP and Corey Devine with Practical Law Labor & Employment Maintained • USA (National/Federal) This Practice Note provides an overview of privacy issues in employment, which may arise in various contexts, such as background checks, drug testing, email and other electronic surveillance and tracking by GPS. Invasion of privacy claims are highly fact-intensive and largely dependent on state law. This Note contains information that is general and not jurisdiction-specific. Contents Overview of Privacy Laws Background Checks Background Checks Conducted Internally by the Employer Background Checks Conducted Externally by a Third Party Employment Testing of Applicants or Employees Drug Testing Polygraph Tests HIV or AIDS Tests Medical and Physical Examinations Other Types of Testing Employee Personnel Records Employee Medical Records Sensitive Personally Identifiable Information Employee Electronic Communications Monitoring of Emails and Internet Usage Requiring Disclosure of Electronic Account Access Information Monitoring of Telephone Calls Video Surveillance of Employee Behavior on the Job Searching Employee Surroundings on the Job No Expectation of Privacy in Common Areas Employer Limits © 2017 Thomson Reuters. No claim to original U.S. Government Works. 1 Privacy in the Employment Relationship, Practical Law Practice Note 6-517-3422 (2017) Employees' Lawful, Off-Duty Activities Tracking Employee Movements by GPS Privacy Concerns Consent and Notice Other Considerations Monitoring and Employee Rights Under the National Labor Relations Act Information about Employees Relevant to Health and Safety This Note provides a general overview of the key legal principles involved in employee privacy in the private employment context.
    [Show full text]
  • Infodemiology and Infoveillance: Scoping Review
    JOURNAL OF MEDICAL INTERNET RESEARCH Mavragani Review Infodemiology and Infoveillance: Scoping Review Amaryllis Mavragani, BSc, MSc Department of Computing Science and Mathematics, Faculty of Natural Sciences, University of Stirling, Stirling, United Kingdom Corresponding Author: Amaryllis Mavragani, BSc, MSc Department of Computing Science and Mathematics Faculty of Natural Sciences University of Stirling University Campus Stirling, FK9 4LA United Kingdom Phone: 44 7523 782711 Email: [email protected] Abstract Background: Web-based sources are increasingly employed in the analysis, detection, and forecasting of diseases and epidemics, and in predicting human behavior toward several health topics. This use of the internet has come to be known as infodemiology, a concept introduced by Gunther Eysenbach. Infodemiology and infoveillance studies use web-based data and have become an integral part of health informatics research over the past decade. Objective: The aim of this paper is to provide a scoping review of the state-of-the-art in infodemiology along with the background and history of the concept, to identify sources and health categories and topics, to elaborate on the validity of the employed methods, and to discuss the gaps identified in current research. Methods: The PRISMA (Preferred Reporting Items for Systematic Reviews and Meta-Analyses) guidelines were followed to extract the publications that fall under the umbrella of infodemiology and infoveillance from the JMIR, PubMed, and Scopus databases. A total of 338 documents were extracted for assessment. Results: Of the 338 studies, the vast majority (n=282, 83.4%) were published with JMIR Publications. The Journal of Medical Internet Research features almost half of the publications (n=168, 49.7%), and JMIR Public Health and Surveillance has more than one-fifth of the examined studies (n=74, 21.9%).
    [Show full text]
  • Medical Privacy: HIPAA & You As the Patient
    Medical Privacy: HIPAA & You as the Patient WHAT IS HIPAA? HIPAA, the Health Insurance Portability and Accountability Act of 1996, is a federal law that sets minimum privacy standards limiting the sharing of medical information. New York state laws, such as the Public Health Law, add more protection. HIPAA also requires that you be allowed to review your own medical records. Most doctors, hospitals, clinics, and other medical care providers must follow HIPAA. Insurance companies, HMOs, and government programs that pay medical bills, such as Medicaid and Medicare, must also protect your information under HIPAA. WHEN CAN MY MEDICAL INFORMATION BE SHARED? The law allows information to be shared to protect your health or public health and safety. Only the minimum necessary information should be shared for specific reasons. For example, in some circumstances, information can be shared with other doctors, law enforcement, or public health officials. You have the right to a report in most cases, explaining when and why your medical information was shared; you can ask whoever you believe shared the information for this report for free once a year. Information about your physical or mental health usually CANNOT be shared with your family, friends, or lawyer without your consent. ÿ If you would like someone to be able to talk with your doctor about your health, be sure to let the medical care provider know; ask what it requires. HOW DO I SEE MY OWN RECORDS? Just ask! In most cases, you have the right to see your own records. You can also ask that your records be copied and mailed to you, but you must pay the cost of the copying and mailing.
    [Show full text]
  • Data Protection 2017
    ICLG The International Comparative Legal Guide to: Data Protection 2017 4th Edition A practical cross-border insight into data protection law Published by Global Legal Group, with contributions from: Affärsadvokaterna i Sverige AB Hunton & Williams Bae, Kim & Lee LLC Koushos Korfiotis Papacharalambous LLC Bagus Enrico & Partners Lee and Li, Attorneys-at-Law Creel, García-Cuéllar, Aiza y Enríquez, S.C. LPS L@w Cuatrecasas Matheson Dittmar & Indrenius Mori Hamada & Matsumoto Drew & Napier LLC Osler, Hoskin & Harcourt LLP Ecija Abogados Pachiu & Associates ErsoyBilgehan Pestalozzi Attorneys at Law Ltd. Eversheds Sutherland Portolano Cavallo GANADO Advocates Gilbert + Tobin Rato, Ling, Lei & Cortés Lawyers GRATA International Rossi Asociados Hacohen & Co. Subramaniam & Associates (SNA) Herbst Kinsky Rechtsanwälte GmbH Wikborg Rein Advokatfirma AS The International Comparative Legal Guide to: Data Protection 2017 General Chapter: 1 All Change for Data Protection: The European Data Protection Regulation – Bridget Treacy & Anita Bapat, Hunton & Williams 1 Country Question and Answer Chapters: Contributing Editors 2 Australia Gilbert + Tobin: Melissa Fai & Alex Borowsky 7 Anita Bapat and Aaron P. Simpson, Hunton & Williams 3 Austria Herbst Kinsky Rechtsanwälte GmbH: Dr. Sonja Hebenstreit & Dr. Isabel Funk-Leisch 23 Sales Director Florjan Osmani 4 Belgium Hunton & Williams: Wim Nauwelaerts & David Dumont 34 Account Director 5 Canada Osler, Hoskin & Harcourt LLP: Adam Kardash & Brandon Kerstens 43 Oliver Smith 6 Chile Rossi Asociados: Claudia Rossi
    [Show full text]
  • Patient Health Data Privacy
    PATIENT HEALTH DATA PRIVACY ISPS-BIOETHICS WORKING PAPER ISPS14-028 [14 OCTOBER 2014] BONNIE KAPLAN, PHD, FACMI CENTER FOR MEDICAL INFORMATICS INTERDISCIPLINARY BIOETHICS CENTER INFORMATION SOCIETY PROJECT KAPLAN – Patient Health Data Privacy August 2014 Beyond IP: The Future of Privacy, ed. Shlomit Yanisky-Ravid, New York: Fordham University Press (forthcoming) – DRAFT CHAPTER I. INTRODUCTION How private is medical and health data? Well-known cases of lost, stolen, or hacked computers or storage devices;1 reported snooping into celebrity data, or even that of neighbors or divorced spouses;2 and other computer breaches involving health records,3 are disturbing news. When reported data breaches affect more than 500 individuals, they are posted by the US Department of Health and Human Services. This “wall of shame” makes it evident that hundreds of thousands of data records can be 1 Six of the ten largest reported data breaches at healthcare organizations in 2013 involved unencrypted stolen computers. The largest occurred when the Utah Department of Health’s server containing information on 780,000 patients was hacked (Erin McCann, Infographic: biggest healthcare data breaches of 2012, available at http://www.healthcareitnews.com/news/infographic-biggest-healthcare-data-breaches- 2012, (last visited January 29, 2014). Insurers and treatment centers also are vulnerable. Stolen laptops potentially compromised nearly 840,000 individuals insured by Horizon Blue Cross Blue Shield of New Jersey (Marianne Kolbasuk McGee, Unencrypted Laptops Lead
    [Show full text]
  • The Changing Face of Identity Theft
    The Changing Face of Identity Theft Identity theft is rampant resulting in millions of dollars of damage each year in the United States. Over the last few years, the face of identity theft has changed. Unfortunately, consumers do not realize this change primarily due to the advertising of credit bureaus, some ID theft service companies and lack of news. ID thieves are the one group that understands the changing faces of identity theft. Yet, what can a person do to prevent ID theft when it is misunderstood and changing? To understand the problem, you must first realize why thieves want your identity. The answer is simple; they want your credit (money), they want to hide their identity, they want certain services, or they desire employment. Several years ago, the prevalent type of identity theft was “true name” identity theft. This is when a real person’s identifying information is used without modification. The thief actually poses as the victim. According to a study by ID Analytics, this accounts for a small portion of all identity fraud; 10 – 15 percent. In these cases, continuous credit monitoring, fraud alerts and credit freezes play a role in keeping the consumer aware of their credit file status. However as with any theft, once the thief realizes you have caught onto them, they change, modify their actions and come after you wearing a different face. A face harder to detect which credit monitoring, fraud alerts and credit freezes do not readily provide you with protection. These include non-credit theft such as, medical identity theft, criminal identity theft and the fastest growing and hardest to detect synthetic identity theft.
    [Show full text]
  • Regulation and Procedure Name: HIPAA Privacy and Security Policy and Procedures
    Texas Woman's University University Regulation and Procedure Regulation and Procedure Name: HIPAA Privacy and Security Policy and Procedures Regulation and Procedure URP: 01.270 Number: Policy Owner: Finance and Administration, Office of General Counsel, and Student Life POLICY STATEMENT These University Regulation and Procedures (“URP”) are designed to specify Texas Woman’s University’s (“TWU” or the “University”) compliance with the Health Insurance Portability and Accountability Act of 1996 (“HIPAA”) and as amended under the American Recovery and Reinvestment Act of 2009 and by Section 181.001(b) of the Texas Health and Safety Code. These URP provide for the protection and security of a person’s medical information. The establishment of these URP demonstrates TWU’s commitment to ensuring individuals’ have access to their medical information and are provided protections regarding its use and disclosure. These URP meet the Department of Health and Human Services requirements that TWU communicate clear and specific compliance standards and procedures to applicable parties. TWU is a hybrid entity, as its primary function is not health care; however, some components of TWU use, or may use, or disclose protected health information (“PHI”). TWU consists of health care service components, other services that support the business operations of the health care components, as well as components that are not related to health care services. Only health care components and those components that provide business support to the health care components must comply with all provisions of the privacy rule (see the list on p. ii). However, all TWU components should strive to protect the confidentiality and privacy of PHI consistent with these policies and procedures.
    [Show full text]