StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Database Design and Data Security Breeches - Essay Example

Cite this document
Summary
"Database Design and Data Security Breeches" paper state that a hospital database system should be managed by a trustworthy person. The system can also be under the custodian of a party who is not in a position of being interested in the details contained therein. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95% of users find it useful
Database Design and Data Security Breeches
Read Text Preview

Extract of sample "Database Design and Data Security Breeches"

The IRB waiver can be applied if the information is exceptional. The information with de-identified status can be given to the researcher. This is the information that gives details about a particular group of patients but cannot be narrowed to a specific patient. Such information is exempted from HIPAA regulations since it is in a general format (Wilson, 2010). Such information does not have any hint that links the information to a particular patient, such as contacts, names, job numbers, geographical information, official documents, account number, e-mail, and medical record numbers.

The current rule and regulation governing health information are HIPAA. This stands for the health insurance portability and accountability act. The laws were put in place in the year 1996 by congress. The rules are meant to give the mandate to transfer and link health insurance coverage and reduce health information abuse and fraud. It also gives rules on the confidentiality and protection of health information. Giving access to the restricted areas has to involve some consultations first with the senior administrators.

Later the researcher is given access using MySQL 5.1 version which can access different databases. The privileges to be accorded to the academic researcher include being allowed to be a member of the data reader so that he or she can access the data easily. The database system should only avail the information needed by the researcher. Other information should be kept private. The SQL statement used should be able to sort the data according to the limited privileges. Such statements include GRANT PRIVILEGE_NAME option. For the record: Protecting electronic health information.

Examples of data breach the department of health of Utah had their system accessed and personal information stolen. This is where a hacker made the figures of those who were affected rise from 24,000 to 780,000. Social security numbers were also stolen from 280, 000 individuals and personal data from 500,000 people. The reason behind this act was attributed to a weak password. Therefore, it is the responsibility of the database managers to ensure that they have a unique entry key.

This can also be accompanied by a multilayered security system to ensure that one has a long way to go before accessing the data (Gertz&Jajodia, 2008). The password can also be changed after a certain period. This ensures that even if a person leaked the secret code, the system will still be safe. In another case, an employee sent a mail about the ID, phone numbers, and social security numbers of people to a personal account. This happened in the South Carolina Department of Health and Human Services. This kind of stealing is associated with a lack of integrity among the employees. 

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Database Design and data security breeches Essay - 1”, n.d.)
Database Design and data security breeches Essay - 1. Retrieved from https://studentshare.org/logic-programming/1617983-database-design-and-data-security-breeches
(Database Design and Data Security Breeches Essay - 1)
Database Design and Data Security Breeches Essay - 1. https://studentshare.org/logic-programming/1617983-database-design-and-data-security-breeches.
“Database Design and Data Security Breeches Essay - 1”, n.d. https://studentshare.org/logic-programming/1617983-database-design-and-data-security-breeches.
  • Cited: 0 times

CHECK THESE SAMPLES OF Database Design and Data Security Breeches

Illegal Physical or Internet Intrusion

enior director of security for Oracle, Wynn White mentions his observations about database security in the following words: 'According to one recent Forrester study, 80 percent of data security breaches involve insiders, employees or those with internal access to an organization, putting information at risk.... The paper "Illegal Physical or Internet Intrusion" states that the security of an organization's database is just as important as the existence of the organization itself....
5 Pages (1250 words) Essay

Happy Homes Database System

The security of a database system should be up to date.... First, the issue of access control should take center stage while discussing the security concepts.... he second issue that is concerned with database security is database vulnerabilities.... Threats from a variety of sources such as the internet and users should be identified and minimized to reduce the chances of the database security being breached.... Updates and patches to the database management system should be routinely done to help enhance the security of the database....
6 Pages (1500 words) Coursework

Software Implementing Database Security

Database Integrity Database integrity refers to the consistency and the accuracy of data within the database and data warehouse systems.... Data integrity is often times dubbed as data quality and data with integrity and a whole structure.... Database security Shakeel [Pick the date] Introduction As more and more increase in information day by day which results in increase in data, this data is stored on more and more database systems which are usually distributed....
4 Pages (1000 words) Essay

IT Database Research

Physical security involves measures taken to ensure security of workforce, system devices and equipment, resources, documents and sensitive information stored on physical media (like hardware programs and networks) from damaging proceedings like unauthorized access, fire,.... The GRANT statement assigns permissions to statements and objects; the DENY permission denies access to the security accounts from inheriting permissions; and, the REVOKE statement removes the GRANT or DENY permissions from user roles....
4 Pages (1000 words) Research Paper

Database Security

Most large databases face security challenges related to survivability, intellectual property rights and data quality.... The paper "Database security" states that generally, database security needs stem from the requirement to protect data.... Therefore, specific measures can be recommended for specific security concerns.... Organizations need to establish and maintain security measures that address application-level concerns....
12 Pages (3000 words) Coursework

Illegal Physical and Internet Intrusion

This paper ''Illegal Physical and Internet Intrusion'' discusses why data security is of importance to an organization.... According to one recent Forrester study, 80 percent of data security breaches involve insiders, employees, or those with internal access to an organization, putting information at risk.... The security of data concerned with the everyday processing is the critical element of its success.... The security of these databases from physical or non-physical threats is unavoidable as, without it, the sanctity of the data cannot be ensured....
5 Pages (1250 words) Essay

Database Security - Threats and Challenges

The internet has resulted in disintermediation of the access of data, which coupled with the democratization of computing has resulted in requirements for data access anywhere, anytime and anyhow, making its contribution to the increase of data security concerns.... This paper is about database securities layers such as database administration, system administration, security office, developers and employees, about the problem of the provenance of data, ownership and IPR....
15 Pages (3750 words) Research Paper

Database Administration Aspects

.... ... ...
10 Pages (2500 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us