StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Privacy and Digital Investigations - Essay Example

Cite this document
Summary
As a healthcare organization whose business involves the collection and storage of highly sensitive and confidential patient data, privacy concerns occupy centre-stage. As the director of our legal department clarified, however, the organization's policies tend towards emphasis upon the inviolability of patients' privacy, as opposed to that of employees…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91% of users find it useful
Privacy and Digital Investigations
Read Text Preview

Extract of sample "Privacy and Digital Investigations"

Download file to see previous pages

Therefore, upon the detection of suspicious computer incidents, the organization immediately launches a forensics/digital investigation which is fully compliant with a policy which has been jointly drawn up by both the legal and the IT departments. This report will begin with a brief overview of privacy considerations, following which it will describe the organization's policy and highlight both its strengths and weaknesses. According to federal employment laws, employees have a reasonable expectation of privacy.

Aftab (2006) notes that the Electronic Communications Privacy Act of 1986 explicitly prohibits employer monitoring of employee private electronic communications, even if the medium of communication was owned by the employer, occurred in the workplace and on the employer's own time. Employees should reasonably expect that the electronic equipment assigned to their use, whether computers or telephones, are not going to be used for the purposes of monitoring their activities and private communiqus.

At the same time, Aftab (2006) notes that it has become increasingly important for employers to monitor employee use of these equipments, especially in instances of investigation. Therefore, to overcome the strictures placed on employers by the Electronic Communications Privacy Act, organizations typically have employees sign an organization-specific Electronic and Communication Equipment policy. This policy, according to Merkow and Breithaupt (2002) and Aftab (2006), clearly specifies that that the employee has the right to review all documents and materials which were created, sent or received via corporate equipment and, indeed, to subject the equipment to forensic investigations which would expose employee use of the equipment.

In other words, employees are often required to legally waive their legal right to privacy. According to our Legal Director, our organization has such a policy in place and all employees are required to sign it.2.2 Patient Privacy Patient privacy is protected by federal legislature. The Health Insurance Portability and Accountability Act (HIPAA) of 1996, clearly outlines the inviolability of patient confidentiality. Jacobs (2005) explains that it is contingent upon companies in the healthcare sector to ensure that patient data is protected against unauthorised access and, of course, public dissemination.

If violations occur and investigations reveal that the organization did not do all that was possible to securitize patient data, it could be held liable for negligence and subsequently sued by patients. Therefore, the priority for ant healthcare organisation should be the securitization of patient data (Jacob, 2005).3 Investigation Policy The organization's investigation policy, as explained by the Legal Department Director is simultaneously informed and enabled by the privacy considerations outlined in the above.

Investigation policy is driven by the objective of identifying ant possible violations of patient privacy and the identity of the violator and the forensics investigations which are integral to the fulfilment of the stated objectives are enabled by employee waiver of their right

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Privacy and Digital Investigations Essay Example | Topics and Well Written Essays - 1250 words”, n.d.)
Retrieved from https://studentshare.org/miscellaneous/1526169-privacy-and-digital-investigations
(Privacy and Digital Investigations Essay Example | Topics and Well Written Essays - 1250 Words)
https://studentshare.org/miscellaneous/1526169-privacy-and-digital-investigations.
“Privacy and Digital Investigations Essay Example | Topics and Well Written Essays - 1250 Words”, n.d. https://studentshare.org/miscellaneous/1526169-privacy-and-digital-investigations.
  • Cited: 0 times

CHECK THESE SAMPLES OF Privacy and Digital Investigations

Criminal Profiling And Remote Monitoring Of A Computer

Both the types of criminal profiling help in the digital forensic investigations.... Due to this, the sector of digital forensics investigation has been opened and is in continuous development, in order to come to date with the digitally advanced types of crimes.... (Criminal Profiling in digital Forensic, 2011) Discuss tools that could be used to remotely monitor a computer (with or without the computer owner's awareness)....
4 Pages (1000 words) Essay

Organizations Digital Investigation Process

digital investigations for an organization differ to digital investigation for law enforcement because of the procedure adopted.... digital investigations arise as a result of an occurrence suspected, attempted or actual in an organization.... Organization's digital investigation process Name Number Course Tutor Date digital investigation is the process of preserving, collecting, validating, identifying, analyzing, interpreting, documenting, and presenting of digital evidence from digital sources....
5 Pages (1250 words) Essay

The use of covert human information sources within an investigation

Human beings must have the right to privacy and it is in the “collective interest” of all citizens to maintain a “society in which personal privacy is protected” (p.... hellip; In the UK, the Regulation of Investigatory Powers Act has been introduced in the year 2000, which defines covert human intelligence source as a person who “establishes or maintains a personal or other relationship” of a secret nature for facilitating information or to “provide access to information” or “covertly disclose information” to another person CHISs use different methods of surveillance to obtain intelligence or information from the targets such as interception of their communication, communications data, or “directed and intrusive surveillance” (Freedom from Suspicion: Surveillance Reform for a digital Age, 2011, p....
4 Pages (1000 words) Essay

Organizations digital investigation process

hellip; The author explains that digital investigations for an organization differ to digital investigation for law enforcement because of the procedure adopted.... digital investigations arise as a result of an occurrence suspected, attempted or actual in an organization.... The purpose of the paper “Organization's digital investigation process” is to examine digital investigation as the process of preserving, collecting, validating, identifying, analyzing, interpreting, documenting, and presenting of digital evidence from digital sources....
5 Pages (1250 words) Essay

Privacy and Confidentiality: Social Applications

The methods and results of past literature on the issue of… The paper also justified the type of research used and appropriate solutions that are to be implemented in order to safeguard the private or personal data of users of social applications from the infringement Legal frameworks and ethical standards of various nations protect the interests of the users of social applications such as search engines and wikis in regard to their privacy and confidentiality of personal information....
9 Pages (2250 words) Essay

System for Investigating Law Enforcement

It is imperative to design a system that ensures that proper investigations take place to so that there are compensation and rehabilitation to the victims and criminal prosecution to the offenders.... The system of investigations should be independent to ensure public confidence of the process and to avoid a scenerio police investigating themselves does not arise.... This will help in the investigations by being able to confirm that the officer was at the site where the alleged misconduct took place and determine whether the officer exercised certain powers such as arrest or searching of suspects (Ruggiero, 2013)....
2 Pages (500 words) Essay

Public criminal investigations and private security investigations

This paper is aimed at providing a comparative study of public criminal investigations and private security investigations.... This research will begin with the statement that public criminal investigation relates to the process through which the government through one arm of the police department that is charged with the responsibility of investigations takes up initiatives aimed to collect crime related pieces of information and to gather them to form concrete evidence....
4 Pages (1000 words) Research Paper

Forensic Analysis of Private Browsing Modes

Evidence that is presented from the investigations of computer forensic must be subjected to practices and guidelines that are designed for the purposes of other digital evidence (Eoghan, 2002).... … IntroductionComputer forensic is one of the branch of the digital forensic science that deals with the legal evidence that is found in the storage media that are digital and computers (Smith & Bace, 2003).... It is aimed at the examination of the IntroductionComputer forensic is one of the branch of the digital forensic science that deals with the legal evidence that is found in the storage media that are digital and computers (Smith & Bace, 2003)....
11 Pages (2750 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us