In a few sentences, using information you have found through resources listed above (or from your own search), answer the questions you selected. Make sure you identify which question you are answering and make sure you cite your sources.
Boundary: The technique does cross a personal boundary without permission. According to Epic’s article Poverty and Privacy, information …show more content…
On an example HMIS Client Consent form from HUD Exchange, there is a list of those who could see the information provided to the person, however; the wording is vague and leaves a lot of room for law enforcement (Hudexchange.info). Also, on Epic, it is reported that police access to the system is very broad. (Epic.org)
Adequate data stewardship and protection: The security can not be adequately protected. Epic reports on their Homeless Tracking Fact Sheet that the software used for the system runs on general systems and their are many chances for the information to be compromised by attacks on the system. (Epic.org)
Beneficiary: The beneficiaries are all three. The goal of the system is to get better information on the homeless in different areas so that the government knows where to send money. It also helps the individual as they are able to gain shelter by sharing their information. However, it also helps those who look at the data because police are given access and it allows them to possible locate certain people that they are looking for and also know very personal information about them.