Eco/372 Week 1

Improved Essays
Based on the organization you have chosen for your final research paper, respond to the following:

I. Regulations: If any data involved is regulated, or if there are other legal and compliance concerns, state them in this section.

The laws covering the internet are varied and quite complex in the United States with the financial system to the medical system heavily regulated. Starting off the Sarbanes-Oxley was enacted in 2002, the Sarbanes-Oxley Act is designed to protect investors and the public by increasing the accuracy and reliability of corporate disclosures. It was enacted after the high-profile Enron and WorldCom financial scandals of the early 2000s. It is administered by the Securities and Exchange Commission, which publishes SOX rules and requirements
…show more content…
Next is the Card Industry Data Security Standard (PCI DSS) that is a set of requirements for enhancing security of payment customer account data. It was developed by the founders of the PCI Security Standards Council, including American Express, Discover Financial Services, JCB International, MasterCard Worldwide and Visa to help facilitate global adoption of consistent data security measures. PCI DSS includes requirements for security management, policies, procedures, network architecture, software design and other critical protective measures. Further is the Gramm-Leach-Bliley Act (GLB) Act of 1999, that is also known as the Financial Modernization Act of 1999, the GLB Act includes provisions to protect consumers' personal financial information held by financial institutions. There are three principal parts to the privacy requirements: the Financial Privacy Rule, the Safeguards Rule and pretexting provisions. The final major regulation is the Insurance Portability and Accountability Act (HIPAA) that was in 1996, HIPAA is intended to improve the efficiency and

Related Documents

  • Great Essays

    Hrm/531 Week 3

    • 697 Words
    • 3 Pages

    1. Performance: how well they are at their job. Ex-Mary’s performance at earned her a promotion. Organization: how well organized the employees and store is. Ex-Susan is a very well organized person.…

    • 697 Words
    • 3 Pages
    Great Essays
  • Improved Essays

    Markets are systems which allow people to exchange goods and services. Why do we need goods and services? We need them for survival, in order to keep a civilization running, and whole countries need them to grow economically. So how do we get them, by trading. When countries trade with each other they have to determine if they will both benefit from it.…

    • 478 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    1. Why did Congress enact the Sarbanes-Oxley Act? What are the major provisions and benefits of the Act? Congress enacted the Sarbanes-Oxley Act in order to protect investors. This was done by improving the accuracy and reliability of corporate disclosures made by in accordance with the securities laws.…

    • 1002 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Hrm/531 Week 3

    • 580 Words
    • 3 Pages

    Due to the negative impact our company has made to the local traffic, I have thoroughly analyzed our workforce's transportation methods and provided potential solutions. I've conducted an employee survey discussing employee carpool habits, public transportation, and telecommunication. Employee Carpool Habits In the following chart, I recorded how many employees carpool and divided the responses into four categories : Every day , Certain days , Randomly , Never . As shown in Figure 1, out of 43,500 employees, more than half the company "never" carpools.…

    • 580 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Hrm/531 Week 3

    • 252 Words
    • 2 Pages

    The hospital administration will take the necessary actions to ensure that a child abduction sentinel event never occurs again. One resource that will be used to support the changes to the risk management program will be mandatory monthly training luncheons for the nursing teams. The Chief Nursing Officer will conduct the training luncheon program by using slides and computer presentations covering potential sentinel events and the steps required to prevent the occurrence, nursing documentation criteria, and effective communication techniques. Additionally, the training luncheons will be used as reinforcement to the training sessions provided by the nursing managers. Moreover, the nursing team members will have the opportunity to ask questions, voice concerns, and offer suggestions.…

    • 252 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Hrm/531 Week 3

    • 222 Words
    • 1 Pages

    2. Diagnosis of the problem In the case, the employee needs to decide whether to change the health insurance plan and need more information to choose the right one from HMO and PPO. Why the employee is difficult to making the choice? Because the health insurance plan is so important to the employees in the case.…

    • 222 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    HIPAA: Covered Entities

    • 168 Words
    • 1 Pages

    HIPAA was created in 1996 in order for Covered Entities (Health plan, health care clearing houses and health care provider) to protect and secure a person’s private health information (PHI). Its main focus is to eradicate worker discrimination due pre-existing conditions. Nonetheless, HIPAA concentrated on the implementation of a distributed electronic system to improve administrative transactions among covered entities. However, early stages of HIPAA provisions left many gaps opened. As an example: HIPPA did not specify how information should be protected; what methods, rules or standard needed to be enforced.…

    • 168 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    Hrm/531 Week 2

    • 636 Words
    • 3 Pages

    Every business is required by law to have some form of security policy in place that will protect their customer’s information. How robust these policies are, may, and do, differ from company to company and can depend on many different factors unique to each individual business. Information security is very important and at my widget company it would be my responsibility and ethical duty to do everything in my power to find out how my system was breached and exactly what customers information was compromised as well as who is responsible for taking this information. I would also be ethically responsible for finding out which employees have not been adhering to the company's security policy and accessing customer information when it was not part of their duties, and under what circumstances this happened. Where these employees instructed to do this or did the do it of their own accord and if so reprimand these individuals up to and including termination of their employment with my company.…

    • 636 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    IT security threats and cryptography 7/A. P1: Explain the different security threats that can affect the IT systems of originations. 7/A.M1: Assess the impact that IT security threats can have on organization's IT systems and business whilst taking account of the principles of information security and legal requirements In today's society data is a very valuable thing companies have to take in to account how to protect that data from the threats, Threats is a way in which the data is vulnerable and therefore rules and regulations have been put in place to stop these potential threats for example all will have adhere to the principles of information security this is a way in which data is protected, I have been working for a start-up company…

    • 1332 Words
    • 6 Pages
    Improved Essays
  • Superior Essays

    The Federal trade comission’s (FTC) privacy rule is another federal safeguard, which forces the financial institutions to keep privacy on the customer’s information and give a privacy notice. The difference between this one and the GLB act is that this one is an independent agency of the United States government and not only protects the financial industry, but also the advertising and the marketing industries. The Glass Steagal Act, this act separates investments and commercial banking activities.…

    • 1110 Words
    • 4 Pages
    Superior Essays
  • Decent Essays

    Explore the Health Information Privacy page on the U.S. Department of Health & Human Services website as assigned in the Topic 6 Readings, respond to the following prompt: What is considered "identifiable patient information?" The HIPAA privacy and security rules specify requirements for hospitals, clinics, and private practices under "Administrative Requirements. " Do you think these entities are mostly in compliance with the rules? Provide reasons why an entity might not be. Identifiable patient information is any information or data that could possibly identify a certain person.…

    • 318 Words
    • 2 Pages
    Decent Essays
  • Great Essays

    Why Collect HR Data

    • 1110 Words
    • 5 Pages

    Data Protection Act This act applies to all organisations that process data relating to their staff and customers. It is the main legal framework in UK that protects personal data. The act contains 8 data protection principles which are: Personal data should be processed fairly and lawfully, this can be achieved by asking the employees to use their information, on the employment contract.…

    • 1110 Words
    • 5 Pages
    Great Essays
  • Decent Essays

    The Administrative Simplification Subsection components that apply to business associates include transactions and code sets used for billing, uniform identifiers such as social security numbers and specific demographics and who has access to the information and when is the information being accessed or used which could violate HIPAA privacy and security rules. When the original Privacy Rule was enacted “it was the view of many covered entities, regulators, and analysts that several provisions …were unworkable and caused unintended consequences” (Rothstein, 2013, p. 525). Primarily, the business entities were unknowingly exposing protected patient information. This also stemmed from improper training regarding what was PHI.…

    • 217 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    The Importance Of HIPAA

    • 211 Words
    • 1 Pages

    HIPAA is the federal law that requires certain entities to protect health information. HIPAA is divided into two sections - the Privacy Rule & the Security Rule. The Privacy Rule includes requirements on how entities can use or disclose health information, and the Security Rule has requirements on how entities must secure and protect health information. HIPAA only applies to covered entities. A “covered entity” is defined as a health care provider, health plan, or healthcare clearinghouse.…

    • 211 Words
    • 1 Pages
    Decent Essays
  • Superior Essays

    HIPAA Security and Privacy: Cases and Scenarios Brittany Stewart Herzing University Dr. Gary J. Hanney Abstract HIPAA security and privacy is an important aspect of healthcare delivery. Government influences greatly how legal issues are addressed in healthcare, including non-governmental entities. This essay will explain how the HIPAA privacy rule should be applied appropriately with protected health information.…

    • 945 Words
    • 4 Pages
    Superior Essays