Order For Custom Writing, Similar Answers & Assignment Help Services

Fill the order form details in 3 easy steps - paper's instructions guide.

Posted: May 9th, 2022

Standards and Legal Policies

Standards and Legal Policies
The modern world has become a huge consumer of the internet and computer technology in its every day operations including social interactions. An increase in the number of internet users has resulted in an increase in the number of cybercrimes. The term cybercrimes may be used to describe a variety of internet frauds committed b using computer as either objects or tools to an offense. Hacking, fishing, as well as Phishing are examples of internet crimes where computers are used as objects of crime. Hate speech and child pornography are some of the examples of internet crimes where computers are used as tools of crime. Majority of the cybercrime are an attack on sensitive information regarding individuals, governments, organizations, companies, and institutions such as banks. Data privacy should therefore be highly maintained and every institution or organization should be able to determine the kind of data within its computer system that can be shared with third parties. There should be very high security measured put in place to avoid issues of cybercrime and those that define steps to be taken when such a crime occurs.
HIPAA
Healthcare organizations have shifted to the use of computer technology in their provision off services. Bid Data systems such as the Electronic Health Records are largely in use to store patient information. Since the introduction of the EHR’s, most healthcare organizations have reported improved healthcare outcomes (Drolet, 2017). The reasons for the improvement is because by storing patient information in a computer system, the data will be readily available when needed including in emergence cases hence preventing medical errors. Secondly, the EHR’s make it easy for healthcare provider to retrieve the patient’s medical history which may include sensitive information from the past that will aid in the provision of care. One major risk however, is that if nit properly stored, the patient information can easily be hacked leading to negative legal consequences on the healthcare organization. The U.S department that deals with Health and Human Services came up with a privacy rule that aims at preserving the integrity of the healthcare system. The rule by the HHS protects the use and disclosure of the health information of patients. The Health Insurance Portability and Accountability Act implemented in 1996 called for the HHS to come up with standards that would regulate the use of electronic health information. It is a requirement of the HIPAA that health plans, health care clearinghouse, and healthcare providers follow the standard rule by maintaining security of patient information when using electronic records. Every healthcare provider that makes use of electronic systems to transmit information about a particular patient such as referral authorizations and claims must observe a standard transaction.
Freedom of Information Act
The freedom of information act allows any individual to request access to record belonging to the federal agency. Its basic function is to ensure that citizens are informed on issues that are important in the functioning of a democratic society. FOIA however has limits on the extent the information is disclosed (Solove, 2016). For example, classified information for national defense cannot be disclosed, personnel and medical files, as well as information on the supervision of banks. Other exemptions include; internal personnel rules, trade secrets, vital business information, records on law enforcement, and geological information. Attaining access to this information by any individual through acts such a phishing is considered as cybercrime and is heavily punishable by the law. Governments are easy targets by terrorists who try to acquire information on national defense through hacking the web systems where such information is stored. The FBI is the main federal agency that oversees online attacks by criminal and terrorists. The 9/11 attack was partly a cyber-attack and had appropriate measure been taken by the FBI, thing would not have gotten out of hand. Hackers can also unlawfully access bank system and cause alterations in the financial sectors. Customers and investors will lose trust in the information provided by the bank causing the collapse of the sector. According to CNBC news, the former top cybersecurity officer of the world bank argued that he is more afraid of data being altered than being lost or stolen (Fazzini, 2018). The U.S has since the 9/11 attacks launched some sophisticate systems that help to detect and prevent any cases of cyber-attacks such as creating a well-equipped cyber division at the headquarters of FBI.
Sarbanes-Oxley Act
Corporate fraud is very common and the Sarbanes-Oxley Act of 2002 is dedicated towards detecting crimes in the corporate sector. As a federal law, it was established to facilitate the auditing process and the financial regulations of public companies. The aim of the act it to provide protection to shareholders, the general public, and the employees. A number of corporate scandals that led to unlawful retrenchment of whistleblowers facilitated the formation of the act. The Enron scandal prompted the creation of the Sarbanes-Oxley Act. Enron was one of the largest companies in the U.S that was trusted with financial stability (Kecskés, 2016). Energy related companies transacted business with Enron that saw it grow to the worlds largest communication, electric, gas, pulp and pare companies. It came as a shock to many when it filed bankruptcy in 2001. Along the way, Enron had adapted some fraudulent practices when the government deregulated the oil ang gas industry. Enron altered data on the earning reports for its shareholders that led to them accruing losses. The company executives embezzled finds and also manipulated the energy market. It is from the incidence that the ACT was implemented in order to increase accountability and disclosure requirements. The SOX applies the law of privacy of information in that it protects whistleblowers who report cases of fraud against their employer. Companies are also not allowed to change the terms of employment for the employees who report the case and can neither reprimand them. SOX therefore is concerned with ensuring that the employees that blow the whistle is well protected from unjust acts by the employers.
Conclusion
Businesses in the domestic and foreign arena compete for the global economy hence with the internet and computer systems, it is very easy for rivals to launch attacks leading to the collapse of one or both of the businesses. There is therefore need to make use of computer forensics that will help in the detection of cybercrimes. The main target of computer forensics is acquiring satisfactory evidence that can be used against or in favor of the user. Heavy penalties should be imposed on hackers a measure to prevent cases of cyber-attacks. The federal government should ensure that every organization strictly adheres to the standers rules of information privacy and security. The public, governments and legal-justice systems should work collaboratively to minimize cybercrime.

References
Drolet, B. C., Marwaha, J. S., Hyatt, B., Blazar, P. E., & Lifchez, S. D. (2017). Electronic communication of protected health information: privacy, security, and HIPAA compliance. The Journal of hand surgery, 42(6), 411-416.
Fazzini, K. (2018, October 16). Power outages and bank runs: Here are the ‘cyber 9/11’ scenarios that really worry the experts. Retrieved from 911-scenarios-power-outages-bank-runs- changed-data.htm
Kecskés, A. (2016). The Sarbanes-Oxley act from a legislative viewpoint. The Theory and Practice of Legislation, 4(1), 27-43.
Solove, D. J. (2016). A brief history of information privacy law. Proskauer on privacy, PLI.

Order | Check Discount

Tags: Australia Nursing Writing Help, Case Study Help, criminal justice essay writers, criminal law research essay writers, criminology paper writing service

Assignment Help For You!

Special Offer! Get 15-30% Off on Each Order!

Why Seek Our Custom Writing Services

Every Student Wants Quality and That’s What We Deliver

Graduate Essay Writers

Only the most qualified writers are selected to be a part of our research and editorial team, with each possessing specialized knowledge in specific subjects and a background in academic writing.

Affordable Prices

Our prices strike the perfect balance between affordability and quality. We offer student-friendly rates that are competitive within the industry, without compromising on our high writing service standards.

100% Plagiarism-Free

No AI/chatgpt use. We write all our papers from scratch thus 0% similarity index. We scan every final draft before submitting it to a customer.

How it works

When you decide to place an order with Nursing.StudyBay, here is what happens:

Fill the Order Form

You will complete our order form, filling in all of the fields and giving us as much guidelines - instruction details as possible.

Assignment of Writer

We assess your order and pair it with a skilled writer who possesses the specific qualifications for that subject. They then start the research/writing from scratch.

Order in Progress and Delivery

You and the assigned expert writer have direct communication throughout the process. Upon receiving the final draft, you can either approve it or request revisions.

Giving us Feedback (and other options)

We seek to understand your experience. You can also review testimonials from other clients, from where you can select your preferred professional writer to assist with your homework assignments.

Expert paper writers are just a few clicks away

Place an order in 3 easy steps. Takes less than 5 mins.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00