Data Privacy and Security: HIPAA and Small Business Compliance

Data Privacy and Security: HIPAA and Small Business Compliance

James Suleiman, Terry Huston
Copyright: © 2009 |Volume: 3 |Issue: 2 |Pages: 12
ISSN: 1930-1650|EISSN: 1930-1669|ISSN: 1930-1650|EISBN13: 9781615203222|EISSN: 1930-1669|DOI: 10.4018/jisp.2009040103
Cite Article Cite Article

MLA

Suleiman, James, and Terry Huston. "Data Privacy and Security: HIPAA and Small Business Compliance." IJISP vol.3, no.2 2009: pp.42-53. http://doi.org/10.4018/jisp.2009040103

APA

Suleiman, J. & Huston, T. (2009). Data Privacy and Security: HIPAA and Small Business Compliance. International Journal of Information Security and Privacy (IJISP), 3(2), 42-53. http://doi.org/10.4018/jisp.2009040103

Chicago

Suleiman, James, and Terry Huston. "Data Privacy and Security: HIPAA and Small Business Compliance," International Journal of Information Security and Privacy (IJISP) 3, no.2: 42-53. http://doi.org/10.4018/jisp.2009040103

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Compliance with regulatory guidelines and mandates surrounding information security and the protection of privacy has been under close scrutiny for some time throughout the world. Smaller organizations have remained “out of the spotlight” and generally do not hire staff with the expertise to fully address issues of compliance. This case study examines a project partnership between an information-technology (IT) consultant who specializes in small business and a diminutive medical practice that sought support with compliance issues surrounding a research study it was conducting. Other small medical practices were contributing to the research; consequently, information sharing while concurrently adhering to the regulations of the Health Insurance Portability and Accountability Act (HIPAA) of 1996 was a significant aspect of the project. It was also critical that numerous other security and privacy legislative requirements were met. The issue of data security is often neglected in IT instruction. This case study provides a foundation for examining aspects of information security from the perspective of the small-business IT consultant.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.