Article contents
Organizational Repertoires and Rites in Health Information Security
Published online by Cambridge University Press: 01 October 2008
Extract
The privacy and security rules of the Health Insurance Portability and Accountability Act (HIPAA) of 1996 emphasize taking steps for protecting protected health information from unauthorized access and modification. Nonetheless, even organizations highly skilled in data security that comply with regulations and all good practices will suffer and must respond to breaches. This paper reports on a case study in responding to an important breach of the confidentiality and integrity of identifiable patient information of the Kaiser Internet Patient Portal known as “Kaiser Permanente Online” (KP Online). From the perspective of theories about highly reliable organizations, effective health information security programs must respond resiliently to as well as prospectively anticipate security breaches.
- Type
- Special Section: The Newest Frontier: Ethical Landscapes in Electronic Healthcare
- Information
- Copyright
- Copyright © Cambridge University Press 2008
References
1 Health Insurance Reform: Security Standards; Final Rule. 68 Fed. Reg. 8333-8381 (Feb 20, 2003); Standards for Privacy of Individually Identifiable Health Information. 65 Fed. Reg. 82461–82829 (Dec 28, 2000).
2 Weick K, Sutcliffe K. Managing the Unexpected: Assuring High Performance in an Age of Complexity. San Francisco, CA: Jossey Bass; 2001; Weick K, Surcliffe K, Obstfeld D. Organizing for high reliability: Processes of collective mindfulness. Research in Organizational Behavior 1999;21:81–123.
3 Collmann J, Cooper T. Breaching the security of the Kaiser Permanente Internet Patient Portal: The organizational foundations of information security. Journal of the American Medical Informatics Association 2007;14:239–43.
4 Weick K. Sensemaking in Organizations. Thousand Oakes, CA: Sage Publications; 1995.
5 See note 2, Weick 1995.
6 See note 3, Collmann, Cooper 2007.
7 Snook S. Friendly Fire: The Accidental Shootdown of US Black Hawks over Northern Iraq. Princeton, NJ: Princeton University Press; 2000.
8 Perrow C. Normal Accidents: Living with High-Risk Technologies. Princeton, NJ: Princeton University Press; 1999.
9 Turner V. Drama, Fields and Metaphors: Symbolic Action in Human Society. Ithaca, NY: Cornell University Press; 1974.
10 Paulk M, Weber C, Curtis B, Chrissis M. The Capability Maturity Model: Guidelines for Improving the Software Process. Boston, MA: Addison Wesley Professional; 1995.
11 Brubaker B. “Sensitive” Kaiser e-mails go astray. Washington Post 9 Aug 2000.
12 See note 3, Collmann, Cooper 2007.
13 Turner V. Schism and Continuity in an African Society. Manchester, UK: Manchester University Press; 1957; Kapferer B. A Celebration of Demons: Exorcism and the Aesthetics of Healing in Sri Lanka. Washington, DC: Smithsonian; 1991.
14 See note 1, Health Insurance Reform 2003.
15 See note 2, Weick et al. 1999.
16 See note 2, Weick, Sutcliffe 2001.
- 6
- Cited by