As a healthcare patient, I feel that the privacy of my personal information is a major concern. Organizations should focus on making ethical decisions when handling patient information in regards to implementing effective security and privacy measures (Haag & Cummings, 2008). Many organizations including healthcare spend thousands or millions of dollars on securing patient privacy and protecting data against breaches and hackers (Farahmand, Navathe, Sharp, & Enslow, 2005). It is the responsibility of leaders and management to understand and influence ethical practices which relate to privacy and security threats (Haag & Cummings, 2008). Security breaches have the ability to disable the functions of a business and pilfer confidential consumer information such as healthcare information, social security numbers, and passwords (Tran & Atkinson, 2002). In addition to potential loss in revenue, breaches also create consumer distrust, and negatively affect brand reputation (Farahmand et al., 2005). The risks associated with breaches such as loss of confidentiality, integrity, and availability, should cause organizations to be aware and active with threats that generate concerns (Halliday, Badenhorst, & Solms, 1996).
Farahmand, F., Navathe, S. B., Sharp, G. P., & Enslow, P. H. (2005). A management perspective on risk of security threats to information systems. Information Technology and Management, 6(2–3). doi:10.1007/s10799-005-5880-5
Haag, S., & Cummings, M. (2008). Management information systems for the information age (Laureate Education, Inc., custom ed.). Boston: McGraw-Hill/Irwin
Halliday, S., Badenhorst, K., & Solms, R. (1996). A business approach to effective information technology risk analysis and management. Information Management & Computer Security, 4(1). doi:10.1108/09685229610114178
Tran, E., & Atkinson, M. (2002). Security of personal data across national borders. Information Management & Computer Security, 10(5). doi:10.1108/09685220210446588
Dr. Elijah Clark (November 15, 2016). Security Breach and Ethics [Web log post]. Retrieved from http://elijahclark.com/security-breach-and-ethics/