Fill in Order Details

  • Submit paper details for free using our simple order form

Make Payment Securely

  • Add funds to your account. There are no upfront payments. The writer will only be paid once you have approved your paper

Writing Process

  • The best qualified expert writer is assigned to work on your order
  • Your paper is written to standard and delivered as per your instructions

Download your paper

  • Download the completed paper from your online account or your email
  • You can request a plagiarism and quality report along with your paper

Department of Health and Human Services

Department of Health and Human Services


The best practices applied in the department of health and human services are vital for data security of patients. The most notable method used is to authorize accessibility to information of a patient with regard to the role one does in the hospital or agency. This is in line with the HIPAA standards of allowing a certain size of data vital to offer human services (IAB, 2009). A good number of exchange players that found in hospitals set policies for its staff.

Role-based access to data in the hospitals allows the organization’s internal security policies to manage how data is used. A good example is that the registrars are able to see all the data while to the patients it is restricted.   Similarly, physicians are only able to see data of patients that they handle with regard to the RHIO policy.

Protocols for client’s options are available to manage cases when wrong people access data. Considering that the department of health and human services through the RHIOs aims to maintain privacy of data breaches may be a common thing.

The department for health and human services applies strict procedures for handling and managing sensitive data. As an important business agency, they are mandated to inform the players if infringement of data transmission and storage occurs (Lowrance, 2012). This makes it possible for them to take the necessary steps to safeguard these sensitive patient data. Methods used involve calling for immediate notification about of the affected areas and undertaking quick removal of a user’s access details. A number of RHIOs are coming up or relooking their security policies for a much more improved system.

The department of health and human services applies several best practices as discussed; this has several implications on the security practices to meet data privacy. Security is a major challenge to planning and implementation to ensure effective data privacy.

User identification is vital process that ensures the identity of the user is acquired. This will enable the users to see the information. The health and human services department makes use of a number of authentication processes that ensures data privacy s met. The hospital authenticates its users and informs the department when the health professionals have their details ready to be accessed. The providers opt to have the professional staff vouch for users using a formal process (CIHR, 2005). They health experts apply by themselves where they issue relevant details and issue an authorization request comprising of contact details regarding their supervisor. Hence the user account is set up.

Authorized individuals are able to access their system using unique usernames and password. The department standardizes the process of entering data to avoid multiple user IDs.

The department of health makes sure data security is met through activation and tracking of unauthorized access or use of data. It is able to manage a complete audit and track several variables like user’s login details, data accessed and when it was accessed (IAB, 2009). As a measure of security practice the department uses a special audit log. This makes it possible when the system intruders are nabbed they do not share their audit details with other people.

Another practice used is the ‘break the glass’ which makes data access possible when authorization does not work properly or in case of emergency. The department certain peoples the ability to override the security process in case of an emergency.


The department of health and human services makes use of practices that lead to security of the agency. The paper has been able to discuss the varied ways that this takes place and the impact it has security process. The organization is hence able to maintain a secure system through this process to the satisfaction of the agency and the users.


CIHR (2005). Best Practices for Protecting Privacy in Health Research. Retrieved from:

IAB (2009). Online Lead Generation: Data Security Best Practices. Retrieved from:

Lowrance, W (2012). Privacy, Confidentiality, and Health Research. New York: Cambridge University Press.


  • Google Rating
  • Sitejabber
  • Trustpilot
Zahraa S
Zahraa S
Absolutely spot on. I have had the best experience with Elite Academic Research and all my work have scored highly. Thank you for your professionalism and using expert writers with vast and outstanding knowledge in their fields. I highly recommend any day and time.
Stuart L
Stuart L
Thanks for keeping me sane for getting everything out of the way, I’ve been stuck working more than full time and balancing the rest but I’m glad you’ve been ensuring my school work is taken care of. I'll recommend Elite Academic Research to anyone who seeks quality academic help, thank you so much!



Consider Your Assignments Done

“All my friends and I are getting help from eliteacademicresearch. It’s every college student’s best kept secret!”

Jermaine Byrant

“I was apprehensive at first. But I must say it was a great experience and well worth the price. I got an A!”

Nicole Johnson
Finance & Economics

Our Top Experts


See Why Our Clients Hire Us Again And Again!


Avg Rating


Elite Academic Research Promises You:

Always on Time

If we are a minute late, the work is on us – it’s free!


If the work we produce contains plagiarism we’ll pay out a £5,000 guarantee.


Providing quality work is core to our beliefs, which is why we will strive to give you exactly that, and more!

Written to Standard

All of our assignments go through a stringent quality checking process from start to finish.

Success Guarantee

When you order form the best, some of your greatest problems as a student are solved!






Pay an expert to take your online class and say goodbye to poor grades, missed deadlines, and the struggles
of balancing your education with other work/life responsibilities. Life Is too Short to Spend on Classes
You Have No Interest In. Focus on what is really important in your life. Let our professional handle your class.

    Guaranteed A or B

    100% Confidential

    Experienced Tutors

    24/7 Support

Fill in free quote request

Tell us about your online class and what help you need. Try to give us the maximum information.

Agree on price

Our representative will contact you to discuss the details of your order and the rates for our assistance.

Pay and get help

When everything is agreed, you will receive an email with the invoice. After you pay, we start working on your task.

× How can I help you?