5.1 Orginizational Behavior Risks Flashcards
Printer safeguards (4 points)
Don’t share printers with other departments
Pick up doc immediately
Place printing locks/codes if possible
Don’t place in public areas
Screen lock
Windows+L key
Password is require to unlock
Force log off
Button allowing Someone to logout a user who has screen locked.
Time lock
Limits hours PCs are available to login to
SSO
Single sign on, one username/password to login to multiple systems.
Instant message secure?
No, Not secured by default, sent in plain text
Security officer
Determines policies necessary for security of phi.
Audit trail
Record of activities, time stamp and users on EMR.
Fax and PHI
Ensure recipient is authorized to receive
Send a cover sheet
Log fax transmissions
Audit speed dial numbers
SFTP
Require username and passwords
Encryption of transmission
VOIP
Voice over IP
Redundant internet and backup analog/fax lines to call out in event of failure
MD
Medical doctor. Licensed to practice medicine without supervision.
PA
Physicians assistant. Licensed to practice medicine with supervision. Can be primary care provider.
NP
Nurse practitioner. Registered nurse who can sometimes work without supervision (state laws).
RN
Registered nurse. Completed nursing school and passed licensing exam.
LPN
Licensed practical nurse. Assists RNs and does bedside care.
MA
Medical assistant. Not certified and works directly under provider or office manager.
PCT
(Not the trail) provider who works directly under of licensed provider, usually does bedside care.
System admin
Backups, configure/install/maintains computers,servers networks. Manages projects with info system. Train computer users.
Security officer
Updates/patches computers and servers. Applies polices to protect PHI. grants access based on minimum required. Resolves vulnerabilities.
Network admin
Maintain integrity of network. Setup/deploy/maintain of network devices.
Database admin
Design and manage databases. Monitor data, reports.
Desktop support
Support of computers and peripherals. Phones, tablets, printers, faxes.
Role based access control
Assignment of access to info based on job title and not individual evaluation for need of access.
Role based request
Request usually done by supervisor to allow employee access to info not in current role.
Mandatory access control
Security mechanism were a user can only gains access to a resource if the security officer or admin grants access. Not piratical to manage in real world, usually for remote access users.
Descretionary access control
User has control to grant access to resource owned by that user account.
Break the glass
When access is crucial/emergency when care can’t be delayed, username password or other means to access patient info right away.
Risk management
Proactive approach to preventing lawsuits and liability issues due to medical errors.
Two ways to protect PHI
Technical and physical safeguards