Chapter 11 - Data Privacy, Confidentiality, And Secruity Flashcards
Accept the risk
Understanding the residual risk would exist as no additional controls would be implemented leaving some risk to the organization
Accounting of disclosures
An individual has a right to receive an accounting of disclosures of PHU made by a CE in the six years prior to the date on which the accounting is requested, except for disclosures (I) To carry out treatment, payment, and health care operations as provided in 164.506 (ii) To individuals to PHI about them as provided in 164.502 (iii) Incident to a use of disclosure otherwise permitted or required by this subpart (iv) Pursuant to an authorization as provided in 164.508 (v) For the facility directory or to persons involved in the persons care or other notification purposes as provided (vi) For national security or intelligence purposes as provided (vii)To correctional institutions or law enforcement officials as provided (viii) As part of limited data set in accordance. (xi) That occurred prior to the compliance date for the CE
Addressable standards
As amended by HITECH the implementation specification of the HIPPA Security Rule that are designated “addressable” rather than “required” to be in compliance with the rule, the covered entity must implement the speciation as written, implement an alternative, implementation specification was provided either does not exist in the organization, or exists with a negligible probability of occurrence
Administrative safeguards
Under HIPAA, are administrative actions and policies and procedures to manage the selection, development and measures to protect electronic protected information and to manage the conduct od the covered entity i.e., business associate’s workforce in relation to the protection of that information
Assessment
The systematic collection and recure if the information pertaining to an individual who wants to receive health care services or renter into the health care setting
Audit
A function that allows retrospective reconstruction of events, including who executed the events in question, and what changes were made as a result. 2. To conduct an independent review of electronic system records and activities in order to test the adequacy and effectiveness if data security procedures and to ensure compliance with established policies and procedure.
Audit log
A chronological record of electronic system activities that enables the reconstruction, review, and examination of the sequence of events surrounding or leading to each event or transaction from its beginning to end. Includes who performed what event and when it occurred.
Authorization
As amendment by HITECH, except as otherwise specified, a covered entity may not use or disclose PHI without a valid authorization. When a CE receives a valid authorization, such use or disclosure must be consistent with the authorization.
Biometric authentication
Allows a user to be user to be uniquely identified and access the system based on more or more biometric traits such as f ingerprints, hand geometry, retinal pattern or voice waves
Breach
Under HITECH, the acquisition, use, access or disclosure of protected health information in a manner not permitted under subpart E of this part that compromises the security or privacy of the protected health information
Breach notification
A Covered entity shall, following the discovery of a breach of unsecured protected health information, notify each individual whose unsecured information has been or is reasonably believed to the covered entity to have been, accessed, acquired, used or disclosed as a result of such breach
Breach notification rule
Requires covered entities and business associated to establish policies and procedures to investigate an unauthorized use or disclosure of PHI to determine if a breach has occurred, conclude the investigation, and notify affected individuals and the secretary of the Department of Health and Human Services within 60 days of the date of discovery
Bring your own device
Refers to the personal devices that are allowed to be used within a healthcare organization and the interact with electronic protected health information (ePHI)
Business associate (BA)
A person or org other than a member of the covered entity’s workforce that preforms functions or activities on behalf of or affecting a covered entity that involve the use or disclosure of individually identifiable health information. 2. With respect to the covered entity, a person who creates, receives, maintains, or transmits PHI for a function of activity regulated by HIPAA, including claims processing or administrations, data analysis, utilization review, quality assurance, Billing, benefit management, practice management, or provides legal, actuarial, accounting, consulting, data aggregation, management, administrative, accreditation or financial services
Business associate agreement (BAA)
A contact between the covered entity and BA must establish the permitted and required uses and disclosures of PHI by the BA and provides specific content requirements of the agreement. The contract may not authorize the BA to use or further disclose the information in a manner that would violate the requirements of HIPAA, and requires the termination of the contract if the covered entity or BS are aware of noncompliant activities of the other
Cipher text
A text message that has been encrypted, or converted into code, to make it unreadable in order to conceal its meaning
Compound authorization
An authorization for use or disclosure of PHI may not be combined with any other document to create a compound authorization. Expect as follows: (i) an authorization for the use of PHI for research may be combined with any other type of written permission for the same or another research. (ii) an authorization for the use or disclosure of psychotherapy noted may only be combined with another authorization for a use or disclosure of psychotherapy notes (iii) when a CE has conditioned the provision of treatment, payment, enrollment in the health plan, or eligibility for benefits under this section on the provision of one of the authorizations
Confidentiality
A legal and ethical concept that established the healthcare providers responsibility for protecting health records and other personal and private information from unauthorized use or disclosure. 2. As Amended by HITECH, the practice that data of information is not disclosed to unauthorized persons or processes
Contingency plan
A comprehensive plan that highlights potential vulnerabilities and threats as well as identify the approaches to either prevent them or at least minimize the impact; there are three major categories: natural threats, technical or manmade: intentional acts
Contrary
State law cannot be complied with when 1CE determines that it is impossible to comply with both federal and state privacy regulations. 2. Compliance with the state law would create a barrier to compliance with the federal regulations under HIPAA
Covered entity (CE)
As Amended by HITECH: A health plans 2. A health clearing house. 3. A healthcare provider who transmits any healthcare information in electronic form in connection with a transaction covered by this subchapter
Criticality analysis
Consists of evaluating each od the different systems in the organization to determine how crucial the information in the system is to day-to-day healthcare operations and patient care
Cryptographic Key
Tool applied to the data in order to turn the information into cipher text as well as converting the text from cipher text back to plain text.
Data at rest
Data is in a storage within a database or on s server where it is no longer being used or accessed
Data backup plan
A plan that ensures the recovery of information that has been lost or become inaccessible
Data in motion
Data that are in the process of being transmitted from one location to another location such as email
Data security
The process of keeping data, both in transit and at res, safe from unauthorized access, alteration or destructions
Decryption
The process of transforming the information from cipher text to plain text