Chapter 12/13 - HIPAA Security Rule / Security Threats and Controls Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

ePHI

A

acronym: electronic protected health information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

PHI

A

acronym: protected health information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

scalability

A

the property of a system to handle a growing amount of work by adding resources to the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

evanescent

A

lasting for only a short time, then disappearing quickly and being forgotten

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

vestige

A

(1) a trace, mark, or visible sign left by something (such as an ancient city or a condition or practice) vanished or lost
(2) the smallest quantity or trace
(3) a bodily part or organ that is small and degenerate or imperfectly developed in comparison to one more fully developed in an earlier stage of the individual, in a past generation, or in closely related forms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

sanction policy

A

a document that details how a hospital will apply appropriate sanctions against workforce members who fail to comply with the security policies and procedures of the covered entity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

implementation specification

A

Specific requirements or instructions for implementing a standard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

workforce clearance procedures

A

procedures to determine that the access of a workforce member to PHI is appropriate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

corroboration (verb: corroborate)

A

evidence which confirms or supports a statement, theory, or finding; confirmation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

vector

A

(1) an organism (such as an insect) that transmits a pathogen from one organism or source to another
(2) an agent (such as a plasmid or virus) that contains or carries modified genetic material (such as recombinant DNA) and can be used to introduce exogenous (outside) genes into the genome of an organism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

illicit

A

not permitted: UNLAWFUL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

red flag

A

a pattern, practice, or specific activity that could indicate identity theft or some other danger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Red Flags Rule

A

an FTC rule that requires organizations to implement a written identity theft prevention program to help them identify any of the relevant “red flags” that indicate identity theft in daily operations. The Rule also offers steps to help prevent the crime and to mitigate its damage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Federal Trade Commission (FTC)

A

an independent agency of the United States government whose principal mission is the enforcement of civil (non-criminal) U.S. antitrust law and the promotion of consumer protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Explanation of Benefits (EOB)

A

A statement from your health insurance company providing details on payment for a medical service you received. It explains what portion of services were paid by your insurance plan and what part you’re responsible for paying.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

entity authentication

A

the process by which one entity (the verifier) is assured of the identity of a second entity (the claimant) that is participating in a protocol

17
Q

protocol

A

(1) an original draft, minute, or record of a document, transaction, or social gathering
(2) a code prescribing strict adherence to correct etiquette and precedence (as in diplomatic exchange and in the military services)
(3) a set of conventions governing the treatment and especially the formatting of data in an electronic communications system
(4) a detailed plan of a scientific or medical experiment, treatment, or procedure

18
Q

segue (verb)

A

to make a transition without interruption from one activity, topic, scene, or part to another

19
Q

bearing(s) (location)

A

comprehension of one’s position, environment, or situation

20
Q

pretty good privacy (PGP)

A

An encryption program that provides cryptographic privacy and authentication for data communication. It was developed by Phil Zimmermann in 1991.

21
Q

wired equivalent privacy

A

a security algorithm that protects information on wireless networks

22
Q

plaintext

A

data before any encryption has taken place

23
Q

encryption algorithm

A

a computer program that converts plaintext into an enciphered form

24
Q

ciphertext

A

data after the encryption algorithm has been applied; the encryption conceals the data’s original meaning and keeps it from being known or used

25
Q

token (computers)

A

devices, such as key cards, that are inserted into doors or computers

26
Q

public key infrastructure (PKI)

A

a set of roles, policies, hardware, software and procedures needed to create, manage, distribute, use, store and revoke digital certificates and manage public-key encryption

27
Q

digital certificate

A

A file or electronic password that proves the authenticity of a device, server, or user through the use of cryptography and the public key infrastructure (PKI). Digital certificate authentication helps organizations ensure that only trusted devices and users can connect to their networks.

28
Q

facsimile

A

(1) an exact copy, especially of written or printed material
(2) a system of transmitting and reproducing graphic matter (such as printing or still pictures) by means of signals sent over telephone lines

29
Q

blind carbon copy (BCC)

A

a method that allows a sender of an e-mail to send an e-mail to multiple people without those people knowing the other co-recipients of the e-mail

30
Q

carbon copy

A

a method that allows a sender of an e-mail to send an e-mail to multiple people; however, all recipients of the e-mail will be able to see all the other recipients