Chapter 8 Flashcards
Privacy
Freedom from unauthorized intrusion
Health Insurance and Accountability Act (HIPPA)
A fedral law passed in 1996 to protect privacy and other health care rights for patients. The acts helps workers keep continous health insurance coverage for themselves and their dependents when they change jobs, and protect confidential medical information from unathorized disclosure and or use. It was also intended to help curb the rising cost of health care fraud and abuse.
Covered entitites
Health care providers and clearing- houses that transmit HIPAA transactions electronically. and must comply with HIPAA standards and rule.
Covered Transactions
Electonic exchanges of information between two covered entity business partners using HIPAA mandated transactions standards
Designated record set
Records Maintained by or for a HIPAA covered entity
Notice of Privacy Practices NPP
A written document detailing a health care providers privacy practices
Protected health Information PHI
Information that contains one or more patient identifiers
de-identity
To remove from health care transactions all information that identify the patients
State Preemption
If a states privacy laws are stricters than HIPAA privacy standards, the state laws take precedence
Treatment, Payment, and health care operations TPO
A HIPAA term for qualified providers, disclosure of PHI to obatin reimbursement, and activities and transactions among entities. Treatment means that a health care provider can provide care: payment means that the provder can disclose PHI to be reimbursed: health care operations refers to HIPAA approved activities and transactions.
Standards
A general requirement under HIPAA
Rule
A document that includes HIPAA standards or requirements
Transactions
Transmission of information between two parties for financial or administrative activities.
Code set
Under HIPAA terms that provide for uniformity and simplification of health care billing and record keeping.
Electronic Transmission
The sending information from one network connected computer to another
Electronic data interchange EDI
The use of uniform electronic network protocols to transfer business information between organizations via computer networks
Permission
A reason under HIPAA for disclosing patient information
Limited data set
Protected health information from which certain patient identifiers have been remnoved
Security
Policies and procedures that protect PHI from unauthorized access
Firewalls
Hardware software, or both designed to prevent unauthorized persons from accessing electronic information
Encryption
The scrambling or encoding of information before sending it electronically
Verification
The requirement under HIPAA to verify any request as legitimate before protected health information is released
Minimum necessary
Terms referring to the limited amount of patient information that may be disclosed, depending on circumstances
Third
The right to privacy is expressed in amendments to the United States Constitution. Which of the following is one of the amendments that deals with privacy issues?