Confedintiality And Privacy Flashcards

1
Q

Pateint confedintiality is important especially with information pertaining to disease __________________

A

Sexual, psychology and drug alcohol disease

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

_______, _______and________are supported the consenpt of protected health information PHI available data in EHR

CMS, HHS, HIPPA
HIPPA, HHS, CFR
CFR, OIG, HIPPA

A

HIPPA, CFR, HHS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

HIPPAA is stand for __________

A

Health insurance and portability and accountability act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Under _________privacy rule pateints have right to protect their information, right to access their own records

A

HIPPAA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

___________is governmental body that responsible for the inforcment of the privacy rule

A

THE office of civil rights

OCR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The office of civil rights works with ______to investigate the breach of confidential that leads to criminal cases

A

DOJ

department of Justice

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Healthcare provider, Healthcare plans and health care clearinghouse that comply with HIPPAA regulations means

A

Covered entities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The second name of HIPPAA is ________

A

Privacy rule

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Training the health care provider regarding the privacy is considered optional

True
False

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Displenary action up to violate employee termination may be an appropriate course of action

True
False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

If the manager is the privacy violater, ________&, _________should be notified through compliance hotline

A

Corporate Compliance officer

Privacy officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Compliance of HIPPAA regulation means the covered entities have taken ________to protect the privacy and confedintiality of pateint health information

A

Measures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How many days required to file the complaint of privacy violation if occurred in office for civil rights OCR?

60 days
90 days
180 days

A

180 days

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Facility access control to safe the IT area and pateint information consider _______ safeguard

Technical safeguard
Physical safeguard

A

Physical safeguard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Individual authentication ensure person needing access is valid requester, this consenpt is _____-

Technical safeguard
Physical safeguard

A

Technical safeguard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Targeted emails aimed at stealing information, like request money or request personal information__________

A

Phishing email

17
Q

Lock accounts with more 3 unsuccessful attempts to ensure __________PHI

Privacy
Security

A

Security

18
Q

The amount of pateint information that is released or access only when there is a legitimate need to know. Called _______

A

Minimum necessary

19
Q

It is important for health employees to understand that accessing their own health information is prohibited.

TRUE
FALSE

A

True

20
Q

When a patient request his/her health information to himself or third party, __________ is required

A

Written authorization

21
Q

Once the health information is released, the releasing healthcare entities has no control over what happen to the information from the point forward

True
False

A

True

22
Q

The court and subpoena order health information record, HIM manager has to obeyed.

TRUE
FALSE

A

True

23
Q

________Security methods that applies mathematical algorithms that scramble the data into format that cannot be deciphered by people or comprtrized system.

A

ENCRYPTION

24
Q

Method aimed to protect information that collected and maintained in the culture of information technology from cyber criminal.
By focus on preventing information theft or attackt

A

Cybersecurity

25
Q

Medical record ownership in HIM perspective is __________

A

The ownership is the provider who maintain it and the pateint go through chaneels to request it

26
Q

Healthcare record retention should be schefualed and planned by _______

HIM manager
HIM officer
HIM clerk

A

HIM MANAGER

27
Q
Retention of Healthcare information and medical records is regulated by various external agencies
\_\_\_\_\_\_\_\_\_
\_\_\_\_\_\_\_\_\_
\_\_\_\_\_\_\_\_\_
\_\_\_\_\_\_\_\_\_
A

Condition of participation
AHIMA
JCI
Federal register

28
Q

Health information that still being consult on regular basis.

A

Active

29
Q

Health information that is rarely accessed

A

Inactive

30
Q

Between regulatory agencies to regulate the retention of records and information, health entity should follow the guidance that more restrictive.

True
False

A

True

31
Q

Compilation of individually identifiable data as well as the documentation of services that rendered from Healthcare provider that submitted to court as evidence

A

Legal record

32
Q

What sort of health information documents that never destroyed and should be maintained for ever?

A

Birth certificate

Death certificate

33
Q

Destruction of health information would be applicable on ________records only, and should be kept for a period between ___to_____ years.

A

Inactive records

5_10 years

34
Q

Electronic health Record must be _______instead of destroyed.

A

Archive

35
Q

What is 4 parts of record life cycle :

______
______
______
_______

A

Creation
Utelization
Maintains
Destruction

36
Q

Healthcare cybersecurity threats take many forms :

_______
_______
_______
_______

A

Phishing email
Virus
Malware
Ransomware