Confedintiality And Privacy Flashcards
Pateint confedintiality is important especially with information pertaining to disease __________________
Sexual, psychology and drug alcohol disease
_______, _______and________are supported the consenpt of protected health information PHI available data in EHR
CMS, HHS, HIPPA
HIPPA, HHS, CFR
CFR, OIG, HIPPA
HIPPA, CFR, HHS
HIPPAA is stand for __________
Health insurance and portability and accountability act
Under _________privacy rule pateints have right to protect their information, right to access their own records
HIPPAA
___________is governmental body that responsible for the inforcment of the privacy rule
THE office of civil rights
OCR
The office of civil rights works with ______to investigate the breach of confidential that leads to criminal cases
DOJ
department of Justice
Healthcare provider, Healthcare plans and health care clearinghouse that comply with HIPPAA regulations means
Covered entities
The second name of HIPPAA is ________
Privacy rule
Training the health care provider regarding the privacy is considered optional
True
False
False
Displenary action up to violate employee termination may be an appropriate course of action
True
False
True
If the manager is the privacy violater, ________&, _________should be notified through compliance hotline
Corporate Compliance officer
Privacy officer
Compliance of HIPPAA regulation means the covered entities have taken ________to protect the privacy and confedintiality of pateint health information
Measures
How many days required to file the complaint of privacy violation if occurred in office for civil rights OCR?
60 days
90 days
180 days
180 days
Facility access control to safe the IT area and pateint information consider _______ safeguard
Technical safeguard
Physical safeguard
Physical safeguard
Individual authentication ensure person needing access is valid requester, this consenpt is _____-
Technical safeguard
Physical safeguard
Technical safeguard
Targeted emails aimed at stealing information, like request money or request personal information__________
Phishing email
Lock accounts with more 3 unsuccessful attempts to ensure __________PHI
Privacy
Security
Security
The amount of pateint information that is released or access only when there is a legitimate need to know. Called _______
Minimum necessary
It is important for health employees to understand that accessing their own health information is prohibited.
TRUE
FALSE
True
When a patient request his/her health information to himself or third party, __________ is required
Written authorization
Once the health information is released, the releasing healthcare entities has no control over what happen to the information from the point forward
True
False
True
The court and subpoena order health information record, HIM manager has to obeyed.
TRUE
FALSE
True
________Security methods that applies mathematical algorithms that scramble the data into format that cannot be deciphered by people or comprtrized system.
ENCRYPTION
Method aimed to protect information that collected and maintained in the culture of information technology from cyber criminal.
By focus on preventing information theft or attackt
Cybersecurity
Medical record ownership in HIM perspective is __________
The ownership is the provider who maintain it and the pateint go through chaneels to request it
Healthcare record retention should be schefualed and planned by _______
HIM manager
HIM officer
HIM clerk
HIM MANAGER
Retention of Healthcare information and medical records is regulated by various external agencies \_\_\_\_\_\_\_\_\_ \_\_\_\_\_\_\_\_\_ \_\_\_\_\_\_\_\_\_ \_\_\_\_\_\_\_\_\_
Condition of participation
AHIMA
JCI
Federal register
Health information that still being consult on regular basis.
Active
Health information that is rarely accessed
Inactive
Between regulatory agencies to regulate the retention of records and information, health entity should follow the guidance that more restrictive.
True
False
True
Compilation of individually identifiable data as well as the documentation of services that rendered from Healthcare provider that submitted to court as evidence
Legal record
What sort of health information documents that never destroyed and should be maintained for ever?
Birth certificate
Death certificate
Destruction of health information would be applicable on ________records only, and should be kept for a period between ___to_____ years.
Inactive records
5_10 years
Electronic health Record must be _______instead of destroyed.
Archive
What is 4 parts of record life cycle :
______
______
______
_______
Creation
Utelization
Maintains
Destruction
Healthcare cybersecurity threats take many forms :
_______
_______
_______
_______
Phishing email
Virus
Malware
Ransomware