Describe Legal and Ethical Implications Flashcards
Define policies
written documents that reflect the values of administrators of organizations
Define policy entrepreneur
a person who commits interest, time, and money to moving a proposal forward
What kind of conditions are on a DO-NOT-Pay list
hospital-acquired conditions-present upon admission (HAC-POA)- stage III and IV pressure ulcers, falls and trauma, CAUTI, vascular-catheter associated infection, surgical-site infection, and DVT
What is the purpose of HIPAA?
developed to protect the privacy and security of designated health information
What is the purpose of Medicaid?
administered by states, according to federal requirements to give health coverage to millions of Americans including low-income adults, children, pregnant women, the elderly, and those living with a disability
What three common policies, laws, or regulations affect health information technology?
ARRA, 21st Century CURES Act, and FDASIA (food and drug administration safety and innovation act)
What is the purpose of the 21st Century CURES Act?
help accelerate medical product development and bring new innovations and advances to patients who need them faster and more efficiently. It also requires patient electronic health information to be made available to patients without delay and at no cost.
What is the purpose of the FDASIA?
improved the FDA’s ability to speed pt access to digital records and improve the safety of drugs, medical devices, and biological products
Define privacy
the right to determine what information is collected or shared, how it is used, and the ability to access collected personal information to review its security and accuracy
Examples of personal information
name, address, phone number, an email address, and possibly, photos, videos, and workplace name, as well as opinions and preferences
Defiine confidentiality
a situation in which a relationship has been established and private information is shared but not disclosed
What is the Internet of things (IoT)?
refers to devices that have embedded microchips, sensors, and actuators that use internet protocol to share data with other machines or software over communications networks
Computer tips to avoid malicious programs
- only use licensed software
- run the latest version of virus-detection software routinely. Upload updates on a regular basis
- use an internet firewall
- never open any file attachment from an unfamiliar source
- use designated machines to check portable drives, storage media, and software for viruses before use
- Retain backup copies of original software, work files, and directory structure for each PC
- keep a record of all installation information
- keep a list of vendors, purchase dates, and serial numbers for all hardware and software items
- if a virus is found, send a copy to an expert for tracking purposes
- watch for and download software patches that eliminate security probs
- ensure that system safeguards have been put into place by IT staff
- stay informed of potential threats
In what ways can passwords be compromised?
- writing them down or sharing them with friends and coworkers
- passwords can be guessed
- passwords can be transmitted over a network
- passwords can be stored on a workstation, server, or backup media, in plain text or encoded in a way that can be readily converted back to plaintext
define spyware
a data-collection mechanism that installs itself without the user’s permission. Can include cookies that track web use, as well as applications that capture credit card, bank, and PIN numbers