Describe Legal and Ethical Implications Flashcards

1
Q

Define policies

A

written documents that reflect the values of administrators of organizations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define policy entrepreneur

A

a person who commits interest, time, and money to moving a proposal forward

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What kind of conditions are on a DO-NOT-Pay list

A

hospital-acquired conditions-present upon admission (HAC-POA)- stage III and IV pressure ulcers, falls and trauma, CAUTI, vascular-catheter associated infection, surgical-site infection, and DVT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the purpose of HIPAA?

A

developed to protect the privacy and security of designated health information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the purpose of Medicaid?

A

administered by states, according to federal requirements to give health coverage to millions of Americans including low-income adults, children, pregnant women, the elderly, and those living with a disability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What three common policies, laws, or regulations affect health information technology?

A

ARRA, 21st Century CURES Act, and FDASIA (food and drug administration safety and innovation act)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the purpose of the 21st Century CURES Act?

A

help accelerate medical product development and bring new innovations and advances to patients who need them faster and more efficiently. It also requires patient electronic health information to be made available to patients without delay and at no cost.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the purpose of the FDASIA?

A

improved the FDA’s ability to speed pt access to digital records and improve the safety of drugs, medical devices, and biological products

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define privacy

A

the right to determine what information is collected or shared, how it is used, and the ability to access collected personal information to review its security and accuracy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Examples of personal information

A

name, address, phone number, an email address, and possibly, photos, videos, and workplace name, as well as opinions and preferences

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Defiine confidentiality

A

a situation in which a relationship has been established and private information is shared but not disclosed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the Internet of things (IoT)?

A

refers to devices that have embedded microchips, sensors, and actuators that use internet protocol to share data with other machines or software over communications networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Computer tips to avoid malicious programs

A
  1. only use licensed software
  2. run the latest version of virus-detection software routinely. Upload updates on a regular basis
  3. use an internet firewall
  4. never open any file attachment from an unfamiliar source
  5. use designated machines to check portable drives, storage media, and software for viruses before use
  6. Retain backup copies of original software, work files, and directory structure for each PC
  7. keep a record of all installation information
  8. keep a list of vendors, purchase dates, and serial numbers for all hardware and software items
  9. if a virus is found, send a copy to an expert for tracking purposes
  10. watch for and download software patches that eliminate security probs
  11. ensure that system safeguards have been put into place by IT staff
  12. stay informed of potential threats
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In what ways can passwords be compromised?

A
  1. writing them down or sharing them with friends and coworkers
  2. passwords can be guessed
  3. passwords can be transmitted over a network
  4. passwords can be stored on a workstation, server, or backup media, in plain text or encoded in a way that can be readily converted back to plaintext
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

define spyware

A

a data-collection mechanism that installs itself without the user’s permission. Can include cookies that track web use, as well as applications that capture credit card, bank, and PIN numbers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly