EO 001.03 - CFHIS Flashcards
Describe CFHS compliance with federal privacy legislation and policies
Describe CFHS confidentiality rules
Describe compliance with federal and DND physical and electronic security policies
Describe rules for CFHIS access
What is the purpose of audit logs
The purpose of audit logs is for system administration, maintenance, security, and to ensure compliance with Treasury Board Secretariat, DND/CAF orders, policies, instructions, directives and standards
Describe investigation processes and infraction penalties
Infraction penalties can include temporary suspension, revocation, or permanent termination
Define Security techniques
Security techniques refers to the procedures and tools we use to protect information entrusted to us
What are the three types of security levels?
- Public (Unclassified)
- Classified (Confidential, Secret, or Top Secret)
- Designated (PROTECTED A, B, C)
Define the Need-To-Know principle
Only persons who have a requirement to perform their official duties shall access PHI
Define Disclosure
The release or transfer of personal information by any to any body or person
What are three rules that must comply with “PROTECTED B” information?
- Clearly label (on every header, footer, and envelope side)
- Destroy in approved shredders/burn bags
- Encrypt when electronically stored or sent
Define Personal Information
Information about an identifiable individual
(i.e. race, national/ethnic origin, religion, educational/medical history, identifying numbers/symbols)
Define Personal Health Information (PHI)
Personal information that relates to an individual’s diagnostic, treatment, or care information
(i.e. medical/dental/psychosocial information collected during care
What type of information is NOT applicable to PHI?
- A CAF member’s medical employment limitations
- Anticipated absences from the workplace
- Prognosis
- General severity of an acute health condition
True or false, all CAF health records are property of the crown
True