Ethics Flashcards

1
Q

What is HIPPA

A

HIPPA is the federal Health Insurance Portability and Accountability Act of 1996

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are goals of HIPPA?

A

increase efficiency (standardized format for electronic data). Improved privacy. Better security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

To whom does HIPPA apply?

A

The HIPPA provisions apply to anyone who provides health care and does electronic transmission of health care info.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the key areas of compliance and dates of implementation regarding HIPPA?

A

transactions (billing operations like faxing and facismile), privacy (individually identifiable health care info like date of birth), security (the security rule is intended to provide for the security of confidential electronic patient info), National provider identification, “red flag” rule (helps prevent identity theft).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

All transaction/electronic billing must follow what federal guidelines?

A

HIPPA compliant software, and have a business associates agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what are key elements to keep your records private as a clinician?

A

privacy notice forms, patient authorization forms, policy and procedure guidelines (aka disclosure statement), business associate agreements, privacy officer, privacy compliance plan, grievance process, employee training, posted privacy notification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

key elements of compliance regarding privacy of records?

A

stronger state laws and stronger ethical codes may supersede HIPAA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Privacy of records and consent with HIPAA

A

obtain consent to freely share needed info with all involved in the provision of health care services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What’s TPO?

A

treatment, payment and health care operations. this allows for open exchange of the info among treatment providers and related parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does consent allow?

A

allows for open exchange of the following info among treatment providers and and related parties; rx monitoring (medical prescriptions), start/stop times, type of therapy, frequency # of sessions, results of clinical tests, summary of Dx, functional status, treatment plans, symptoms, prognosis and progress to date.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How long is consent good for?

A

in general its good for up to 6 years unless revoked in writing. records must be kept for 6 years. in OR they must be kept for 7.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is record amendment and how does it work?

A

provision must be made for pts to amend the record in those instances where they believe the record is in error or incomplete. this provision allows the pt to give their view of any perceived factual errors while preserving the original record.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How do you obtain authorization to share info with anyone outside of the TPO?

A

To be valid, an authorization must include; the name/identification of the person making the disclosure, the name or title of the person or organization to which the disclosure is to be made, the name of the patient, the specific type of info to be released, the specific purpose of the disclosure, a statement that the authorization to disclose is subject to revocation at any time except to the extent that the program or person has already acted in reliance on the authorization to disclose, the signature of the person legally authorized to give consent with any supporting documentation, current date with signature, specific date or occasion on which the authorization expires.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How to you keep records of authorization?

A

with an information log, and it must record disclosures based on authorizations who, what, purpose, date. You must retain the log for 6 years.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

legally and ethically, psychologists can generally release private info about pts outside of the TPO if….

A

authorized, legally compelled, to obtain essential emergency services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

HIPAA compliance privacy of records applies to….

A

all personal health information

17
Q

HIPAA compliance security applies to….

A

electronically stored transmitted information

18
Q

HIPAA compliance security steps include…

A

security offer, security plan, and security of documentation

19
Q

what is “risk analysis” in regards to HIPAA security compliance?

A

identifies potential security threats and vulnerabilities such as floods, computer viruses, breaks ins, thefts, etc…the risk analysis should be documented. safe guards implemented and documented, and policy and procedures amended to reflect these changes.

20
Q

Are all HIPAA compliance security implementation mandatory?

A

some implementation specifications are REQUIRED of all practitioners.

21
Q

What are “addressable” implementations?

A

this means that they may be implemented, adapted, or omitted provided an appropriate rationale is developed and documented.

22
Q

when are “business associate contracts” required?

A

they are required to insure that business partners comply with security rules. conversely, if you have no employees, it is not necessary to train staff in security requirements.

23
Q

what is “scalability”

A

a provision that as size and complexity of the organization increases the standard has wider implications.

24
Q

what are “administrative standards?”

A

they involve policies and procedures, staff training, and and other strategies to carry out security policies.

25
Q

what are “physical standards?”

A

they involve such steps as limiting access to areas where electronic health info is stored.