HCISPP 2 Flashcards
Refers to preventing the disclosure of information to unauthorized individuals or systems. Necessary for maintaining the privacy of the people whose personal information is held in the system.
Confidentiality
Two types: 1) the person whom the actual data pertains, i.e. the patient receiving the treatment. this is the individual who has the final determination for how the data is used and by whom the data can be used or disclosed. 2) the healthcare organization who provides the treatment services for the patient and captures information during treatment services.
Data Owners
the principle that states that should be limits to the collection of personal data and any such data should be obtained by lawful and fair means and., where appropriate, with the knowledge or consent of the data subject.
Collection Limitation Principle
a security principle stating that a user should have access only to the data he or she needs to perform a particular function.
Need to know
Assets with a physical presence
Tangible Assets
(CPT) codes are published by the American Medical Association. It is a five (5) digit numeric code that is used to describe medical, surgical, laboratory, anesthesiology, and evaluation management services of physicians, hospitals, and other healthcare providers. There are approximately 7800. Two digit modifiers may be appended when appropriate to clarify or modify the description of the procedure.
Current Procedural Terminology
HSM is one type of DLM product. It represents different types of storage media, such as redundant array of independent disk (RAID) systems, optical storage, or tape, each type representing a different level of cost and speed of retrieval when access is needed. An administrator can establish state guidelines for how often different kinds of files are to be copied to a backup storage device. Once a guideline has been set, the software manages everything automatically.
Hierarchal Storage Management
the principle that states that personal data should not be disclosed, made, available, or otherwise used for purposes other than those specified in accordance with the purpose specification principle
use limitation principle
the appropriate risk response for that portion of risk that cannot be accepted, avoided, shared, or transferred
risk mitigation
controls that capture things such as who is responsible for information security at the third party, what types of processes the third party has in place to request access to data, and also would include ensuring that the third party has appropriate security policies, procedures, and standards
Administrative Controls
the principle that states that a data controller should be accountable for complying with measures
Accountability principle
the world’s largest standards organization, with more than 30 standards addressing information security practices and audit, and each of the standards is constantly reviewed and updated, which requires consistent attention for keeping up with the latest standard changes.
ISO
Part of the US Department of Commerce and addresses the measurement infrastructure within science and technology efforts within the US federal Govt
NIST
Govt Funded health care: a program funded by the US federal and state govts that pays the medical expenses of people who are unable to pay some or all of their own medical expenses.
Medicaid
the uninvolved vendors, business partners, or other data sharing associates. The first party is the patient himself/herself or the person, such as the parent, responsible for the patient’s health bill. The second party is the physician, clinic, hospital, nursing home, or other health care entity rendering the care. These second parties are often called providers because they provide health care.
Third Parties
the activities undertaken by either a health plan to obtain premiums or to determine or fulfill its responsibility for coverage and provision of benefits under the health plan; or a covered healthcare provider or health plan to obtain or provide reimbursement for the provision of healthcare.
Payment
a plan that takes the output of the risk assessment and identifies tasks needing to be accomplished to mitigate
corrective action plan
controls that encompass areas such as facility access, fire protection, and visitor procedures
Physical controls
determines what protections need to be in place to guard data based on its sensitivity and value as well as the risk of exposure
security
How the organizational representatives identify the most critical data to be given the highest protection
Data Categorization
systems that assign a distinct numeric value to medical diagnosis, procedures and surgery, signs and symptoms of disease and ill-defined conditions, poisoning, adverse effects of drugs, complications of surgery, and medical care. The assigned codes and other patient data are processed by the grouper software to determine a DRG for the episode of care which is used for funding and reimbursement.
Medical Coding
Very similar to the BAA in which the recipient of the data set would agree to limit the use of the data for the purposes for which it was given to ensure the security of the data and not to identify the information or use it to contact any individual.
Data Use Agreement
Includes the technologies, tools, and methods used to capture, manage, store, preserve, and deliver content across an enterprise.
Enterprise Content Management
the primary liaison for the CIO to the organizations authorizing officials, information system owners, common control providers, and information system security officers.
Senior Information Security Officer
a unit of the US Department of Labor and addresses safety and protection of workers in organizations that involve hazards and hazardous wastes as potential sources of injuries and health related problems
Occupational Safety and Health Administration
an organizational official responsible for designating a senior information security officer and developing and maintaining information security policies, procedures, and control techniques to address all applicable requirements
chief information officer
is an initiative by health care professionals and industry to improve the way computer systems in health care share information. IHE promotes the coordinated use of established standards such as DICOM and HL7 to address specific clinical needs in support of optimal patient care. Systems developed in accordance with IHE communicate with one another better, are easier to implement, and enable care providers to use information more effectively.
Integrating the Healthcare Enterprise
generated at various points in the records management lifecycle, providing underlying data to describe the document, specify access controls and rights, provide retention and disposition instructions, and maintain the record history and audit trail.
Metadata
Means the provision coordination or management of healthcare and related services by one or more healthcare providers, including the coordination or management of healthcare and by a healthcare provider with a third party; consultation between healthcare providers relating to a patient; or the referral of a patient for healthcare from one provider to another.
Treatment
Create a feedback loop to measure whether the security strategy and program are on target or need refinement
Key Performance Indicators
controls that deter, detect, and or reduce impacts to the system
Preventative controls
States that an individual should have the right: • To obtain from a data controller, or otherwise, confirmation of whether the data controller has data relating to him • To have communicated to him, data relating to him within a reasonable time; at a charge, if any, that is not excessive; in a reasonable manner, and in a form that is readily intelligible to him • To be given reasons if a request made under subparagraph (a) and (b) is denied, and to be able to challenge such denial • To challenge data relating to him and, if the challenge is successful to have the data erased, rectified, completed, or amended.
Individual Participation Principle
the data collected about a specific person potentially across a number of treatment services from a number of healthcare organizations
Health Information
The activities that identify and locate the stores of organizational data on networked devices, including servers and workstations
Data Discovery
the technology, policy, and procedures for its use that safeguard electronic protected health information and control access to ePHI.
Technical Safeguards
A basis for obtaining federal stores of information that are seen as publicly accessible, and is frequently used by private citizens for political or legal issues
Freedom of Information Act
Is necessary to obtain a true understanding of the health care organization. Can occur at the individual level, the household level, the business or corporate level, the supplier level, or some other combination of attributes. Requires powerful matching technology that can locate less obvious members of a related group.
Data Integration
The HIPAA regulations adopted certain standard transactions for EDI of healthcare data. These transactions are: claims and encounter information, payment and remittance advice, claims status, eligibility, enrollment, and disenrollment, referrals and authorizations, coordination of benefits, and premium payment.
Electronic data Interchange
the current state after applying a risk response strategies
residual risk
refers to a hierarchical system. comprises vocabulary and terms; in turn, vocabulary is made up of terms, or names, at the most basic level. The major advantage is simplicity; if there is one, then there is the assumption that everyone is or will be made aware of it, understands the vocabulary and classifications, accepts it, and utilizes the known.
Taxonomy
Any proposal relating to human subjects including healthy volunteers that cannot be considered as an element of accepted clinical management or public health practice and that involves either physical or psychological intervention or observation, or the collection, storage, and dissemination of information relation to individuals. This definition relates not only to planned trials involving human subjects but to researching which environmental factors are manipulated in a way that could incidentally expose individuals to undue risks
Human Research
Eliminates barriers to data sharing by providing direct data access; data translation tools; and the ability to build complex spatial extraction, transformation and loading processes. Standardize data messaging facilitates __________ between health information systems regardless of database models employed by individual health care enterprises. There are three levels: Foundational, Structural, and Semantic.
Data Interoperability
A vendor, as a recipient of PHI from healthcare organizations. As defined in HIPAA and regulations promulgated by the US Department of health and human services (DHHS) to implement certain provisions. All must agree in writing to certain mandatory provisions regarding, among other things, the use and disclosure of PHI.
Business Partners
the set of activities that ensures data is not lost from an organization
Data Loss prevention
A public or private entity that processes or facilitates the processing of non standard data elements of health information into standard data elements. The entity receives healthcare transactions from healthcare providers or other entities, translates the data from a given format into one acceptable to the intended payer or payers, and forwards the processed transaction to appropriate payers
Healthcare Clearinghouse
Once records are created, they must be maintained in such a way that they are accessible and retrievable. Components of this phase include functions, rules, and protocols for indexing, searching, retrieving, processing, routing, and distributing.
Record Maintenance and Use
an individual, group or organization responsible for conducting information system security engineering activities.
Information System Security Engineer
(DICOM) the international standard for medical images and related information. It defines the formats for medical images that can be exchanged with the data and quality necessary for clinical use. Implemented in almost every radiology, imaging, and radiotherapy device, and increasingly in devices in other medical domains such as ophthalmology and dentistry. With thousands of imaging devices in use, it is one of the most widely deployed healthcare messaging standards in the world
Digital Imaging and Communications in Medicine
Provide the capability to electronically move clinical information between disparate healthcare information systems while maintaining the meaning of the information being exchanged. HIEs also provide the infrastructure for secondary use of clinical data for purposes such as public health, clinical, biomedical, and consumer health informatics research as well as institution and provider quality assessment and improvement.
Health Information Exchange Organizations
Any organization or corporation that directly handles PHI or PHRs. They include public clinics, nursing homes, pharmacies, specialty hospitals, homecare programs, home meal programs, hospice, and durable medical equipment suppliers.
Covered Entity
the person who is the subject of the PHI
Individual
review plans for research involving human subjects. Institutions that accept research funding from the federal government must have an IRB to review all research involving human subjects. The FDA and the Office for Human Research Protections (OHRP) (part of the National Institutes of Health) set the guidelines and regulations governing human subject’s research and IRBs
Institutional Review Board
An organizational official that acts on behalf of an authorizing official to coordinate and conduct the required day to day activities associated with the security authorization process
Authorizing Official Designated representative
Health information that meets the standard and implementation specifications under 45 C.F.R. § 164.514 (a) and (b).
De- Identified Information
(BA) The privacy rule, allows covered providers and health plans to disclose protected health information to services of a variety of businesses that have access to their patients’ PHI. Such as billing services, attorneys, accountants and consultants.
Business Associates
means PHI that excludes the following direct identifiers of the individual or of relatives, employers, or household members of the individual
Limited data set
the appropriate risk response when organizations desire and have the means to shift risk liability and responsibility to other organizations
Risk sharing
physical measures, policies, and procedures to protect a covered entity’s electronic information systems and related buildings and equipment, from natural and environmental hazards and unauthorized intrusion.
Physical Safeguards
a governance structure where the authority, responsibility and decision-making power are vested solely within central bodies
centralized governance structure
Assets that are not physical
Intangible Assets
dictates what needs to be protected
Privacy
HITECH, ARRA, the privacy rule, the security rule, enforcement rule, and breach notification rule.
Health Insurance Portability and Accountability Act of 1996
the senior person in charge of managing the data systems used in capturing storing or analyzing the PHI of patients under care of the organization. They have the responsibility for maintaining the integrity of the data system and for authorizing access of internal and external workforce members to the data system and its included PHI
Data controller/manager
the channel through which information is transmitted. The main forms include auditory, visual and tactile.
Modality
typically employs a set of methods, principles, or rules for assessing risk based on non numerical categories or levels
Qualitative Assessment
Covers essential health benefits but has a very high deductible. This means it provides a kind of “safety net” coverage in case the patient has an accident or serious illness. Usually do not provide coverage for services such as prescription drugs or shots.
Catastrophic Health Insurance Plan
an effort led by CMS and the office of the National Coordinator for Health IT (ONC) is the set of standards defined by the CMS Incentive Programs that governs the use of electronic health records and allows eligible providers and hospitals to earn incentive payments by meeting specific criteria.
Meaningful Use
This phase includes creating, editing, and reviewing work in process as well as capture of content (e.g., through document imaging technology) or receipt of content (e.g., through a health information exchange). Every organization must establish business rules for determining when content or documents become records
Record Creation, Capture, or Receipt
the federal agency with HHS with oversight over HIPAA privacy, security and breach notification requirements, established a comprehensive audit protocol that physician practices may wish to consider as they review and update their HIPAA compliance plans. The OCR audit protocol contains 170 audit areas. The OCR HIPAA Audit program analyzes processes, controls, and policies of selected covered entities pursuant to the HITECH act audit mandate.
Office of Civil Rights
Assist in the organizational risk process by striving to identify and close as many vulnerabilities as possible
Information Security Professionals
a governance structure where the authority , responsibility, and decision making power are distributed between a central body and individual subordinate organizations
Hybrid information security governance structure
may be the appropriate risk response when the identified risk exceeds the organizational risk tolerance
Risk avoidance
A methodology where an organization manages and direction an information security risk evaluation for their organization
OCTAVE
in health care generally refers to entities other than the patient that finance or reimburse the cost of health services.
Payer
assessment focused on the technology aspects of an organization, such as the network or applications
Vulnerability assessments
HCPCS is used to report hospital outpatient procedures and physician services These coding systems serve an important function for physician reimbursement, hospital payments, quality review, benchmarking measurement, and the collection of general medical statistical data.
Healthcare common procedure coding system
an activity of a covered entity intended to raise funds to benefit the covered entity or an institutionally related foundation that has as its mission to benefit the covered entity
Fundraising
Use technology and human efforts to provide protection of and control access to the data and information that is considered private
Security Professionals
the process of determining the impact of the loss of confidentiality, integrity, or availability of the information to an organization
categorization
An employee welfare benefit plan, including insured and self insured plans, to the extent that the plan provides medical care, including items and services paid for as medical care, to employees or their dependents directly or through insurance reimbursement
Group Health Plan
The Trust Taxonomy provides a conceptual framework to facilitate governance of inter-entity exchange through transparency into trust policies and practices based on Identity, Policy and Contractual attributes. When utilizing the taxonomy, all trading partners would use a consistent approach to the classification of trust attribute definitions along with consistent representations as to how these trust attributes are implemented.
Governance Framework
means, with respect to individually identifiable health information, the sharing, employment, application, utilization, examination, or analysis of such information within an entity that maintains such information.
Use
(ARRA) was enacted on 02/17/09 and includes many measure to modernize our nations infrastructure, one of which is the “Health Information Technology for Economic and Clinical Health” (HITECH) The HITECH act supports the concept of Meaningful Use (MU) of Health Information Technology (IT) and healthcare reform to help the healthcare organizations to meet its clinical and business objectives vial HIE. MU requirements consist of payment approaches that stress care coordination, and federal financial incentives are driving the interest and demand for HIE
American Reinvestment and Recovery Act
The patient can go to the doctor of his/her choice, and the patient, the patients doctor, or the patients hospital submits a claim to the patients insurance company for reimbursement.
Indemnity Plan
the record life cycle from creation through final disposition.
Records Management Lifecycle
Establishes how connectivity will occur to and from the primary entity with the third party
Connection Agreement
The organization’s “health record” that meets all statutory, regulatory, and professional requirements for clinical purposes as well as for business purposes. If the record does not qualify as a legal record, it becomes hearsay and there fore is much less legally valid for business or for medical legal purposes. Unless the practice intends to maintain separate paper records that comply with legal requirements, its EHR, ,must conform to the same requirements as health records in general and for business records on computers more specifically.
Legal Medical Record
The principle that states that there should be a general policy of openness about developments, practices, and policies with respect to personal data. Means should be readily available of establishing the existence and nature of personal data, and the main purposes of their use, as well as the identity and usual residence of the data controller
Openness Principle
A technical basis for an international agreement among member countries The targets of the standards, and the methodology is how the standards are achieved, all according to the arrangement among the members
Common Criteria
predefined topical areas that can put an organization at risk
threats
NeHC has convened the national HIE governance forum at the office of the national coordinator for HITs request through ONCs cooperative agreement. One of the ONCs governance goals for nationwide HIE is to increase trust among all potential exchange participants in order to mobilize trusted exchange to support patient health and care.
National eHealth Collaborative
either 1) intent and method targeted at the intentional exploitation of a vulnerability or 2) a situation and method that may accidentally trigger a vulnerability
Threat source
incorporates risk management processes to ensure alignment of IT with business objectives, and a control framework
COBIT