Health Info Mgmt Strategies Flashcards

1
Q

What is a proactive measure that will be taken by IT if there is a system outage/downtime?

A

They will Access back-up servers to capture historical data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

During system downtime, what form is used for billing?

A

Charge Slip

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is an Edit Check?

A

Edit checks are basically electronic flags that will pop up if the data entered is not within the range of what is pre-programmed. For example, entering a patient temp of 300 degrees, would cause an edit to pop up.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define Data Quality

A

Steps taken to ensure the usability of data, for example, required fields, edit checks, field types

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define Data Integrity

A

A step beyond quality that ensures data is complete, accurate, consistent, and timely (requires validation).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a data dictionary and what aspect of data mgmt does it improve?

A

A descriptive list of the names, definitions, and attributes of data elements to improve data quality by ensuring standarization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

If a HCO was considering implementing a new EMR what would be a good way to ensure no data is lost during the go-live downtime?

A

Save information on a stand-alone computer that is not part of the project

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define Risk Analysis

A

The process of identifying possible security threats to the CE’s data and addressing each in order of priority.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

If an HCO had a security breach, what is one process that could be implemented/refined to ensure it does not happen again.

A

Risk Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define Sanction Policy

A

A policy that addresses how employees will be penalized for failing to follow security policies and procedures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the function of system evaluations?

A

At the end phase of a project, system evaluation is used to determines whether or not the IS functions as expected aka testing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define Identity Matching

A

The process in which the HIO identifies the right person within the database to exchange information between healthcare organizations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Explain what a Contingency Plan is as it relates to Health Info Mgmt

A

Policies and procedures that identify how a HCO will react in the event of an IS emergency (power failure, natural disaster, hacker, malware) HIPAA calls this an emergency mode operation plan.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a CDM used for?

A

A Charge Description Master contains info about all the charges applied for services rendered and automates the coding process for routine procedures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is single-sign on access?

A

The user logs in one time and is then able to move from one application to another without entering another password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define user-based authentication

A

Access provided after evaluating the individual needs of the user. This is the most time consuming, and typically used for contract positions or third party people who need temp. access.

17
Q

Define role-based authentication

A

Access provided after evaluating the role of the user. This is the most time consuming.

18
Q

Define context-based authentication

A

an access control system that limits users to accessing info not only in accordance with their identity and role, but to the location and time in which they are accessing the information. This is helpful when there are employees, such as nurses, who work in various units or have different roles at different times.

19
Q

What is meant by “Break the Glass” procedure/access?

A

Emergency access granted to a user who would NOT normally have those permissions, in the case of a medical emergency such as a patient “crashing.”

20
Q
A