HI Exam #3 Flashcards

1
Q

Health Insurance Portability and Accountability Act

A

What does HIPAA stand for?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. Who and what is covered by HIPAA law?
A

1.) Health coverage
2.) Fraud and Abuse
3.) Reduction of healthcare cost
4.) Administrative simplification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the 3 covered entities?

A

-Healthcare providers, Health Plan and the Healthcare clearing house

  • Healthcare providers who transmit health information electronically, health plans (insurance companies), and healthcare clearinghouses(data warehouse).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Who are considered workforces?

A

-Anyone who works with these covered entities
This includes:
-Employees
-Volunteers
-Trainees
-Others who conduct work for the CE or BA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Parties that perform functions or activities on behalf of or provide services to, covered entities (e.g., IT companies, billing services, consultants). This includes HIO’s E-Scribing or other people that provide data transmission.

A

Business associates(BA):

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a Business associate Agreement?

A

Is a contract between a covered entity and a business associate required by HIPAA.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Personal health information (PHI) related to an individual’s physical or mental health, healthcare services provided to them, and the payment for those services.

A

HIPAA protects:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

-Any health information that can identify an individual and relates to their past, present, or future physical or mental health or condition, healthcare provided, or payment for healthcare services.
-If you get a copy of your own record IT IS NO LONGER COVERED under HIPAA

A

What is a PHI?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How can access be denied of a PHI?

A

-When the patient has not consented to release their information.

-If access is requested by someone who does not have proper authorization.

-If the request is for records that are confidential or protected by privilege (e.g., psychotherapy notes).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Who can access PHI?

A

-A parent, guardian, or custodian of a minor patient under 18 years of age.
-A parent, guardian, or custodian of an incompetent patient.
-Legal healthcare representative.
-Power of attorney for healthcare.
-Personal representative or executor or administrator of a deceased patient’s estate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is De-Identification?

A

-The process of removing personal identifiers from health data so that the individual cannot be readily identified.
- Is useful in areas such as research, decision support, and education in health profession to support the secondary use of data for comparative effectiveness studies and other endeavors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Two methods of De-Identification?

A

-Expert Determination:
-Safe Harbor Method:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

-Expert Determination:

A

A qualified expert applies statistical or scientific methods to ensure that the risk of re-identifying individuals is very low.
-When you apply statistical/scientific principles there is a very small risk that the recipient could identify individual.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Measures to protect physical access to facilities and devices storing PHI (e.g., locked doors, surveillance, workstation security).

A

Physical Safeguards:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Physical Safeguards Standards

A

1.) Facility Access Control:
2.) Workstation Use:
3.) Device and Media Controls:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Safe Harbor Method:

A

-18 types of identifiers (e.g., name, address, phone number) are removed.
-There is no actual knowledge of residual information that can identify individuals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are other identifiers?

A

Names, Geographic, dates, Telephone numbers, Email address, social security number, URL’s, Dates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What happens when we get ready to Re-Identify the data?

A

There is a unique code assigned
-To the set of de-identified health information to permit re-identification by the CE. This code or other means of record identification can be used provided that the code is not derived from information about the individual and cannot be translated in some manner to identify the individual.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Purpose of de-identification:

A

To allow for data sharing, research, and analysis without compromising patient privacy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What data is considered PHI?

A

Any health data that includes identifiable personal information, such as:
-Name, address, birth date, Social Security number

-Health conditions, diagnoses, treatment information

-Payment information for healthcare services
IP Address, Health Care Plane Number

Examples: Patient medical records, billing information, lab results, prescriptions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is Personal Information?

A

-This would be your personnel records or educational records. Or any health information that is created or received by an entity that is not considered a covered entity or a BA

-An example would be: in your educational records you have information about a disability. This would not be covered. BECAUSE it is in your personal record.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Policies and procedures to manage the selection, development, and maintenance of security measures to protect PHI (e.g., security training, risk assessments, access control policies).

A

Administrative Safeguards:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Administrative Action Standards used to protect EPHI

A

1.) Security Management Process:
2.) Security Officer Official
3.) Workforce Security
4.) Information Access Management
5.) Security Awareness and Training
6.) Security Incident Procedure:
7.) Contingency Plan
8.) Evaluation
9.) Business Associate Contracts and Other Arrangements

24
Q

Measures to protect physical access to facilities and devices storing PHI (e.g., locked doors, surveillance, workstation security).

A

Physical Safeguards:

25
Q

Technology-based measures to protect electronic health information (e.g., encryption, firewalls, secure data transmission, user authentication).

A

Technical Safeguards

26
Q

5 Elements of Technical Safeguards:

A

1.) Access Control: Unique user ID (each person get a login)
2.) Audit Control
3.) Integrity
4.) Person or Entity Authtication
5.) Transmission Security

27
Q

Red flag/ Box Rules:

A

These are regulations designed to detect, prevent, and mitigate identity theft and fraud in healthcare.

-Purpose: The rules require covered entities to implement an identity theft prevention program that identifies and addresses (indicators of potential identity theft).

28
Q

Examples of Red Flags

A

Suspicious medical records, suspicious documents, suspicious behavior, inconsistent billing information, or unauthorized access to records.

29
Q

-This is the practice of collecting, keeping, and using data securely, efficiently, and effectively.
Its whole purpose is to make sure we are in control of our data.

A

What is Data Management?

30
Q

-The goal of it is to identify any gaps in the current recovery capability and to develop a strategy for meeting the identified RTO and RPO.
-A process to assess the impact of potential disruptions to business operations and determine recovery priorities.

A

Business Impact Analysis (BIA)

31
Q
  1. The Data Governance Process (First 2 steps) Hint:2 D’s
A

1.) Discover: Requires business user to be involved. Know where the data is stored and know the meaning of the data(what is the purpose).

2.) Design: Require a lot of involvement for clinicians.

32
Q

The maximum acceptable amount of data loss, measured in time.Represents the length of time that you can operate without a particular application.

A

RPO (Recovery Point Objective):

33
Q
  1. The Data Governance Process (Last 3 steps)
A

3.) Enable: Very time-consuming and is done by IT staff. Apply any new standards from the organizations. You go in after it \has been created to make sure all of the data is correct.

4.) Maintain: The monitoring and reporting system to make sure collect data is doing what we want. Regular updates and audits to maintain data quality and relevance.

5.) Archive/Retire: Data is thrown out/ no longer used. Ex: after 7 years the charts are now thrown out.

34
Q

The maximum acceptable downtime, or the time it takes to recover systems and resume operations after a disaster. The maximum amount of time tolerable for data loss and capture.

A

RTO (Recovery Time Objective):

35
Q

The overall administration through defined procedures and plans, assures the availability, integrity, security, and usability of the structure and unstructured data available to an organization.

A

Data Governance

36
Q

What is Data Managment?

A

This is the practice of collecting, keeping, and using data securely, efficiently, and effectively.
Its whole purpose is to make sure we are in control of our data.

37
Q

Data Management(decided by the people): Involves making and implementing decisions, whereas data governance is concerned with what decisions should be made to ensure the effective management of data.

-Data Governance: Happens from the top-down; data management happens from the bottom up

A

Major differences between Data Management and Data Governance:

38
Q

Data Governance Framework 5 points

A

1.) Data Principle: Is the usage of external data in a regulatory environment
2.) Data Quality: Impacts the operational and strategic operations of an organization.
3.) Metadata: Data about the date. Data that interprets the data tells, you the size, and so on.
4.) Data Access: The accessibility to retrieve data and how easy you can pull the data back up.
5.) Data Life Cycle: All data goes through useless and retirement.

39
Q

Making decisions and exercising authority for data-related matters; establishing a culture where quality data is obtained and valued to drive the business

A

What is driving Data Governance?

40
Q

Accuracy: Correct and free of errors. No major error

Comprehensiveness: All bits of data are included/are complete.

Consistency: Data is uniform and reliable.
Timeliness: Data is up-to-date and accessible when needed.

Conformance: Data adheres to standards and rules.

Relevance: Data is appropriate for the intended use.

A

Name some data quality characteristics

41
Q

The Data Governance Process

A

Discover: Requires business user to be involved. Know where the data is stored and know the meaning of the data(what is the purpose).
-Identify the databases or data sets or applications that store data, the relationships between the different data sets, the meaning of the data to the organization, and who has responsibility for the data. This step requires the business users to be involved.

Design: Require a lot of involvement for clinicians.
-Consolidation and coordination of organizational data and the environment focusing on consistency of any governing rules, consistency of the organizational data model, and consistency of the business processes. This step requires the involvement of the business users.

Enable: Very time-consuming and is done by IT staff. Apply any new standards from the organizations. You go in after it \has been created to make sure all of the data is correct.
-This is when the new data governance standards are applied to each data source, business process, and application. It is recommended that the standards be deployed to the entire network, rather than embedded in each source, process, or application.

Maintain: The monitoring and reporting system to make sure collect data is doing what we want. Regular updates and audits to maintain data quality and relevance.
-Required to ensure that the data remain fit-for-purpose for the organization. The monitoring requires involvement from both business users and IT.

Archive/Retire Data is thrown out/ no longer used. Ex: after 7 years the charts are now thrown out.
- It is important to ensure that the data that are no longer needed are retired in a methodical, considered fashion. This may involve complying with the legal requirements for maintaining the data,

42
Q

The overall administration through defined procedures and plans, assures the availability, integrity, security, and usability of the structure and unstructured data available to an organization.

A

What is Data Governance?

43
Q

What are the four steps in Data Quality Management Model?

A

1.) Application of Data: Purpose for collection

2.) Collection of Data: Process by which it’s collected

3.) Warehousing of data: Process and systems used to store it

4.) Analysis of data: Process of translating it for application

44
Q

The framework includes policies, procedures, roles, and responsibilities designed to ensure data quality, security, and compliance. It often integrates with other organizational management structures (e.g., IT governance).

A

Data Governance Framework:

45
Q

What are the five aspects of Big Data?

A

-1.) Volume: The large quantity

2.) Variety: A range of types of data

3.) Velocity: The high frequency/ or how often it is renewed

4.) Value: The usefulness of cost, workflow, complexity as well as governance. What is the need?

5.) Veracity: The complexity of the data(the level of detail) due to the accuracy or completeness

46
Q

Autonomy

A

The right of individuals to make their own decisions regarding their health and treatment.

47
Q

The obligation to act in the best interest of the patient, promoting good and well-being.

A

Beneficence

48
Q

The obligation to avoid causing harm to patients.

A

Nonmaleficence

49
Q

The principle of fairness, ensuring that patients have equal access to healthcare and resources, and that benefits and burdens are distributed equitably.

A

Justice

50
Q

5 different data points of Data Governance Framework:

A

1.) -Data Principle: Is the usage of external data in a regulatory environment that could influence the business uses of data.
2.)-Data Quality: Impacts the operational and strategic operations of an organization if done poorly
3.) -Metadata: Data about the date. Data that interprets the data tells, you the size, and so on.
4.) -Data Access: The accessibility to retrieve data in a database and how easily you can pull the data back up.
5.)-Data Life Cycle: refers to the fact that all data moves through life-cycle stages.

51
Q

1.) Application of Data: Purpose for collection
2.) Collection of Data: Process by which it’s collected
3.) Warehousing of data: Process and systems used to store/archive it
4.) Analysis of data: Process of translating it for application

A

What are the four steps in the Data Quality Management Model:

52
Q

Who are the two types of data consumers?

A

-Internal data
-External data

53
Q

-External data

A

Might include payers, public health agencies, and law enforcement agencies.

54
Q

consumers for healthcare data managers include patients, clinicians, administrators, and researchers.

A

-Internal data

55
Q

Applying the Ethical Decision-Making Matrix:

A

-1.) Assessing: all situations for their ethical sub contexts

2.) Identifying: the underlying ethical issues

3.) Evaluating: the situation including the perspectives of all involved in the situation

4.) Deciding: on a course of action.
After the event,

5.)Preventing : ongoing monitoring should be implemented to prevent future occurrences of similar situations.

56
Q

5 aspects of Big Data (The 5 V’s)

A

1.) Volume: The large quantity
2.) -Variety: A range of types of data
3.) -Velocity: The high frequency/ or how often it is renewed
4.) -Value: The usefulness of cost, workflow, complexity as well as governance. What is the need?
5.) -Veracity: The complexity of the data(the level of detail) due to the accuracy or completeness