HIPAA and Harassment Flashcards

1
Q

HIPAA

A

Health Insurance Portability and Accountability Act (US)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

PIPEDA

A

Personal Information Protection and Electronic Documents Act (Canada)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the purpose of HIPAA?

A
  • Protect patient’s protected health information
  • Giving patient’s appropriate access to their information
  • Promoting high quality healthcare
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

PHI

A

Protected Health Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the three rules of HIPAA?

A
  • Privacy Rule
  • Security Rule
  • Breach Notification Rule
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the purpose of the Privacy Rule?

A

To assure PHI is protected while allowing the flow of health information needed to provide and promote high quality healthcare.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the three major aspects of the Privacy Rule?

A
  • Minimum Necessary Rule
  • Access/Use of PHI
  • Disclosure of PHI
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the Minimum Necessary Rule?

A

A rule that requires you to make reasonable efforts to access, disclose, and request only the minimum amount of PHI needed for the treatment of the patient.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are login credentials used for?

A

To create a unique electronic footprint. Every click made is tracked and monitored in the EMR/Speke platforms. You are required to keep your login confidential and you are prohibited to use anyone else’s login credentials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How can you protect your workstation and keep your device secure?

A
  • Do not share your login information with anyone
  • Do not keep passwords written down anywhere
  • Do not download or access any apps
  • Log out anytime you step away
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Access/Use of PHI

A

You should only access PHI for business-related purposes. This means that you should only access records if a patient has been assigned to you. It is prohibited for you to access your own PHI. It is prohibited for you to access records of family, friends, or coworkers - even if they authorize you to do so.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is an access audit?

A

Audits are conducted to provide detailed information about your access to PHI. Audits provide your manager/company with the date and time of you access; each portion of the chart that you accessed; the length of time of your access; modifications you made to the chart; the workstation used to access the chart; and even your IP address disclosing your location when you accessed the chart.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What types of access audits can be conducted to find out if PHI has been accessed illegally?

A
  • Same Last Name Audit
  • Same Address Audit
  • VIP audit
  • Patient Requested Audit
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Disclosure of PHI

A

You are permitted to disclose protected health information only to the minimum extent necessary for the treatment of the patient. Ex. you may share PHI with the treating provider or other members of the patients care team (i.e. nurse, consulting physician).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

With whom/where should you NOT disclose PHI?

A
  • Any employee that is NOT on the patient’s care team
  • Family
  • Friends
  • Common areas (hallways/elevators)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Social Media and PHI

A

Posting or publishing information about a patient on social media or the internet is STRICTLY PROHIBITED.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Photography/Video Recordings and PHI

A

Company policy STRICTLY PROHIBITS taking photographs and video recordings in the facility.

18
Q

T/F: If you’re reasonable certain the patient could not be identified, then it’s OK to post a photo of a patient on social media.

A

FALSE - No details of visits should be released as ANYTHING could tie a patient to a visit!O

19
Q

Y/N: A fellow scribe says the x-ray for the fracture they just saw is really cool. They offer to pull it up for you to see and so you don’t have to use your login. Is this ok?

A

NO - This violates the minimum necessary rule because this is not needed for the patient’s care. Also, you are NOT assigned to this patient and have no right to view this information.

20
Q

When is it okay to document outside of EMR?

A
  • On a company or facility authorized desktop-built notepad on your company or facility device
  • On paper provided by the facility in the event of EMR downtime
21
Q

What are unauthorized forms/applications used for note taking?

A
  • Online notepad
  • Email
  • Google Doc
  • Word Doc
22
Q

Which of the following is ok to use to send PHI?

  • Messenger
  • Encrypted email or encrypted service
  • Email
  • Text
A

Encrypted email or encrypted service

23
Q

What is the purpose of the Security Rule?

A

To establish a national set of security standards for PHI.

24
Q

What is access management?

A

Access management is a company’s way to ensure employees are provided access based on their role in the organization to ensure they are only given the appropriate amount of access to ePHI.

25
Q

What are the 4 important measures a manager must ensure when an employee advises they will be separating form the company?

A
  • That the manager know the last day of work and make plans to revoke access to any sensitive informaition
  • For any equipment that was issued in order to work to be returned
  • For items that grant access to sensitive information be turned in (ID cards, access keys, etc.)
  • For EMR access and relevant logins to be made inactive
26
Q

Who must you report suspected or known security incidents to?

A
  • Your manager
  • Privacy Officer
  • Security Officer
  • Hipaa@healthchannels.com
  • Legal@healthchannels.com
  • 888-386-4370
27
Q

What should your home router encryption be set to?

A
  • WPA2
  • WPA3
  • WPS Disabled
28
Q

What is the flow of an privacy issue investigation?

A
  1. Investigation is Opened
  2. Collection of Evidence
  3. Interviews
  4. Documentation
  5. Risk Assessment (when a patient privacy issue becomes a HIPAA Breach)
29
Q

Who can determine if a patient privacy issue has become a HIPAA Breach?

A

ONLY the Privacy Officer on the investigation can determine if a patient privacy issue has become a HIPAA Breach.

30
Q

What is the Breach Notification Rule?

A

If an internal HIPAA risk assessment determines that there is a high probability of the compromise of the security or privacy of the patient’s PHI, the Privacy Officer will consider the incident a HIPAA Breach notifying event. If an incident is determined to be a HIPAA Breach notifying event we MUST report the incident to a client and the facility that the client’s health information was compromised.

31
Q

What part of a persons identity would be considered a Protected Group?

A
  • Ancestry
  • Age
  • Color
  • Disability
  • Gender
  • Marital Status
  • Medical Condition
  • Military or Veteran Status
  • National Origin
  • Pregnancy status
  • Race
  • Religion
  • Sexual Identity/Orientation
  • Worker’s Compensation Status
32
Q

What is Discrimination?

A

Treating someone less favorably because of their actual or perceived membership in a certain group or social category.

33
Q

What is a fair and non-discriminatory workplace?

A

A workplace in which employees are protected from discrimination at all stages of employment, including but not limited to, recruiting, hiring, training, and compensation.

34
Q

How to avoid discrimination claims?

A
  • Treat employees fairly
  • Treat employees with respect and dignity
  • Don’t bully
  • Don’t stereotype
  • Don’t make any references or jokes that are based on race, gender, religion, or other protected status
  • When there is any doubt, don’t say it or do it!
35
Q

What is harassment?

A

Harassment refers to the illegal form of discrimination. It is unwelcome, unwanted or offensive conduct based on or because of an employee’s protected group.

36
Q

What is sexual harassment?

A

Un welcomed sexual advances, requests for sexual favors, and other verbal or physical conduct of sexual nature when:
- submission to such conduct is explicitly/implicitly a term or condition of an individuals employment
- submission to or rejection of such condition by an individual is used as a basis for employment decisions affecting the individual
- such conduct has the purpose of substantially interfering with an individuals work performance
- such conduct has the purpose of creating an intimidating, hostile, or offensive work environment

37
Q

What qualifies as harassment?

A

Speech or conduct that:
- Denigrates or shows an aversion to an individual based on any protected characteristic
- Has the purpose or effect of creating an intimidating, hostile, or offensive work environment
- Has the purpose or effect of unreasonably interfering with an individual’s work performance
- Otherwise adversely affects an individual’s employment opportunities

38
Q

What are forms of harassment?

A
  • Verbal
  • Non-verbal
  • Physical
  • Visual
39
Q

Who decided what is ‘unwelcome’ or ‘offensive’?

A
  • The victim (the subjective standard)
  • The hypothetical ‘reasonable person’ (the objective standard)
  • The intent of the alleged harasser is irrelevant
40
Q

Who can e the harasser?

A
  • Supervisors
  • Co-workers or peers
  • Customers, clients, or other third parties
41
Q

Where can harassment occur?

A
  • The workplace
  • On ‘working time’ outside the facility
  • At work related social events or business functions
  • Int he context of a ‘personal’ romantic or sexual relationship between employees (off-site/off-hours)
42
Q

What is retaliation?

A

Adverse action against a covered individual because the employee engaged in a protected activity. Employers CAN NOT punish employees for making discrimination or harassment complaints or participating in workplace investigations. RETALIATION IS PROHIBITED.