his unit 7 3rd shift Flashcards
The right to be left alone
The right to keep personal information secret
Privacy
Mechanisms to ensure the safety of data and systems in which the data reside
Security
Sharing or disseminating data only to those with a “need to know”
Confidentiality
Confidentiality is the status accorded to data or information indicating that it is sensitive for some reason and therefore it needs to be protected against?
theft,
disclosure or
improper use, or both, and must be disseminated only to authorized individuals or organizations with a need to
know
Security is the means to control access and protect information from _________ disclosure to unauthorized persons and from ____________
accidental or intentional ; alteration, destruction or loss
Privacy is the right to ______ personal
information and __________ into one’s private affairs
control; freedom from intrusion or
invasion
What are the challenges from proliferation of technologies and applications?
Increased technology use by all care providers
Health information exchange and data-sharing activities across multiple networks
Cloud computing and third-party outsourcing
Increased use by patients, families, and consumers of their devices (tablets, smartphones, etc.)
New models of care require more care providers to access data across the patient care continuum
Clinicians using their own devices like personal laptops, tablet devices, smartphones, and so on
Connected medical devices and implantable devices
What are characteristics of connected medical devices and implantable devices?
Computer profiling and mistakes in the computer
matching of personal data are other controversial threats to privacy.
Spamming is the favorite tactic of mass mailers of unsolicited advertisements, or junk e-mail. Spamming has also been used by cyber- criminals to spread computer viruses or infiltrate many computer systems.
Flaming is the practice of sending extremely critical, derogatory, and often vulgar e-mail messages ( flame mail) or newsgroup postings to other users on the Internet or online services.
Some lacks privacy law
Examples of privacy law?
HIPAA- The Health Insurance Portability and Accountability Act (HIPAA) was enacted by the U.S. Congress in 1996.
What is HIPAA?
A broad piece of legislation intended to address a wide variety of issues related to individual health insurance. Two important sections of HIPAA include the privacy rules and the security rules.
What is the result of effective protection measures?
Data security
Data security is the sum of measures that safeguard data and computer programs from undesired occurrences and exposure to?
- accidental or intentional disclosure to unauthorized persons
- accidental or malicious alteration,
- unauthorized copying,
- loss by theft or destruction by hardware failures, software
What is the data privacy act of 2012?
A comprehensive and strict privacy legislation “to protect the fundamental human right of privacy, of communication while ensuring free flow of information to promote innovation and growth.”
What is a subset of a security breach that
actually leads to “accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to, personal data transmitted, stored, or otherwise processed.
Personal Data Breach
What are the requirements of a breach notification?
- The breached information must be sensitive personal
information, or information that could be used for identity fraud - There is a reasonable belief that unauthorized acquisition has occurred
- The risk to the data subject is real
- The potential harm is serious.
What is the flow of information in healthcare?
Direct Patient Care to Support Activity and “Social” uses
Support activity to Commercial uses
What are the definitions of a computer crime?
the unauthorized use, access, modification, and destruction of hardware, software, data, or network resources;
the unauthorized release of information ;
the unauthorized copying of software;
denying an end user access to his or her own hardware, software, data, or network resources ; and
using or conspiring to use computer or network resources to obtain information or tangible property illegally
Who gave this definitions of computer crime?
Association of Information Technology Professionals (AITP)
What are the key features o a secure system and network?
- Authentication
- Authorization and access control
- Data integrity
- Accountability
- Availability
- Data storage
- Data transmission
Ensures that the actions of any entity can be traced during the movement of data from its source to the patient
Accountability
Access control lists for predefined users
Authorization and Access Control
Access control includes?
- Reading
- Writing
- Modifications
- Deletion of data
- Deletion of programs