MT 637 UNIT 7 Flashcards
The right to be left alone
The right to keep personal information secret
The right control to personal information
Privacy
Freedom from intrusion or invasion into one’s
private affairs
Privacy
Federal law that required the creation of national standards to protect sensitive patient health information from being disclosed without the patient’s consent or knowledge
Health Insurance Portability and Accountability
Act of 1996
Sharing or dissemination data only to those with a “need to know”
Confidentiality
The status accorded to data or information indicating that is sensitive for some reason and therefore it needs to be protected against
- Theft
- Disclosure
- Improper use, or both, and must be disseminated only to authorized individuals or organizations with a need to know
Confidentiality
Information must be protected against
- Theft
- Disclosure
- Improper use
The means to control access and protect information from accidental or intentional disclosure to unauthorized persons and from alteration destruction or loss
Security
Mechanisms to ensure the safety of data and systems in which the data reside
Security
Challenges from Proliferation of Technologies & Applications
- Increased technology use by all care providers
- Health information exchange and data-sharing activities across multiple networks
- Cloud computing and third-party outsourcing
- Increased use by patients, families, and consumers of their devices (tablets, smartphones, etc.)
- New models of care require more care providers to access data across the patient care continuum
- Clinicians using their own devices - Personal laptops, tablet devices, smartphones, and so on
- Connected medical devices and implantable devices
- Computer profiling and mistakes
- Spamming
- Flaming
- Lacks privacy law
TRUE/FALSE: Computer profiling and mistakes in the computer matching of personal data are other controversial threats to privacy.
TRUE
Favorite tactic of mass mailers of unsolicited advertisements, or junk e-mail. It has also been used by cyber-criminals to spread computer viruses or infiltrate many compute systems
Spamming
practice of sending extremely critical, derogatory, and often vulgar e-mail messages (flame mail) or newsgroup postings to other users on the Internet or online services
Flaming
was enacted by the U.S congress in 1996. It is a broad piece of legislation intended to address a wide variety of issues related to individual health insurance.
Health Insurance Portability and Accountability Act (HIPPA )
The result of effective protection measures
Data Security
The sum of measures that safeguard data and computer programs from undesired occurrences
Data Security
DATA SECURITY
The sum of measures that safeguard data and computer programs from undesired occurrences and exposure to:
○ Accidental or intentional disclosure to unauthorized persons
○ Accidental or malicious alteration,
○ Unauthorized copying,
○ Loss by theft or destruction by hardware failures, software deficiencies, operating mistakes, or physical damage by fire, water, smoke, excessive temperature, electrical failure, or sabotage or combination thereof
Institute laws and govern these issues (privacy)
National Privacy Commission (NPC)
In 2012 the Philippines passed the comprehensive and strict privacy legislation “to protect the fundamental human right of privacy, of communication while ensuring free flow of information to promote innovation and growth.” Republic Act No. 10173, Ch.1, Sec. 2 .
Data Privacy Act of 2012
A subset of a security breach that actually leads to “accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to, personal data transmitted, stored, or otherwise processed.
Personal Data Breach
Requirements of Breach Notification
● The breached information must be sensitive personal information, or information that could be used for identity fraud, and
● There is a reasonable belief that unauthorized acquisition has occurred, and
● The risk to the data subject is real, and
● The potential harm is serious
Provider
Direct Patient Care
Clinic
Direct Patient Care
Hospital
Direct Patient Care
Payors
Support activity
Quality Reviews
Support activity
Administration
Support activity
Insurance eligibility
Social Uses