Unit 5: Privacy and Security of Health Information Flashcards

1
Q

Privacy

A

The right of an individual to limit access to information about themselves unless it contradicts federal or state law

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Confidentiality

A

The expectation that information shared with a healthcare provider will be used only for its intended purpose

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Security

A

The protective measures and tools for safeguarding information in a system

ex: user names and passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

2009 HITECH Act

A

made laws safeguarding patient information more stringent due to the increased use and access to patient healthcare information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Ohio Revised Code

A

more stringent than 1996 HIPAA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

RED Flag Rules

A

for providers that collect credit card information. Laws regard suspicions of medical identity fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Covered Entity CE

A

Health plan, healthcare clearing house, or healthcare provider that transmits any health information in electronic form

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Protected Health Information PHI

A

individually identifiable health information held or transmitted by a CE or its business associate, electronic, paper, or verbal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Designated Record Set DRS

A

a group of records maintained by the CE (typically a healthcare provider) that may include payment and medical information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Use

A

PHI is used internally; quality department determines whether appropriate care was given

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Disclosure

A

PHI is disseminated from the CE (healthcare provider) and sent to an external source such as an attorney, insurance company, or another hospital

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Minimum Necessary

A

Limit the PHI disclosed to the least amount required to accomplish the intended purpose for which the information was requested

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

PHI Identifiers subject to HIPAA

A
Name
Postal address
Telephone numbers
Fax numbers
Social security numbers
Medical record numbers
Health plan beneficiary numbers
Account numbers
License numbers
Vehicle identifiers (vin or plate)
Medical device identifiers
Biometrics
Full face photographs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

TPO Treatment, payment, operations

A

the times when PHI can be used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

AARA Requirements

A

Certification of EHRs
Mandated HIPAA Audits
Increased penalty severity
Business associates also subject to privacy and security regulations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Internal security threats

A

hardware
Environment
Employees: human error, exploiting access, malice or gain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

External security threats

A

External humans who access data or steal hardware

Natural disasters: necessitates use of backup servers in an alternate location

18
Q

Confidentiality

A

only giving ePHI access to those who need it

19
Q

Integrity

A

Making sure data isn’t altered during transmission or storage

20
Q

Availability

A

Information must be available when needed for patient care and other uses to authorized users

21
Q

Administrative safeguards

A

people focused: training, policies, assessment

22
Q

Physical safeguards

A

mechanisms to protect hardware, software, and data
like locks on the door to the server room
should protect against fire, theft, etc

23
Q

Technical safeguards

A

use technology to protect data and control access

24
Q

Access controls

A

a computer software program designed to prevent unauthorized use of an information resource

Must have policies on who can view, create, and modify data

25
Q

Types of authentication

A

Role-based
User-based
Context-based
Emergency access procedure

26
Q

Role Based authentication

A

rights to read or edit are determined by role

Coders can read but not edit, wile nurses can add clinical information

27
Q

User Based

A

more specific and tailored than role based, but can be more difficult to manage and program

28
Q

Context based

A

combines role and context for data access

useful for nurses that may work in multiple unit with different data access needs

29
Q

Emergency access procedure

A

“break the glass”
usually occurs during a medical emergency
Need to be able to track who activated emergency access and why

30
Q

One factor authentication

A

like a user name and password, two things you know, one type of information

31
Q

Two factor authentication

A

combines two categories of access, such as something you know and something you have

32
Q

Token

A

physical device for security
Like an ID card
However these can be lost which is problematic

33
Q

Biometrics

A

retina scan, finger prints, voice prints, etc.

Very secure and difficult to forge

34
Q

Telephone callback

A

often used by remote employees to dial into the system with an approved phone number

35
Q

Automatic logoff

A

logs the use off after a specified amount of inactivity

should be paired with quick acting screensaver to hide patient info from people passing by

36
Q

Audit controls

A

mechanisms that record and examine activity in information systems

Hold users accountable for their actions
identify the causes of problems, extent, and how to fix
real time monitoring to identify breaches
Monitor for intrusions to prevent breaches

37
Q

Audit trails

A

record of audit system activities

system activities: log in and out
application level: what systems are used, what was seen and done
user level: actions of the user, and resources accessed

38
Q

Triggers

A

identify the need for a closer inspection

39
Q

Breach

A

unauthorized use, access, or disclosure of private health information that compromises privacy and security

40
Q

500 or more in breach

A

media is notified to increase patients awareness of potential medical fraud

41
Q

Medical identity theft

A

someone steals your identity and receives healthcare services under your name

someones information could end up in your chart and eff up your care as well as use up your insurance