Unit 7: Health Information, Privacy, Confidentiality, Security, and Ethics Flashcards
The right to be left alone
a. privacy
b. confidentiality
c. security
d. ethics
privacy
The right to keep personal information secret
a. privacy
b. confidentiality
c. security
d. ethics
privacy
The right to control personal
information
a. privacy
b. confidentiality
c. security
d. ethics
privacy
freedom from intrusion or invasion into one’s private affairs
a. privacy
b. confidentiality
c. security
d. ethics
privacy
Sharing or disseminating data only to those with a “need to know”
a. privacy
b. confidentiality
c. security
d. ethics
confidentiality
the status accorded to data or information indicating that it is sensitive for some reason and therefore it needs to be protected
a. privacy
b. confidentiality
c. security
d. ethics
confidentiality
Odd one out:
Data must be protected against
a. theft
b. disclosure
c. improper use
d. dissemination to authorized entities
dissemination to authorized entities
the means to control access and protect information from accidental or intentional disclosure to unauthorized persons and from alteration, destruction or loss
a. privacy
b. confidentiality
c. security
d. ethics
security
Mechanisms to ensure the safety of data and systems in which the data reside
a. privacy
b. confidentiality
c. security
d. ethics
security
Odd one out:
Challenges from Proliferation of Technologies and Applications
a. Increased technology use by all care providers
b. Selective health information dissemination on all platforms
c. Cloud computing and third-party outsourcing
d. Increased use by patients, families, and consumers of their devices
Selective health information dissemination on all platforms
Odd one out:
Challenges from Proliferation of Technologies and Applications
a. New models of care require more care providers to access data across the patient care continuum
b. Health information exchange and data-sharing activities across multiple networks
c. Localized computing and in-house operations
d. Clinicians using their own device
e. Connected medical devices and implantable devices
Localized computing and in-house operations
T/F:
Computer profiling and mistakes in the computer matching of personal data are other controversial threats to security.
false;
threats to PRIVACY
the favorite tactic of mass mailers of unsolicited advertisements, or junk e-mail
a. flaming
b. spamming
spamming
T/F:
Spamming has also been used by cyber-criminals to spread computer viruses or infiltrate many computer systems.
true
the practice of sending extremely critical, derogatory, and often vulgar e-mail messages ( flame mail) or newsgroup postings to other users on the Internet or online services.
a. flaming
b. spamming
flaming
a broad piece of legislation intended to address a wide variety of issues related to individual health insurance (enacted by the U.S. Congress in 1996)
a. HITECH Act (Health Information Technology for Economic and Clinical Health Act)
b. GDPR (General Data Protection Regulation):
c. HITEP (Health Information Technology Extension Program)
d. Health Insurance Portability and Accountability Act (HIPAA)
Health Insurance Portability and Accountability Act (HIPAA)
the result of effective protection measures
a. data security
b. data privacy
c. network security
d. access control
data security
the sum of measures that safeguard data and computer programs from undesired occurrences
a. data privacy
b. access control
c. network security
d. data security
data security
Odd one out:
Data security provides protection from exposure to
a. accidental or intentional disclosure to unauthorized persons
b. accidental or malicious alteration
c. preservation of data integrity
d. unauthorized copying
e. loss by theft or destruction by hardware failures
preservation of data integrity
In this year, the Philippines passed the comprehensive and strict privacy legislation “to protect the fundamental human right of privacy, of communication while ensuring free flow of information to promote innovation and growth.”
a. Data Privacy Act of 2010
b. Data Privacy Act of 2011
c. Data Privacy Act of 2012
d. Data Privacy Act of 2013
Data Privacy Act of 2012
a subset of a security breach that actually leads to “accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to, personal data transmitted, stored, or otherwise processed
a. identity theft
b. personal data breach
c. data exposure
d. privacy invasion
personal data breach
T/F:
As a requirement of breach notification, the breached information must be sensitive personal information, or information that could be used for identity fraud.
true
T/F:
As a requirement of breach notification, there is a reasonable belief that authorized acquisition has occurred.
false;
unauthorized
T/F:
As a requirement of breach notification, the risk to the data subject is real, and the potential harm is serious.
true
defined by the Association of Information Technology Professionals (AITP) as including unauthorized use, release, and copying, denying an end user access, and using or conspiring to use computer illegally
a. cybercrime
b. digital fraud
c. computer crime
d. phishing
computer crime
Odd one out:
Key Features of a Secure System and Network
a. Authentication
b. Authorization and access control
c. Data integrity
d. Accuracy
e. Accountability
Accuracy
Odd one out:
Key Features of a Secure System and Network
a. Availability
b. Reliability
c. Data storage
d. Data transmission
Reliability
Means of verifying the correct identity and/or group membership
of individual or other entities
a. Authentication
b. Authorization and access control
c. Data integrity
d. Accountability
Authentication
Method(s) for authentication
a. User name
b. Known only by the user (e.g., password)
c. Held only by the user (e.g., digital signature, secure ID)
d. Attributable only to the user (e.g., finger print, retinal scan)
e. All of the above
all