Unit 7 - PRIVACY, CONFIDENTIALITY, SECURITY, AND ETHICS Flashcards

1
Q

____ is the right to be left alone

A

privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

____ the right to keep personal information secret

A

privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

____ is defined as the freedom from intrusion or invasion into one’s private affairs

A

privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

____ is known as the right to control personal information

A

privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

____ refers to the status accorded to data/information indicating sensitivity, therefore it needs to be protected

protected against theft, disclosure, and improper use

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

____ is a sharing or disseminating data only to those with a “need to know basis”

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

____ refers to the means to control access and protect information from accidental or intentional disclosure to unauthorized persons

A

Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Among privacy. confidentiality, and security, which of them refers to the mechanisms to ensure the safety of data and systems in which the data reside?

A

Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

RA 10173 is also known as?

A

Data Privacy Act of 2012

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What law (or act) aims to protect the fundamental human right of privacy, of communication while ensuring free flow of information to promote innovation and growth?

A

Data Privacy Act of 2012

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

____ refers to a subset of a security breach that actually leads to “accidental or unlawful destruction, loss, alteration, or unauthorized disclosure of personal data

A

personal data breach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An information breach may only be classified as it is if it possesses what characteristics?

4 requirements of breach notif

A
  1. breached info must be sensitive (personal info)
  2. reasonable belief that unauthorized acquisition has occurred
  3. risk to data subj is real
  4. potential harm is siryuz
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

____ is defined by the Association of IT Professionals as the unauthorized use, access, modification, and destruction of hardware, software, data, or network resources

A

Computer crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the key features of a secure system and network?

A
  • Authentication
  • Authorization and access control
  • Data integrity
  • Accountability
  • Availability
  • Data storage
  • Data transmission
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Identify the key feature of a secure system and network being described

Means of verifying the correct identity and/or group membership of individual or other entities

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the 4 methods or classifications for [identity] authentication?

A
  • Username
  • Known only by the user
  • Held only by the user
  • Attributable ony to the user
17
Q

Identify the key feature of a secure system and network being described

  • Feature that is dependent on the hierarchy of accession or permission of data.
  • Data may be read, written, modified, and deleted
A

Authorization and Access Control

18
Q

Identify the key feature of a secure system and network being described

  • Used to support information accuracy to ensure that data have not been altered or destroyed in an unauthorized manner
  • Error detection and error correction protocols
A

Data Integrity

19
Q

Identify the key feature of a secure system and network being described

Ensures that the actions of any entity can be traced during the movement of data from its source to its recipient

A

Accountability

20
Q

Audit trails must embody five characteristics. What are they?

A
  • Identification of the user
  • Data source
  • Whose information
  • Date and time
  • Nature of the activity
21
Q

Identify the key feature of a secure system and network being described

Ensures information is immediately accessible and usable by authorized entity

A

Availability

22
Q

Identify the key feature of a secure system and network being described

  • Protecting and maintaining the physical location of the data and the data itself
  • Physical protection of processors, storage media, cables, terminals, and workstations
  • Retention of data for mandated period of time
A

Data storage

23
Q

Identify the key feature of a secure system and network being described

Exchange of data between person and program or program and program when the sender and receiver are remote from one another

A

Data Transmission

24
Q

____ identifies what should enter and what should not. This includes data going in and out.

Filtering mechanism so that only authorized traffic is allowed to pass

A

Firewall

25
Q

____ of data must scramble readable information and de-encrypt with proper key by ____.

A

Encryption; recipient

26
Q

Identify the principle of technology ethics described

The good achieved by the techonology must outweight the harm or risk. Moreover, there must be no alternative that achieves the same or comparable with less harm or risk

A

Proportionality

27
Q

Identify the principle of technology ethics described

The ppl affeted by technology shld understand and accept the risks

A

Informed consent

28
Q

Identify the principle of technology ethics described

The benefits and burdens of the technology should be distributed fairly.

A

Justice

29
Q

Identify the principle of technology ethics described

Technology implemented must be able to avoid all unnecessary possibility of loss or injury

A

Minimized risk

30
Q

EHRs and computer use should facilitate patient care, support physician ethical duties, and support the ____ relationship

A

patient-doctor

31
Q

True or False

Confidentiality is unintentional; security is intentional

A

True