Week 7 Flashcards

1
Q

How many title statues HIPAA has?

A

5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is title one?

A

Portability: preventation of discrimination in health care insurance enrollment and premiums. Health insurance coverage and protecting individuals and their dependence from losing coverage when they leave or otherwise change jobs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is title two?

A

Administrative Simplification: Efforts by HIPAA to standardize the healthcare industry’s capricious and inefficient business practices. Prevention of abuse and healthcare fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Are all providers covered entities?

A

No, not all providers are cover. Per definition, a health care provider who transmits any information pertain a certain transaction in electronic form.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Security Rule

A

Defines a facility as the physical premises and the interior and exterior building

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Role- Based Access Control

A

Gives access to users based on their roles as member of the organization and users are aligned to a preestablished group with it with certain access priviledge based on the groups need to access the information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Based on the US department of Health and Human Services, how many people are effect by laptop theft resulting to a health information breach?

A

500 or more individuals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

True or False: Erasing or deleting a file does not sufficiently remove EPI.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Encryption

A

scrambles or encodes data, protecting it from being comprehend by unauthorized individuals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Public Key Infrastructure

A

is a more secure method of encryption technology because it use two keys encrypt transmit and send message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Audit Control

A

Requires installation of hardware, software, or manual mechanism to examine and record activity in systems that contain ePHI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Firewall

A

is a buffer between an organization internal trusted network and the internet which is considered an untrusted network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Risk Management

A

Applies to all aspects of an organization’s operational and focuses on identifying, evaluating, and controlling risk that can expose the organization to financial liability,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

HIPAA has three primary documents to inform patients and give them control over their PHI

A

Notice of Privacy Practice, Authorization, and Consent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Notice of privacy practices written in________ and explains how a covered entity will use his or her PHI

A

Plain Language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Use and disclosure permitted with authorization

A

Facility Directory
Disclosure of Relevant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Facility Directory

A

If a patient agrees to disclose to those who ask to for the individual by name
Emergencies
Clergy of individual’s religious affiliation may receive list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Disclosure of Relevant PHI

A

To family members, relatives, or close friends involved in individual care or payment
If individual unable to agree or object covered entity may use professional judgment to decide if it is in the individuals best interest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

True or False: 16 circumstances where written authorization and verbal agreement or objection are not required

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are the first 12 of the use and disclosure permitted without authorization is referred as?

A

Public interest and benefit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Public health activities

A

No written authorization is required for disclosure of student immunization records from cover entity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Decedents

A

HIPAA privacy act protection survive as individual’s per HITECH for 50 years after death

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Business Associate

A

A person or organization not a part of the cover entity’s workforce, that performs a function or activities on behalf of or affecting a covered entity involving use or disclosure of individual identifies health information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Business Associate Agreement

A

Under HIPAA, as originally written business associates as business associates once they were identify as covered entity business associate through a contracted
- even without a contract
-allows covered entity to lawfully disclose protected health information to business associate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Workforce
is any individual working under the covered entity's direct control regardless of whether they are paid by the covered entity or not
26
PHI three part test
Identify the person Future present and past it held or transmitted by a covered entity or its business associate in any form of medium
27
Limited Dataset
is PHI that does not completely de-identified individual but excludes most direct identifiers of the individual and individual's relative employers or household members
28
What is covered by HIPAA?
Privacy Rule: electronic, oral, written Security Rule: Electronic only
29
Calling out patient's name in a physician's office or hospital visitor walking down the hallway and called a patient's name is an example of?
Incidental uses and disclosures
30
Preemption
Federal law trumps state law unless state law is "stronger". Covered entity mu
31
Can a covered entity deny the request ?
Yes, if it determines that PHI or the record either was not available for inspections or is already accurate and complete
32
Individual Amendments
it must identify the records in the DRS that are affected by the amendment and append the information or the link to the amendments location
33
Willful neglect
intentional failing comply or reckless indifference. Corrected min $10,000 /max $50,00 per violation Uncorrected: min $50,000/ max $50,000
34
Prior to HIPAA, how was HIPAA violations detected?
Solely complaint driven
35
Breach notification
the requirements are significant becaise they require both covered entity and business associates to complete breach
36
OCR
has discretion to pursue corrective action without assessing penalties for unknowing violations and where reasonable diligence would not have revealed the violation
37
General Concepts of the security rule
Flexible, Scalable, technology netural
38
Flexible
Any security measures may be used that allows a covered entity to reasonably and appropriately implement the requirement
39
Scalable
it is written to accurate and apply yo org of any size
40
Technology neutral
it does not require or prescribe technology
41
addressable specification
is met if the organization either a determines that the specification is reasonable and appropriate and implements it as written, reasonable and appropriate alternative or document why it is not reasonable and appropriate to implement the specification
42
Designated Record Set
In each case, the records are used in whole in part to make decisions about individual
43
Risk analysis framwork has two primary
disaster recovery and risk anlysis
44
Risk Anlysis First step
systematic characteristeric: focuses on what the organization possess by identifying which information asset needs portection
45
2nd step of risk analysis
identfiying threats: focus on threats * humans are the most constant threat to health information intergrity
46
5th step of risk analysis
Impacy Analysis: See how great of a threat it may impact the organization
47
Risk Determination
quanifies threats enabling to prioritize risk and allocate limited resources like money, people, and time
48
Result Documentation
org should be aware of residual risk which are risk that contribute to exit even after the organization has applies safeguards and control * must retained for 6 years
49
Disaster REcovery Plan
Defines resource, action, task and data required to restore critical service quickly to manages business recovery processes after major events
50
Data REcovery
effort should be minimal for electronic information as long as thorough and consistent data back up and storage methods or follows
51
Emergency Mode Operation
describes the processes and controls that will be followed until operation are fully restored following an event
52
Are PHR portal is about to be edited by patient?
patients are able to control and create the content of their own PHR
53
Cyber security
activties and process that protects information systems against threats
54
Dangers of Malware
Patient safety and confidentiality of patient information
55
Malious Software
can be destroyed or disrupt a information system introduced through system vulnerabilities by hackers
56
Zero Day Exploit
Sometimes attackers can exploit a software vulernability that software vendor is not yet aware of or has not been able to warn user about
57
Worm
is type of virus that does not need human interaction to spread
58
spyware
is a malware that is primary designed to attach to the host it has infected. Installed without the computer user's ,permission in order to collect information about their user and browsing habits
59
Cookies
identify the user's computer to that website and it sort of service as electronic information
60
Session cookies
stores information about their user for only the period of the session
61
Persistent cookie
remained stored on a computer to allow personal information to be retain
62
Scareware
uses ficitious threat to trick users information malware infected
63
Whaling
aimed at an executive in an organization
64
Unsecured wireless network
when accessed they can introduced malware and it users create accounts using the same email address and password thet use for other services the attackers can than hack into the other services like the user's bank account
65
Denial of Services
Attacker takes control of the device or network with traffic jams
66
Distributes Denial of Services
Attacker uses one or more originating computers with vulnerabilities to attack other computers
67
Ransomware
Resembles scare ware however the threat is real. The attacker will kidnap information for exchange of money
68
Data backup
does not resolve problems that are created when ransomware blocks a computer functionality
69
VPN
Virtual private network. Remote workers utilizes VPN because it has secure tunnels