Confidentiality - Documenting and Reporting Flashcards

1
Q

Nurses are legally and ethically obligated to keep information about patients ___.

A

confidential

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Only members of the health care team who are d___ involved in a patient’s care have legitimate access to the medical record. Thus, the nurse discusses a patient’s diagnosis, treatment, assessment, and/or any personal conversations only with members of the health care team who are involved in a patient’s care.

A

d-irectly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A breach of confidentiality is often a c___ rather than a deliberate act. Students need to make sure that patient-identifiable information (e.g., files, stickers, information in notebooks, worksheets) is not taken home and that it is disposed of correctly in a secure bin for shredding.

A

c-areless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Examples of breaches of ___ are accessing information not related to your duties, discussing patient information in an inappropriate area, such as in an elevator or on public transport, revealing to a caller confidential patient or co-worker details, emailing patient information through a public network such as the Internet, and leaving confidential material in a public area.

A

confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Even after you are no longer on placement at an agency, you are obligated to maintain the ___ of patients and co-workers at that agency.

A

confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Includes individually identifiable health information such as demographic data; facts that relate to an individual’s past, present, or future physical or mental health condition; provision of care; and payment for the provision of care that identifies the individual.

A

Personal health information (PHI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

True or false: ensuring appropriate access to and confidentiality of personal health information (PHI) is the responsibility of all people working in health care.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Federal legislation that protects personal information, including health information.

A

Personal Information Protection and Electronic Documents Act (PIPEDA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Delineates how private-sector organizations may collect, use, or disclose personal information in the course of commercial activities. Individuals have the right to access and request correction of any personal information collected about them as well.

A

Personal Information Protection and Electronic Documents Act (PIPEDA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Applies to all organizations engaged in commercial activities unless the federal government exempts an organization or activity in a province with similar legislation.

A

The Personal Information Protection and Electronic Documents Act (PIPEDA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A combination of hardware and software that protects private network resources (e.g., the information system of the hospital) from outside hackers, network damage, and theft or misuse of information.

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Includes placing computers or file servers in restricted areas or using privacy filters for computer screens visible to visitors or others without access. This form of security has limited benefit, especially if an organization uses mobile wireless devices such as notebooks, tablets, personal computers (PCs), and smart phones. These devices are easily misplaced or lost, falling into the wrong hands. Some organizations use motion detectors or alarms with these devices to help prevent theft.

A

Physical security measures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Safety mechanism that logs a user off a computer system after a specified period of inactivity.

A

Automatic sign-off

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A collection of alphanumeric characters that a user types into a computer before accessing a program after the entry and acceptance of an access code or user name. This should not be shared with anyone or anything.

A

Passowrd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

To protect patient privacy, health care agencies ___ who accesses patient records and when they access them.

A

track

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Destroy (e.g., s___) anything that is printed when the information is no longer needed.

A

s-hread

17
Q

When writing patient data onto forms or including it in papers written for nursing courses, you need to ___-identify all patient data.

A

de

18
Q

True or false: historically the primary sources for inadvertent, unauthorized disclosure of PHI occurred when information was printed from a patient record and/or faxed to other health care providers.

A

True

19
Q

Nurses need to destroy all papers containing PHI (e.g., social insurance number, date of birth or age, patient’s name or address) ___ after using or faxing them.

A

immediately

20
Q

Some nurses work in settings where they are responsible for erasing files from a computer hard drive that contain calendars, surgery or diagnostic procedure schedules, or other daily records that contain PHI. It is important to know and follow the disposal ___ for records in the institution where you work.

A

policies

21
Q

Health care facilities and departments have policies for the use of fax machines, which specify the ___ of information that can be faxed, allowable recipients of the information, where information is sent, and the process used to verify that information was sent to and received by the appropriate person(s).

A

types

22
Q

Nurses should fax only the amount of information that is requested or required for immediate clinical needs. The following are some steps to take to enhance fax security:

  • Confirm that fax numbers are ___ before sending to be sure that you direct information properly
  • Use a ___ sheet to eliminate the need for the recipient to read the information to determine who gets it. This is especially important if a fax machine serves a number of different users.
  • Authenticate at both ends before data transmission to verify that source and destination are correct. Use the cover sheet to list intended recipient(s), the sender, and the phone and fax numbers. Verify the fax number on the transmittal confirmation sheet.
  • Use programmed speed-dial keys to eliminate the chance of a dialing error and misdirected information.
  • Use the en___ feature on the fax machine. Encoding transmissions makes it impossible to read confidential information without the encryption key.
  • Place fax machines in a secure area and limit machine access to designated individuals.
  • Log fax transmissions. This feature is often available electronically on the machine.
A

correct

cover

en-cryption