Rules, Regulations, and Standards Flashcards

1
Q

Maintains a list of approved accreditation organizations for health care providers, as providers and suppliers who have been accredited by one of these national accrediting agencies are exempt from state surveys in determining if they are in compliance with Medicare - mandated conditions.

A

Centers for Medicare and Medicaid Services (CMS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Approved Medicare accreditation organizations include:

A

The Joint Commission, Community health association program, and the Accreditation Commission for Health Care.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Whose role is it to update documentation requirements based on changes to regulatory or accreditation standards?

A

The Nursing Informatics Specialist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

This committee created the standards associated with administrative medical insurance tasks.

A

The Accreditation Standards Committee (ASC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

This set of standards are used nationwide, helps with claims, enrollment, and determining insurance eligibility.

A

X12N

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This council developed pharmacy standards for the U.S. Electronic claims processing under this standard was first introduced in 1992, and has gone on to make up nearly 100% of retail pharmacy claims being processed in real - time.

A

The National Council for Prescription Drugs Program (NCPDP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Another NCPDP set of standards, focuses on the communication of information within and between different healthcare facilities.

A

HL7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Reimbursement systems

A

Pay for Performance (P4P) or Value - based purchasing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the primary objective of P4P programs?

A

to reward the health care providers when patients have good results.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

P4P payment

A

related to quality versus quantity of service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Under the Medicare Inpatient Prospective Payment System (IPPS), patient must be given…

A

A present - on - admission (POA) Medicare severity diagnosis - related group (MS-DRG) diagnosis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the “Y” POA indicator on Medicare claims?

A

Medicare pays for a condition if a hospital acquired condition (HAC) is present on admission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the “N” POA indicator on Medicare claims?

A

Medicare will not pay for condition if a HAC is present on discharge but not on admission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the “U” POA indicator on Medicare claims?

A

Medicare will not pay for condition if a HAC is present and documentation is not adequate to determine if the condition was present on admission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the “W” POA indicator on Medicare claims?

A

Medicare will not pay for condition if a HAC is present and if the health care provider cannot determine if the condition was present on admission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Medicare instituted, what, for serious, preventable, hospital - acquired conditions and complications for which Medicare will not reimburse hospitals?

A

Do not pay list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Why does Medicare have a Do not pay list?

A

to control quality of care and to cut costs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

How many categories are currently on the do not pay list for Medicare?

A

over forty

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What department handles negligence and malpractice?

A

Risk Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Indicates that improper care has not been provided.

A

Negligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Indicates that an individual failed to provide reasonable care or to protect/ assist another, based on the standards and expertise.

A

Negligent conduct

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Willfully providing inadequate care while disregarding the safety and security of another

A

Gross negligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Involves the injured parties contributing to the harm done.

A

Contributory negligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Attempts to determine what percentage of negligence is attributed to each individual involved.

A

Comparative Negligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

If health care providers provide patients access to them via e-mail or messaging and do not respond promptly to those messages, then they be liable for what?

A

Malpractice

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Types of patient data misuse include:

A

Identity theft
Unauthorized access Privacy violations
Security breaches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Health records often contain identifying information, such as Social Security numbers, credit card numbers, birthdates, and addresses, making patients vulnerable.

A

Identify theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Although EHRs and computerized documentation systems are password protected, providers sometimes share passwords or unwittingly expose their passwords when logging in, inadvertently allowing access to information about patients.

A

Unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Even professionals authorized to access a patient’s record may share private information with others, such as family or friends.

A

Privacy violations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Data are vulnerable to security breaches of careless, inadequate security, especially when various business associates, such as billing companies, have access to private information.

A

Security breaches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Those who use proprietary software should require all those working with the data, including third parties, sign ____________________, to prevent information regarding the software or data from being stolen or misused.

A

a Nondisclosure agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Stealing proprietary data is most common when …

A

people leave an organization and is often used to benefit a new employer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Stealing legally protected information is an act of?

A

Fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

The Health insurance portability and accountability act of 1996 mandates ____________ and _______________ to ensure that health information and individual privacy are protected.

A

Privacy and Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Protected information includes any information included in the medical record (electronic or paper), conversations between the physician and other health care providers, billing information, and any other form of health information. Procedures must be in place to limit access and disclosures.

A

Privacy Rule

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Any electronic health information must be secure and protected against threats, hazards, or nonpermitted disclosures, in compliance with established standards.

A

Security Rule

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Limiting access to those authorized, use of unique identifiers for each user, automatic logoff, encryption and decryption of protected health care information, authentication that health care data have not been altered or destroyed, monitoring of logins and security of transmission.

A

Security Requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

This must include a unique identifier, procedures to access the system in emergencies, time out, and encryption/ decryption

A

Access controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

The two major factors for security of patient information include:

A

Information should be transmitted accurately and quickly.
Clinical and non - clinical systems should be fully integrated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Requested information should be supplied within _______________ of the request.

A

24 hours

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Passed in 1996 to protect patient privacy rights

A

Health Insurance Portability and Accountability Act (HIPAA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Compliance dates: Electronic transactions and code sets are to be identified.

A

October 16, 2002

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Compliance dates: Privacy standards are to be set.

A

April 14, 2003

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Compliance dates: Standards for employer identification are to be set.

A

July 30, 2004

45
Q

Compliance dates: Standards for system and data security are to be set.

A

April 21, 2005

46
Q

Compliance dates: Standards for provider identification are to be set.

A

May 23, 2007

47
Q

Freedom from intrusion, or control over the exposure of self or personal information. In Healthcare, an individual’s right to privacy includes remaining anonymous by request, deciding what information is collected and that information is used.

A

Privacy

48
Q

The careful sharing of private information to people who have a valid interest in helping the individual.

A

Confidentiality

49
Q

Occurs when someone other than the authorized system personnel access a private computer system.

A

System Penetration

50
Q

The willful destruction of computer equipment (or database records).

A

Sabatoge

51
Q

Majority of sabotage occurrences come from?

A

Angry or unhappy employees

52
Q

There are several ways that __________ occur in computer systems: poor design, incorrect data entry, or retrieval of an incorrect entry.

A

Error

53
Q

May cause the system to shut down entirely for an undefined length of time.

A

Disasters

54
Q

The biggest security problem for health database systems is. …

A

Unauthorized User

55
Q

An employee of the company that has legitimate access to the database system, but access of information beyond what is needed for their job or task.

A

Unauthorized User

56
Q

Five types of malicious computer programs:

A

Viruses
Worms
Trojan Horses
Logic Bombs
Bacteria

57
Q

Can damage data, but may only be an annoyance.

A

Viruses

58
Q

Computer must be running in order for these to spread

A

Viruses

59
Q

Named after the pattern of damage they perform

A

Worms

60
Q

Use LAN and WAN practices to spread and reproduce

A

Worms

61
Q

Appear to be performing a legitimate task, but actually do something else.

A

Trojan Horse

62
Q

These malicious programs do not self- replicate.

A

Trojan Horse

63
Q

These malicious programs can be easily confined once found.

A

Trojan Horse

64
Q

Triggered by a specific bit of data.

A

Logic Bombs

65
Q

Can be hidden in a normal program.

A

Logic Bombs

66
Q

Type of virus

A

Logic bombs & Bacteria

67
Q

Are not attached to existing programs

A

Bacteria

68
Q

Malicious software

A

Viruses or Trojan horses

69
Q

Two types of programs are essential to the security of today’s computers

A

Antivirus software and spyware detection software

70
Q

The process of using mathematical formulas to code data so that it is unrecognizable if it is intercepted by someone outside of the system.

A

Encryption

71
Q

Three ways that encryption can be handled by the company:

A

At the desktop, administrated, or server wide.

72
Q

How many levels are there for user authentication security?

A

Three

73
Q

What level of Authentication Security:
Once an individual is logged into the system (using their name and password), their name appears on the screen and their access is tracked as they use the system.

A

Level One

74
Q

What level of Authentication Security:
Users are automatically logged out after some period of inactivity and must log in again.

A

Level One

75
Q

What level of Authentication Security:
Must update their password on a regular basis.

A

Level One

76
Q

What level of Authentication Security:
Most Secured level

A

Level Three

77
Q

What level of Authentication Security:
Encrypted key- based authentication

A

Level Two

78
Q

What level of Authentication Security:
User must present computer access card (CAC) to the system before they can log in.

A

Level Two

79
Q

What level of Authentication Security:
Automatic log out if CAC is too far from the computer.

A

Level Two

80
Q

What level of Authentication Security:
Uses something unique to the individual such as: fingerprint, retinal scan, or face recognitition

A

Level Three; Biometric authentication

81
Q

What level of Authentication Security:
Cannot be lost or stolen

A

Level Three

82
Q

How many characters for a secured password?

A

Eight

83
Q

Records of activity related to systems and applications, users’ access, and use of systems and applications.

A

Audit Trials

84
Q

A security tool that allows administrators to track individual users, identify the cause of problems, note data modification and misuse of equipment, and reconstruct computer events.

A

Audit Trials

85
Q

Include event records and keystroke monitoring

A

Audit trials

86
Q

Audit trials at this level generally record any logins, including identification, date, and time, devices used, and functions.

A

System Level

87
Q

Audit trials at this level monitor activity within the application, including opened files, editing, reading, deleting, and printing.

A

Application Level

88
Q

items used to authenticate a person’s identity and allow access to a system.

A

Tokens

89
Q

Generate one time passwords

A

SecureID by RSA

90
Q

These include driver’s licenses and employee badges but provide very little security as they can easily be falsified or stolen.

A

ID cards

91
Q

These combine use of the token with other information, such as user name and password.

A

Challenge- response tokens

92
Q

These contain microchips with information that can be programmed to allow access, like a debit card.

A

Smart cards

93
Q

Track who is accessing a system and the duration of access.

A

Databases

94
Q

May occur as the result of a number of different problems.

A

Security failures

95
Q

Penetration can result from undetected vulnerabilities.

A

System Penetration

96
Q

System penetration perpretrators

A

cyberhackers, hackers, computer specialists, authorized users, unauthorized users, and opportunists.

97
Q

This includes physical damage to the system or purposeful alterations in applications

A

Destruction/ sabotage

98
Q

May result from poor design, incorrect entries, system changes, poorly trained personnel, and absence of adequate procedures, policies and education

A

Password management

99
Q

How many categories of threats to a computer system are there?

A

Four

100
Q

Can be either natural or man made.

A

Environmental Disasters

101
Q

These include blizzards, earthquakes, epidemics, floods, tornadoes, and hurricanes.

A

Natural Disaster

102
Q

Chemical contamination, power outages, accidents when hardware is being transported, and toxic fumes.

A

Man- made environmental disasters

103
Q

One of the major causes of problems with a computer system.

A

Human errors

104
Q

Includes overwriting files, accidently deleting files, and overloading the system with unnecessary programs.

A

Human errors

105
Q

Includes theft, malicious programs, terrorism, and cybercrime.

A

Human mischieft

106
Q

Includes disconnecting wiring, CPU crashes, and storage drive failure

A

Equipment failure

107
Q

the American Recovery and Reinvestment Act of 2009 included:

A

Health Information Technology and Economic and Clinical Health Act (HITECH)

108
Q

Provides incentive payments to Medicare practitioners to adopt electronic health records (EHRs)

A

HITECH

109
Q

Provides penalties in the form of reduced Medicare payments for those who do not adopt EHRs, unless exempted by hardship.

A

HITECH