Unit 7: Health Information, Privacy, Confidentiality, Security, and Ethics Flashcards

1
Q

The right to be left alone

a. privacy
b. confidentiality
c. security
d. ethics

A

privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The right to keep personal information secret

a. privacy
b. confidentiality
c. security
d. ethics

A

privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The right to control personal
information

a. privacy
b. confidentiality
c. security
d. ethics

A

privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

freedom from intrusion or invasion into one’s private affairs

a. privacy
b. confidentiality
c. security
d. ethics

A

privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Sharing or disseminating data only to those with a “need to know”

a. privacy
b. confidentiality
c. security
d. ethics

A

confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

the status accorded to data or information indicating that it is sensitive for some reason and therefore it needs to be protected

a. privacy
b. confidentiality
c. security
d. ethics

A

confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Odd one out:
Data must be protected against

a. theft
b. disclosure
c. improper use
d. dissemination to authorized entities

A

dissemination to authorized entities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

the means to control access and protect information from accidental or intentional disclosure to unauthorized persons and from alteration, destruction or loss

a. privacy
b. confidentiality
c. security
d. ethics

A

security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Mechanisms to ensure the safety of data and systems in which the data reside

a. privacy
b. confidentiality
c. security
d. ethics

A

security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Odd one out:
Challenges from Proliferation of Technologies and Applications

a. Increased technology use by all care providers
b. Selective health information dissemination on all platforms
c. Cloud computing and third-party outsourcing
d. Increased use by patients, families, and consumers of their devices

A

Selective health information dissemination on all platforms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Odd one out:
Challenges from Proliferation of Technologies and Applications

a. New models of care require more care providers to access data across the patient care continuum
b. Health information exchange and data-sharing activities across multiple networks
c. Localized computing and in-house operations
d. Clinicians using their own device
e. Connected medical devices and implantable devices

A

Localized computing and in-house operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

T/F:
Computer profiling and mistakes in the computer matching of personal data are other controversial threats to security.

A

false;
threats to PRIVACY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

the favorite tactic of mass mailers of unsolicited advertisements, or junk e-mail

a. flaming
b. spamming

A

spamming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

T/F:
Spamming has also been used by cyber-criminals to spread computer viruses or infiltrate many computer systems.

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

the practice of sending extremely critical, derogatory, and often vulgar e-mail messages ( flame mail) or newsgroup postings to other users on the Internet or online services.

a. flaming
b. spamming

A

flaming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

a broad piece of legislation intended to address a wide variety of issues related to individual health insurance (enacted by the U.S. Congress in 1996)

a. HITECH Act (Health Information Technology for Economic and Clinical Health Act)
b. GDPR (General Data Protection Regulation):
c. HITEP (Health Information Technology Extension Program)
d. Health Insurance Portability and Accountability Act (HIPAA)

A

Health Insurance Portability and Accountability Act (HIPAA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

the result of effective protection measures

a. data security
b. data privacy
c. network security
d. access control

A

data security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

the sum of measures that safeguard data and computer programs from undesired occurrences

a. data privacy
b. access control
c. network security
d. data security

A

data security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Odd one out:
Data security provides protection from exposure to

a. accidental or intentional disclosure to unauthorized persons
b. accidental or malicious alteration
c. preservation of data integrity
d. unauthorized copying
e. loss by theft or destruction by hardware failures

A

preservation of data integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

In this year, the Philippines passed the comprehensive and strict privacy legislation “to protect the fundamental human right of privacy, of communication while ensuring free flow of information to promote innovation and growth.”

a. Data Privacy Act of 2010
b. Data Privacy Act of 2011
c. Data Privacy Act of 2012
d. Data Privacy Act of 2013

A

Data Privacy Act of 2012

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

a subset of a security breach that actually leads to “accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to, personal data transmitted, stored, or otherwise processed

a. identity theft
b. personal data breach
c. data exposure
d. privacy invasion

A

personal data breach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

T/F:
As a requirement of breach notification, the breached information must be sensitive personal information, or information that could be used for identity fraud.

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

T/F:
As a requirement of breach notification, there is a reasonable belief that authorized acquisition has occurred.

A

false;
unauthorized

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

T/F:
As a requirement of breach notification, the risk to the data subject is real, and the potential harm is serious.

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

defined by the Association of Information Technology Professionals (AITP) as including unauthorized use, release, and copying, denying an end user access, and using or conspiring to use computer illegally

a. cybercrime
b. digital fraud
c. computer crime
d. phishing

A

computer crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Odd one out:
Key Features of a Secure System and Network

a. Authentication
b. Authorization and access control
c. Data integrity
d. Accuracy
e. Accountability

A

Accuracy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Odd one out:
Key Features of a Secure System and Network

a. Availability
b. Reliability
c. Data storage
d. Data transmission

A

Reliability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Means of verifying the correct identity and/or group membership
of individual or other entities

a. Authentication
b. Authorization and access control
c. Data integrity
d. Accountability

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Method(s) for authentication

a. User name
b. Known only by the user (e.g., password)
c. Held only by the user (e.g., digital signature, secure ID)
d. Attributable only to the user (e.g., finger print, retinal scan)
e. All of the above

A

all

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

includes reading, writing, modifications, deletion of data, and deletion of programs for predefined users

a. Authentication
b. Authorization and access control
c. Data integrity
d. Accountability

A

Authorization and access control

31
Q

Used to support information accuracy to ensure that data have not been altered or destroyed in an unauthorized manner

a. Authentication
b. Authorization and access control
c. Data integrity
d. Accountability

A

Data integrity

32
Q

Error detection and error correction protocols

a. Data transmission
b. Authorization and access control
c. Data integrity
d. Accountability

A

Data integrity

33
Q

Ensures that the actions of any entity can be traced during the movement of data from its source to its recipient

a. Authentication
b. Data storage
c. Data integrity
d. Accountability

A

Accountability

34
Q

Ensures information is immediately accessible and usable by authorized entity

a. Availability
b. Authentication
c. Data storage
d. Data transmission

A

Availability

35
Q

Methods to ensure data availability

a. Back ups
b. Protecting and restricting access
c. Protecting against viruses
d. 2 of the choices
e. all

A

all

36
Q

Protecting and maintaining the physical location of the data and the data itself

a. Availability
b. Accountability
c. Data storage
d. Data transmission

A

Data storage

37
Q

Physical protection of processors, storage media, cables, terminals, and workstations

a. Availability
b. Accountability
c. Data storage
d. Data transmission

A

Data storage

38
Q

Retention of data for mandated period of time

a. Availability
b. Accountability
c. Data storage
d. Data transmission

A

Data storage

39
Q

Exchange of data between person and program or program and program when the sender and receiver are remote from one another

a. Availability
b. Accountability
c. Data storage
d. Data transmission

A

Data transmission

40
Q

Scrambles readable information

a. encryption
b. firewall

A

encryption

41
Q

De-encrypt with proper key by recipient

a. encryption
b. firewall

A

encryption

42
Q

Filtering mechanism so that only authorized traffic is allowed to pass

a. encryption
b. firewall

A

firewall

43
Q

T/F:
(Ethical principle)
A program should undergo appropriate evaluation prior to use in clinical practice, and it should perform efficiently at an acceptable financial and timeframe cost.

A

true

44
Q

T/F:
(Ethical principle)
Adequate training and instruction should be completed before proceeding to the implementation.

A

true

45
Q

T/F:
(Ethical principle)
A qualified health professional should be assigned to handle concerns regarding uses, licenses, and other concerns.

A

true

46
Q

T/F:
(Ethical principle)
The software system’s applications should replace functions as decision-making.

A

false;
should not replace

47
Q

The good achieved by the technology must outweigh the harm or risk.

a. proportionality
b. informed consent
c. justice
d. minimized risk

A

proportionality

48
Q

There must be no alternative that achieves the same or comparable benefits with less harm or risk.

a. proportionality
b. informed consent
c. justice
d. minimized risk

A

proportionality

49
Q

Those affected by the technology should understand and accept the risks.

a. proportionality
b. informed consent
c. justice
d. minimized risk

A

informed consent

50
Q

The benefits and burdens of the technology should be distributed fairly.

a. proportionality
b. informed consent
c. justice
d. minimized risk

A

justice

51
Q

Those who benefit should bear their fair share of the risks, and those who do not benefit should not suffer a significant increase in risk.

a. proportionality
b. informed consent
c. justice
d. minimized risk

A

justice

52
Q

Even if judged acceptable by the other three guidelines, the technology
must be implemented so as to avoid all unnecessary risk.

a. proportionality
b. informed consent
c. justice
d. minimized risk

A

minimized risk

53
Q

T/F:
Disruptive innovations are a double-edged sword, bringing both opportunity and risk.

A

true

54
Q

T/F:
EHRs and computer use should facilitate patient care, support physician ethical duties, and support the patient– physician relationship

A

true

55
Q

T/F:
EHRs have the power to enhance or impede communication and relationship-building.

A

true

56
Q

T/F:
In the hospital setting, reliance on computers is decreasing leading to a focus on the “iPatient”

A

false;
increasing

57
Q

T/F:
EHR use should assist and enhance clinical reasoning.

A

true

58
Q

T/F:
EHR use should develop cognitive and diagnostic skills, and features such as copy-and-paste should be employed judiciously.

A

true

59
Q

T/F:
EHR use should reflect thought processes about the past patient encounter

A

false;
current

60
Q

T/F:
EHR use should meet the ethical requirements for an accurate and complete medical record

A

true

61
Q

may “inadvertently narrow the scope
of inquiry prematurely, a common cause of diagnostic error,” and
Impede the development of skills and reasoning

a. Medical Condition-Specific Dialogues
b. Disease-Centric Inquiries
c. Specialized Diagnosis Prompts
d. Diagnosis-specific prompts

A

Diagnosis-specific prompts

62
Q

T/F:
Some features of manual documentation may encourage superficial clinical thinking and interaction.

A

false;
electronic, not manual

63
Q

T/F:
Physicians and students may focus on:
(1) “screen-driven” information-gathering
(2) “scrolling and asking questions as they appear on the computer,” and
(3) assessing the patient’s current needs.

A

false;
not assessing the patient’s current needs

64
Q

T/F:
Privacy and confidentiality must be maintained in EHR use.

A

true

65
Q

T/F:
EHR information retrieval, exchange, and remote access can improve care, but also create the risk of unauthorized disclosure and use of protected health information

A

true

66
Q

Respect for patient autonomy requires that patient encounters and information are kept confidential and private, fostering trust and improving communication

a. Health information security
b. Patient privacy/ confidentiality
c. Access to Information
d. Patient data protection

A

Patient Privacy/Confidentiality

67
Q

T/F:
Breaches may occur accidentally

A

true

68
Q

EHRs can increase participation and engagement in health care through patient access, empowerment, and improved communication.

a. Health information security
b. Patient privacy/ confidentiality
c. Access to Information
d. Patient data protection

A

Access to Information

69
Q

T/F:
Patients are aware that they can access their records.

A

false;
may not be aware

70
Q

T/F:
Policy bodies have recognized the potential for health information technology (HIT) to improve care, they have also cautioned that HIT does not effectively support the diagnostic process and may contribute to errors

A

true

71
Q

tools that should facilitate high-value patient centered care, strong patient–physician relationships, and effective training of future physicians. Anything less… does not compute

a. EMR
b. EHR
c. PMR
d. AHR

A

EHR

72
Q

Odd one out:
Patient-Centered Access to Secure Systems Online (PCASSO) Design Goals

a. enable secure use of the Internet to access sensitive patient information
b. enable providers and patients to view medical data online
c. proprietary and “black box” or trade secret security
d. develop a published, verifiable high-assurance architecture

A

proprietary and “black box” or trade secret security

73
Q

Odd one out:
PCASSO functions

a. Protect healthcare information at one level of sensitivity
b. Authorize user actions based on familiar healthcare roles
c. End-to-end user accountability
d. Empower consumers to access their own medical records

A

Protect healthcare information at one level of sensitivity;
should be multiple levels

74
Q

Odd one out:
PCASSO functions

a. Patient viewable audit trails
b. Manual e-mail notification of records changes
c. Security protection extended to user PC

A

Manual e-mail notification of records changes;
should be automated