his unit 7 3rd shift Flashcards

1
Q

The right to be left alone
The right to keep personal information secret

A

Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Mechanisms to ensure the safety of data and systems in which the data reside

A

Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Sharing or disseminating data only to those with a “need to know”

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Confidentiality is the status accorded to data or information indicating that it is sensitive for some reason and therefore it needs to be protected against?

A

theft,
disclosure or
improper use, or both, and must be disseminated only to authorized individuals or organizations with a need to
know

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Security is the means to control access and protect information from _________ disclosure to unauthorized persons and from ____________

A

accidental or intentional ; alteration, destruction or loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Privacy is the right to ______ personal
information and __________ into one’s private affairs

A

control; freedom from intrusion or
invasion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the challenges from proliferation of technologies and applications?

A

Increased technology use by all care providers

Health information exchange and data-sharing activities across multiple networks

Cloud computing and third-party outsourcing
Increased use by patients, families, and consumers of their devices (tablets, smartphones, etc.)

New models of care require more care providers to access data across the patient care continuum

Clinicians using their own devices like personal laptops, tablet devices, smartphones, and so on

Connected medical devices and implantable devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are characteristics of connected medical devices and implantable devices?

A

Computer profiling and mistakes in the computer
matching of personal data are other controversial threats to privacy.

Spamming is the favorite tactic of mass mailers of unsolicited advertisements, or junk e-mail. Spamming has also been used by cyber- criminals to spread computer viruses or infiltrate many computer systems.

Flaming is the practice of sending extremely critical, derogatory, and often vulgar e-mail messages ( flame mail) or newsgroup postings to other users on the Internet or online services.

Some lacks privacy law

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Examples of privacy law?

A

HIPAA- The Health Insurance Portability and Accountability Act (HIPAA) was enacted by the U.S. Congress in 1996.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is HIPAA?

A

A broad piece of legislation intended to address a wide variety of issues related to individual health insurance. Two important sections of HIPAA include the privacy rules and the security rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the result of effective protection measures?

A

Data security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Data security is the sum of measures that safeguard data and computer programs from undesired occurrences and exposure to?

A
  • accidental or intentional disclosure to unauthorized persons
  • accidental or malicious alteration,
  • unauthorized copying,
  • loss by theft or destruction by hardware failures, software
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the data privacy act of 2012?

A

A comprehensive and strict privacy legislation “to protect the fundamental human right of privacy, of communication while ensuring free flow of information to promote innovation and growth.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a subset of a security breach that
actually leads to “accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to, personal data transmitted, stored, or otherwise processed.

A

Personal Data Breach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the requirements of a breach notification?

A
  • The breached information must be sensitive personal
    information, or information that could be used for identity fraud
  • There is a reasonable belief that unauthorized acquisition has occurred
  • The risk to the data subject is real
  • The potential harm is serious.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the flow of information in healthcare?

A

Direct Patient Care to Support Activity and “Social” uses
Support activity to Commercial uses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the definitions of a computer crime?

A

the unauthorized use, access, modification, and destruction of hardware, software, data, or network resources;

the unauthorized release of information ;

the unauthorized copying of software;

denying an end user access to his or her own hardware, software, data, or network resources ; and

using or conspiring to use computer or network resources to obtain information or tangible property illegally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Who gave this definitions of computer crime?

A

Association of Information Technology Professionals (AITP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the key features o a secure system and network?

A
  • Authentication
  • Authorization and access control
  • Data integrity
  • Accountability
  • Availability
  • Data storage
  • Data transmission
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Ensures that the actions of any entity can be traced during the movement of data from its source to the patient

A

Accountability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Access control lists for predefined users

A

Authorization and Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Access control includes?

A
  • Reading
  • Writing
  • Modifications
  • Deletion of data
  • Deletion of programs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Protecting and maintaining the physical location of the
data and the data itself

A

Data Storage

24
Q

Error detection and error correction protocols

A

Data Integrity

25
Q

Means of verifying the correct identity and/or group membership of individual or other entities

A

Authentication

26
Q

What are some methods of authentication?

A
  • User name
  • Known only by the user (e.g., password)
  • Held only by the user (e.g., digital signature, secure ID)
  • Attributable only to the user (e.g., finger print, retinal scan)
27
Q

Used to support information accuracy to ensure that data have not been altered or destroyed in an unauthorized manner

A

Dats Integrity

28
Q

Methods of availability?

A
  • Back ups
  • Protecting and restricting access
  • Protecting against viruses
29
Q

Physical protection of processors, storage media,
cables, terminals, and workstations

Retention of data for mandated period of time

A

Data Storage

30
Q

Exchange of data between person and program or program and program when the sender and receiver are remote from one another

A

Data Transmission

31
Q

What is Firewall and Encryption?

A

Encryption
* Scrambles readable information
* De-encrypt with proper key by recipient

Firewall
* Filtering mechanism so that only authorized traffic is allowed to pass

32
Q

Audit trails include?

A
  • Identification of the user
  • Data source
  • Whose information
  • Date and time
  • Nature of the activity
33
Q

Protecting and maintaining the physical location of the
data and the data itself

A

Data Storage

34
Q

Ethical principles in health informatics?

A

A program should undergo appropriate evaluation prior to use in clinical practice. It should perform efficiently at an acceptable financial and timeframe cost.

Adequate training and instruction should be completed before proceeding to the implementation

A qualified health professional should be assigned to handle concerns regarding uses, licenses, and other concerns. The software system’s applications should not replace functions as decision-making.

35
Q

What are the principles of technology ethics?

A

Proportionality
Informed Consent
Justice
Minimized Risk

36
Q

The good achieved outweigh the harm or risk
There should be no alternative that achieves the same/comparable benefits with less harm/risk

A

Proportionality

37
Q

Technology must be implemented so as to avoid all unnecessary risk

A

Minimized Risk

38
Q

Benefits and burdens must be distributed fairly

A

Justice

39
Q

Those affected must understand and accept the risks

A

Informed Consent

40
Q

Disruptive innovations are a double-edged sword, bringing both opportunity and risk

A

Issues

41
Q

What are the issues regarding EHR?

A

EHRs and computer use should facilitate patient care, support physician ethical duties, and support the patient– physician relationship

EHR use should assist and enhance clinical reasoning, development of cognitive and diagnostic skills. Features such as copy-and-paste should be employed judiciously, reflect thought processes about the current patient encounter and meet the ethical requirements for an accurate and complete medical record

Privacy and confidentiality must be maintained in EHR use

42
Q

_____ may “inadvertently narrow the scope of inquiry prematurely, a common cause of diagnostic error,” and impede the development of skills and reasoning.

A

Diagnosis-specific prompts

43
Q

Some features of electronic documentation may encourage _________

A

superficial clinical thinking and interaction.

44
Q

Physicians and students may focus on _______ but not assessing the patient’s current needs.

A

“screen-driven” information-gathering, scrolling and asking questions as they appear on the computer”

45
Q

EHR information retrieval, exchange, and remote access can improve care, but also ________

A

create the risk of unauthorized disclosure and use of protected health information

46
Q

Respect for patient autonomy requires that patient
encounters and information are kept confidential and
private, fostering trust and improving communication

A

Patient Privacy/Confidentiality Issues

47
Q

EHRs are tools that should facilitate high-value patient
centered care, strong patient–physician relationships, and effective training of future physicians. Anything less… does not compute

A

Ethics on EHR

48
Q

Ethics on EHR includes policy bodies who have recognized the potential for ______ to improve care, they have also cautioned that it does not effectively support the diagnostic process and may contribute to errors

A

health information technology (HIT)

49
Q

T or F: Breaches may occur accidentally

A

T

50
Q

EHRs can increase participation and engagement in
health care through patient access, empowerment, and
improved communication.

A

Access to Information

51
Q

T or F: Patients are always aware that they can access
their records.

A

F; may not be aware

52
Q

What is PCASSO?

A

Patient-Centered Access to Secure Systems Online

53
Q

What are the design goals of PCASSO?

A

To enable secure use of the Internet to access sensitive
patient information

To enable providers and patients to view medical data online

To develop a published, verifiable high-assurance architecture
Not proprietary
No “black box” or trade secret security

54
Q

Functions of PCASSO?

A
  • Protect healthcare information at multiple levels of sensitivity
  • Authorize user actions based on familiar healthcare roles
  • End-to-end user accountability
  • Empower consumers to access their own medical records
  • Patient viewable audit trails
  • Automated e-mail notification of records changes
  • Security protection extended to user PC
55
Q

T or F: It is possible for EHR to simultaneously facilitate and complicate the delivery of health care

A

T

56
Q

T or F: EHRs should have the power to enhance or impede communication and relationship-building.

A

T

57
Q

T or F: In the hospital setting, reliance on computers is decreasing.

A

F; increasing, leading to a focus on the “iPatient”