MT 637 UNIT 7 Flashcards

1
Q

The right to be left alone
The right to keep personal information secret
The right control to personal information

A

Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Freedom from intrusion or invasion into one’s
private affairs

A

Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Federal law that required the creation of national standards to protect sensitive patient health information from being disclosed without the patient’s consent or knowledge

A

Health Insurance Portability and Accountability
Act of 1996

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Sharing or dissemination data only to those with a “need to know”

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The status accorded to data or information indicating that is sensitive for some reason and therefore it needs to be protected against
- Theft
- Disclosure
- Improper use, or both, and must be disseminated only to authorized individuals or organizations with a need to know

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Information must be protected against

A
  1. Theft
  2. Disclosure
  3. Improper use
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The means to control access and protect information from accidental or intentional disclosure to unauthorized persons and from alteration destruction or loss

A

Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Mechanisms to ensure the safety of data and systems in which the data reside

A

Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Challenges from Proliferation of Technologies & Applications

A
  1. Increased technology use by all care providers
  2. Health information exchange and data-sharing activities across multiple networks
  3. Cloud computing and third-party outsourcing
  4. Increased use by patients, families, and consumers of their devices (tablets, smartphones, etc.)
  5. New models of care require more care providers to access data across the patient care continuum
  6. Clinicians using their own devices - Personal laptops, tablet devices, smartphones, and so on
  7. Connected medical devices and implantable devices
  8. Computer profiling and mistakes
  9. Spamming
  10. Flaming
  11. Lacks privacy law
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

TRUE/FALSE: Computer profiling and mistakes in the computer matching of personal data are other controversial threats to privacy.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Favorite tactic of mass mailers of unsolicited advertisements, or junk e-mail. It has also been used by cyber-criminals to spread computer viruses or infiltrate many compute systems

A

Spamming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

practice of sending extremely critical, derogatory, and often vulgar e-mail messages (flame mail) or newsgroup postings to other users on the Internet or online services

A

Flaming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

was enacted by the U.S congress in 1996. It is a broad piece of legislation intended to address a wide variety of issues related to individual health insurance.

A

Health Insurance Portability and Accountability Act (HIPPA )

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The result of effective protection measures

A

Data Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The sum of measures that safeguard data and computer programs from undesired occurrences

A

Data Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

DATA SECURITY

The sum of measures that safeguard data and computer programs from undesired occurrences and exposure to:

A

○ Accidental or intentional disclosure to unauthorized persons
○ Accidental or malicious alteration,
○ Unauthorized copying,
○ Loss by theft or destruction by hardware failures, software deficiencies, operating mistakes, or physical damage by fire, water, smoke, excessive temperature, electrical failure, or sabotage or combination thereof

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Institute laws and govern these issues (privacy)

A

National Privacy Commission (NPC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

In 2012 the Philippines passed the comprehensive and strict privacy legislation “to protect the fundamental human right of privacy, of communication while ensuring free flow of information to promote innovation and growth.” Republic Act No. 10173, Ch.1, Sec. 2 .

A

Data Privacy Act of 2012

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A subset of a security breach that actually leads to “accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to, personal data transmitted, stored, or otherwise processed.

A

Personal Data Breach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Requirements of Breach Notification

A

● The breached information must be sensitive personal information, or information that could be used for identity fraud, and
● There is a reasonable belief that unauthorized acquisition has occurred, and
● The risk to the data subject is real, and
● The potential harm is serious

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Provider

A

Direct Patient Care

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Clinic

A

Direct Patient Care

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Hospital

A

Direct Patient Care

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Payors

A

Support activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Quality Reviews

A

Support activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Administration

A

Support activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Insurance eligibility

A

Social Uses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Public Health

A

Social Uses

29
Q

Medical Research

A

Social Uses

30
Q

Marketing

A

Commercial Uses

31
Q

Managed Care

A

Commercial Uses

32
Q

Drug Usage

A

Commercial Uses

33
Q

The unauthorized use, access, modification, and destruction of hardware, software, data, or network resources

Association of Information Technology Professionals (AITP )

A

Computer Crime

34
Q

The unauthorized release of information

Association of Information Technology Professionals (AITP )

A

Computer Crime

35
Q

The unauthorized copying of software

A

Computer Crime

36
Q

Denying an end user access to his or her own hardware, software, data, or network resource

A

Computer Crime

37
Q

Using or conspiring to use computer or network resources to obtain information or tangible property illegally

A

Computer Crime

38
Q

Key Features of A Secure System & Network

A
  1. Authentication
  2. Authorization & Access Control
  3. Data Integrity
  4. Accountability
  5. Availability
  6. Data Storage
  7. Data Transmission
39
Q

Means of verifying the correct identity and/or group membership of individual or other entities

A

Authentication

40
Q

Methods for authentication:

A

○ User name
○ Known only by the user (e.g., password)
○ Held only by the user (e.g., digital signature, secure ID )
○ Attribute only to the user (e.g., finger print, retinal scan)

41
Q

Access control lists for predefined users
○ Reading
○ Writing
○ Modifications
○ Deletion of data
○ Deletion of program

A

Authorization & Access Control

42
Q

Used to support information accuracy to ensure that data have not been altered or destroyed in an unauthorized manner

A

Data Integrity

43
Q

Error detection and error correction protocols

A

Data Integrity

44
Q

Ensures that the actions of any entity can be traced during the movement of data from its source to its recipient

A

Accountability

45
Q

Audit trails
○ Identification of the users
○ Data source
○ Whose information
○ Data and time
○ Nature of the activity

A

Accountability

46
Q

Ensures information is immediately accessible & usable by authorized entity

A

Availability

47
Q

Methods for Availability

A

Backups
Protecting and restricting access
Protecting against viruses

48
Q

Protecting and maintaining the physical location of the data and the data itself

A

Data Storage

49
Q

Physical protection of processors, storage media, cables, terminals, and workstations

A

Data Storage

50
Q

Retention of data for mandated period of time

A

Data Storage

51
Q

Exchange of data between person and program or program and program when the sender and receiver are remote from one another

A

Data Transmission

52
Q

Scrambles readable information

De-encrypt with proper key by recipient

A

Encryption

53
Q

Filtering mechanism so that only authorized traffic is allowed to pass

A

Firewall

54
Q

A program should undergo appropriate evaluation prior to use in clinical practice. It should perform efficiently at an acceptable financial and time frame cost.

A

Ethical Principles

55
Q

Adequate training and instruction should be completed before proceeding to the implementation.

A

Ethical Principles

56
Q

A qualified health professional should be assigned to handle concerns regarding uses, licenses, and other concerns. The software system’s applications should not replace functions as decision-making

A

Ethical Principles

57
Q

Principles of Technology Ethics

A
  1. Proportionality
  2. Informed Consent
  3. Justice
  4. Minimized Risk
58
Q

The good achieved by the technology must outweigh the harm or risk. Moreover, there must be no alternative that achieves the same or comparable benefits with less harm or risk

A

Proportionality

59
Q

Those affected by the technology should
understand and accept the risks.

A

Informed consent

60
Q

The benefits and burdens of the technology should be distributed fairly. Those who benefit should bear their fair share of risks, and those who do not benefit should not suffer a significant increase in risk

A

Justice

61
Q

Even if judged acceptable by the other three guidelines, the technology must be implemented so as to avoid all unnecessary risk.

A

Minimized Risk

62
Q

Disruptive innovations are a double-edged sword, bringing both opportunity and risk

The electronic health record EHR , for example, simultaneously facilitates and complicates the delivery of health care

A

Ethical Implications of the EHR in the Service of the Patient Issues

63
Q

Respect for patient autonomy requires that patient encounters and information are kept confidential and private, fostering trust and improving communication

Breaches may occur accidentally

A

Patient Privacy

64
Q

EHRs can increase participation and engagement in health care through patient access, empowerment, and improved communication. However, patients may not be aware that they can access their records

A

Access to Information

65
Q

Policy bodies have recognized the potential for health information technology HIT to improve care, they have also cautioned that HIT does not effectively support the diagnostic process and may contribute to errors

A

Ethics on EHR

66
Q

EHRs are tools that should facilitate high value patient centered care, strong patient physician relationships, and effective training of future physicians. Anything less… does not compute

A

Ethics on EHR

67
Q

PCASSO

A

PATIENT CENTERED ACCESS TO SECURE SYSTEMS ONLINE

68
Q

PCASSO Design Goals

A

● To enable secure use of the Internet to access sensitive patient information
● To enable providers and patients to view medical data online
● To develop a published, verifiable high assurance architecture
- Not proprietary
- No “black box” or trade secret security

69
Q

PCASSO Function

A

● Protect healthcare information at multiple levels of sensitivity
● Authorize user actions based on familiar healthcare roles
● End to end user accountability
● Empower consumers to access their own medical records
● Patient viewable audit trails
● Automated email notification of records changes
● Security protection extended to user PC