Confedintiality And Privacy Flashcards
(36 cards)
Pateint confedintiality is important especially with information pertaining to disease __________________
Sexual, psychology and drug alcohol disease
_______, _______and________are supported the consenpt of protected health information PHI available data in EHR
CMS, HHS, HIPPA
HIPPA, HHS, CFR
CFR, OIG, HIPPA
HIPPA, CFR, HHS
HIPPAA is stand for __________
Health insurance and portability and accountability act
Under _________privacy rule pateints have right to protect their information, right to access their own records
HIPPAA
___________is governmental body that responsible for the inforcment of the privacy rule
THE office of civil rights
OCR
The office of civil rights works with ______to investigate the breach of confidential that leads to criminal cases
DOJ
department of Justice
Healthcare provider, Healthcare plans and health care clearinghouse that comply with HIPPAA regulations means
Covered entities
The second name of HIPPAA is ________
Privacy rule
Training the health care provider regarding the privacy is considered optional
True
False
False
Displenary action up to violate employee termination may be an appropriate course of action
True
False
True
If the manager is the privacy violater, ________&, _________should be notified through compliance hotline
Corporate Compliance officer
Privacy officer
Compliance of HIPPAA regulation means the covered entities have taken ________to protect the privacy and confedintiality of pateint health information
Measures
How many days required to file the complaint of privacy violation if occurred in office for civil rights OCR?
60 days
90 days
180 days
180 days
Facility access control to safe the IT area and pateint information consider _______ safeguard
Technical safeguard
Physical safeguard
Physical safeguard
Individual authentication ensure person needing access is valid requester, this consenpt is _____-
Technical safeguard
Physical safeguard
Technical safeguard
Targeted emails aimed at stealing information, like request money or request personal information__________
Phishing email
Lock accounts with more 3 unsuccessful attempts to ensure __________PHI
Privacy
Security
Security
The amount of pateint information that is released or access only when there is a legitimate need to know. Called _______
Minimum necessary
It is important for health employees to understand that accessing their own health information is prohibited.
TRUE
FALSE
True
When a patient request his/her health information to himself or third party, __________ is required
Written authorization
Once the health information is released, the releasing healthcare entities has no control over what happen to the information from the point forward
True
False
True
The court and subpoena order health information record, HIM manager has to obeyed.
TRUE
FALSE
True
________Security methods that applies mathematical algorithms that scramble the data into format that cannot be deciphered by people or comprtrized system.
ENCRYPTION
Method aimed to protect information that collected and maintained in the culture of information technology from cyber criminal.
By focus on preventing information theft or attackt
Cybersecurity