Cyber security Training Flashcards

(40 cards)

1
Q

What does pci dss stand for

A

Payment card industry data security standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is pci dss for

A

Security standards and safe guards for the protection of card holder data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Business associates sign agreements related to phi use and protection in relation to this act

A

Hitech act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does HITECH stand for?

A

Health Information Technology for Economic and Clinical Health

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

True or False: The HITECH Act was enacted in 2009.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the primary purpose of the HITECH Act?

A

To promote the adoption and meaningful use of health information technology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Fill in the blank: The HITECH Act requires breach notifications for _____ of unsecured protected health information.

A

unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the time frame for notifying affected individuals after a breach under the HITECH Act?

A

Within 60 days of discovering the breach.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which entities are covered by the HITECH Act’s breach notification requirements?

A

Covered entities and business associates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

True or False: The HITECH Act allows for a single breach notification to be sent to all affected individuals.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the minimum number of individuals that must be notified for a breach to require a media notification?

A

500 or more.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What type of information is protected under the HITECH Act?

A

Protected Health Information (PHI).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Multiple Choice: Which of the following is NOT a requirement under the HITECH Act?

A

Notifying the press for every breach.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What must be included in a breach notification?

A

A description of the breach, the types of information involved, and steps individuals can take to protect themselves.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

True or False: The HITECH Act mandates that breaches must be reported to the Department of Health and Human Services (HHS).

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the penalty for failing to notify individuals of a breach under the HITECH Act?

A

Penalties can range from $100 to $50,000 per violation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Fill in the blank: The HITECH Act increases penalties for violations of _____.

18
Q

What is the role of the Office for Civil Rights (OCR) in relation to the HITECH Act?

A

Enforcement of HIPAA and HITECH Act regulations.

19
Q

True or False: Business associates are not required to notify covered entities of breaches.

20
Q

What is considered a ‘breach’ under the HITECH Act?

A

An unauthorized acquisition, access, use, or disclosure of PHI.

21
Q

Multiple Choice: Which of the following scenarios would NOT constitute a breach?

A

A patient shares their health information with a family member with consent.

22
Q

What is the significance of the ‘risk of harm’ standard in breach notifications?

A

It determines whether a breach must be reported based on the potential harm to individuals.

23
Q

Fill in the blank: The HITECH Act requires that breach notifications be sent via _____ methods.

24
Q

What does ‘unsecured PHI’ refer to?

A

PHI that is not encrypted or otherwise rendered unusable.

25
True or False: Organizations can use email to notify individuals of a breach without any security measures.
False
26
What is a 'business associate' under the HITECH Act?
A person or entity that performs functions on behalf of a covered entity involving the use of PHI.
27
Fill in the blank: The HITECH Act was part of the _____ Act.
American Recovery and Reinvestment
28
What is the enforcement mechanism for breaches under the HITECH Act?
Civil monetary penalties and potential criminal charges.
29
Phi may be collected, shared, and stored via HIT with reasonable security; a few examples of reasonable security
Passwords, encryption, and firewalls
30
A few reasonable securities for physical records are
Locking doors, windows, closets and filling cabinets to limit access
31
UHS auditing requires company related data to be stored in system servers; these are typically known as (hint* h-drive and s-drive)
Network drive and file share
32
Most security breaches involve stolen (blank)
Passwords
33
You can type "Private" in the subject line of emails to ensure (blank)
Auto encryption
34
When sending encrypted information to 3rd parties, refer to these requirements
UHS privacy and security encryption requirements
35
This common email attack requests recipients to update or verify information and may include links or attachments
Phishing scams
36
Mobile device use for UHS purposes, requires appropriate security measures that also meet the encryption and decryption policy, and requires an app to be installed called
AirWatch App
37
This policy prohibits posting phi, photos of patients, and even photos of other employees
Social media corporate policy
38
UHS policy only allowed use of portable (blank) drives that meet encryption policy
Thumb drives
39
UHS compliance officer must be notified of credit card information had been lost or misused n accordance with this standard
Payment card industry data security standards (pci dss)
40
Employees processing credit card information cannot store hand written info, nor can they store electronically. This report does however allow a settlement to be ran daily and balanced, and variances must be reported
A credit card settlement report