Cyber security Training Flashcards
(40 cards)
What does pci dss stand for
Payment card industry data security standards
What is pci dss for
Security standards and safe guards for the protection of card holder data
Business associates sign agreements related to phi use and protection in relation to this act
Hitech act
What does HITECH stand for?
Health Information Technology for Economic and Clinical Health
True or False: The HITECH Act was enacted in 2009.
True
What is the primary purpose of the HITECH Act?
To promote the adoption and meaningful use of health information technology.
Fill in the blank: The HITECH Act requires breach notifications for _____ of unsecured protected health information.
unauthorized access
What is the time frame for notifying affected individuals after a breach under the HITECH Act?
Within 60 days of discovering the breach.
Which entities are covered by the HITECH Act’s breach notification requirements?
Covered entities and business associates.
True or False: The HITECH Act allows for a single breach notification to be sent to all affected individuals.
False
What is the minimum number of individuals that must be notified for a breach to require a media notification?
500 or more.
What type of information is protected under the HITECH Act?
Protected Health Information (PHI).
Multiple Choice: Which of the following is NOT a requirement under the HITECH Act?
Notifying the press for every breach.
What must be included in a breach notification?
A description of the breach, the types of information involved, and steps individuals can take to protect themselves.
True or False: The HITECH Act mandates that breaches must be reported to the Department of Health and Human Services (HHS).
True
What is the penalty for failing to notify individuals of a breach under the HITECH Act?
Penalties can range from $100 to $50,000 per violation.
Fill in the blank: The HITECH Act increases penalties for violations of _____.
HIPAA
What is the role of the Office for Civil Rights (OCR) in relation to the HITECH Act?
Enforcement of HIPAA and HITECH Act regulations.
True or False: Business associates are not required to notify covered entities of breaches.
False
What is considered a ‘breach’ under the HITECH Act?
An unauthorized acquisition, access, use, or disclosure of PHI.
Multiple Choice: Which of the following scenarios would NOT constitute a breach?
A patient shares their health information with a family member with consent.
What is the significance of the ‘risk of harm’ standard in breach notifications?
It determines whether a breach must be reported based on the potential harm to individuals.
Fill in the blank: The HITECH Act requires that breach notifications be sent via _____ methods.
secure
What does ‘unsecured PHI’ refer to?
PHI that is not encrypted or otherwise rendered unusable.