HCISPP 2 Flashcards
Refers to preventing the disclosure of information to unauthorized individuals or systems. Necessary for maintaining the privacy of the people whose personal information is held in the system.
Confidentiality
Two types: 1) the person whom the actual data pertains, i.e. the patient receiving the treatment. this is the individual who has the final determination for how the data is used and by whom the data can be used or disclosed. 2) the healthcare organization who provides the treatment services for the patient and captures information during treatment services.
Data Owners
the principle that states that should be limits to the collection of personal data and any such data should be obtained by lawful and fair means and., where appropriate, with the knowledge or consent of the data subject.
Collection Limitation Principle
a security principle stating that a user should have access only to the data he or she needs to perform a particular function.
Need to know
Assets with a physical presence
Tangible Assets
(CPT) codes are published by the American Medical Association. It is a five (5) digit numeric code that is used to describe medical, surgical, laboratory, anesthesiology, and evaluation management services of physicians, hospitals, and other healthcare providers. There are approximately 7800. Two digit modifiers may be appended when appropriate to clarify or modify the description of the procedure.
Current Procedural Terminology
HSM is one type of DLM product. It represents different types of storage media, such as redundant array of independent disk (RAID) systems, optical storage, or tape, each type representing a different level of cost and speed of retrieval when access is needed. An administrator can establish state guidelines for how often different kinds of files are to be copied to a backup storage device. Once a guideline has been set, the software manages everything automatically.
Hierarchal Storage Management
the principle that states that personal data should not be disclosed, made, available, or otherwise used for purposes other than those specified in accordance with the purpose specification principle
use limitation principle
the appropriate risk response for that portion of risk that cannot be accepted, avoided, shared, or transferred
risk mitigation
controls that capture things such as who is responsible for information security at the third party, what types of processes the third party has in place to request access to data, and also would include ensuring that the third party has appropriate security policies, procedures, and standards
Administrative Controls
the principle that states that a data controller should be accountable for complying with measures
Accountability principle
the world’s largest standards organization, with more than 30 standards addressing information security practices and audit, and each of the standards is constantly reviewed and updated, which requires consistent attention for keeping up with the latest standard changes.
ISO
Part of the US Department of Commerce and addresses the measurement infrastructure within science and technology efforts within the US federal Govt
NIST
Govt Funded health care: a program funded by the US federal and state govts that pays the medical expenses of people who are unable to pay some or all of their own medical expenses.
Medicaid
the uninvolved vendors, business partners, or other data sharing associates. The first party is the patient himself/herself or the person, such as the parent, responsible for the patient’s health bill. The second party is the physician, clinic, hospital, nursing home, or other health care entity rendering the care. These second parties are often called providers because they provide health care.
Third Parties
the activities undertaken by either a health plan to obtain premiums or to determine or fulfill its responsibility for coverage and provision of benefits under the health plan; or a covered healthcare provider or health plan to obtain or provide reimbursement for the provision of healthcare.
Payment
a plan that takes the output of the risk assessment and identifies tasks needing to be accomplished to mitigate
corrective action plan
controls that encompass areas such as facility access, fire protection, and visitor procedures
Physical controls
determines what protections need to be in place to guard data based on its sensitivity and value as well as the risk of exposure
security
How the organizational representatives identify the most critical data to be given the highest protection
Data Categorization
systems that assign a distinct numeric value to medical diagnosis, procedures and surgery, signs and symptoms of disease and ill-defined conditions, poisoning, adverse effects of drugs, complications of surgery, and medical care. The assigned codes and other patient data are processed by the grouper software to determine a DRG for the episode of care which is used for funding and reimbursement.
Medical Coding
Very similar to the BAA in which the recipient of the data set would agree to limit the use of the data for the purposes for which it was given to ensure the security of the data and not to identify the information or use it to contact any individual.
Data Use Agreement
Includes the technologies, tools, and methods used to capture, manage, store, preserve, and deliver content across an enterprise.
Enterprise Content Management
the primary liaison for the CIO to the organizations authorizing officials, information system owners, common control providers, and information system security officers.
Senior Information Security Officer