HIPPA: Privacy and Confidentiality: Professional and Legal Responsibilities Flashcards

(82 cards)

0
Q

Includes any information that identifies or could reasonably identify an individual, his or her health/condition, treatment, or provision/payment for healthcare…

A

PHI (personal health information)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

What does PHI stand for?

A

Protected health information (PHI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is defined as all individually identifiable health information created, transmitted, received, or maintained by a covered health entity?

A

Protected health information (PHI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is included in identifying information?

A

-name
-address
-city
-zip code
-names of relatives
-names of employer
-birth date
-telephone number
-fax and email address
-social security number
-medical record number
-health plan beneficiary number
-account number
-certificate/license number
-any vehicle or other device serial number
-Web URL, Internet protocol address
-finger or voice print
photographic images, and any other unique identifying number, characteristic, or code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is PHI included on?

A
  • encounter forms
  • claims
  • appointment schedule
  • reports
  • dietary cards
  • requisitions
  • prior authorizations
  • test results
  • logs
  • pharmacy labels
  • electronic data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Name examples of PHI in the workplace.

A
  • Communication: switchboard, hallway conversations, dictation, shift reports, telephone conversations, and meeting discussions
  • Materials: medical records, meeting minutes, white boards, clinical reports, wristbands, encounter forms, medication vials, downtime logs, printers, paper files, and notes.
  • Data: claims, computer screens, EKG strips, films, email, faxes. and electronic files
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

When dealing with personal information, there does not have to be some middle ground between strict non-disclosure and full disclosure. True or False

A

False
When dealing with personal information, there has to be some middle ground between strict non-disclosure and full disclosure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Some public and private health information must be shared to properly treat populations and individuals. True or False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

With so much information now digitized, and therefore easily transmitted, must there be there be some protection of health information that must remain confidential to the individual?

A

Yes some information must remain confidential to the individual.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Health information has one level of confidentiality. True or False

A

False… Health information has different levels of confidentiality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Information on HIV status or psychiatric diagnosis may have a higher level of confidentiality than something less revealing, such as a zip code. What is this an example of?

A

This is an example of the different levels of health information confidentiality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Some local and state laws may have higher documentation and disclosure requirement over special health information. True or False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the synonym for Health Insurance Portability and Accountability Act

A

HIPPA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

When was HIPPA drafted?

A

HIPPA was drafted in 1996.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What was HIPPA originally drafted for?

A

HIPPA was originally drafted to protect health insurance coverage for workers and families when they changed or lost their jobs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

PHI stands for Personal Health Information T/F

A

False PHI stands for Protected Health Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

PHI is included on most healthcare forms, reports, and screens. T/F

A

True PHI is included on encounter forms, claims, appointment schedules, reports, dietary card, requisitions, prior authorizations, test results, logs, pharmacy labels, electronic data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

All health information has the same level of confidentially T/F

A

False Health Information has different levels of confidentiality. For example, information on HIV status or psychiatric diagnosis may have a higher level of confidentiality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The HIPPA Security Rule requires healthcare entities to protect against any reasonably anticipated threats or hazards to PHI

A

True The security rule requires healthcare entities to ensure the confidentiality, integrity, and availability of all electronic protected health information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

HIPPA defines which types of technologies must be used to safe guard PHI

A

False One thing HIPPA does not specif is the type of technology to secure patient data. This is left to the health entities to figure out. It does specify that the technologies be appropriate to their operations and be supported by a thorough security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The HIPPA Privacy rule gives patients the right to request correction to their medical records.

A

True It gives them the right examine and obtain a copy of their own medical records and request corrections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

An insurer, responsible for payment, is entitled to see all data in a patient’s health record.

A

False Generally limits release of information to a minimum needed for treatment, payment, operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What data a person can see in an EHR is dependent on his or her role.

A

True The role you have will dictate what you have the right to access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

An employee responsible for scheduling will have access to the same EHR functions as a nurse

A

False The role you have dictates the amount of patient information you have the right to access and disclose, so a scheduler on needs access to demographics and insurance information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
If you accidentally view information you should not have access to, report the event to your supervisor.
True
25
As an employee in a healthcare organization, you have the right to access the maximum information needed to care for the patient
False
26
If an individual access a record inappropriately, he she is protected from being fired as long as he/she has completed HIPPA training
False It is becoming common that immediate employment termination could be the consequence of reviewing information that you do not have the right and need to know
27
HIPPA's Privacy and Security policies became law in
1996
28
The HIPPA security rule requires healthcare entities to ensure
the confidentiality, integrity, and availability of PHI
29
HIPPA of 1996 continues to amend with
HITECH
30
What is Title I under HIPPA
Protects health insurance coverage for those who lose or change jobs
31
What is Title II under HIPPA
Standardizes electronic data exchange and protects the confidentiality and security of health data
32
What are the four Parts to Title II of HIPPA
* Standards for electronic transactions * Unique identifiers for providers, employers, and health plans * The security rule * The privacy rule
33
HIPPA Security Rule states
- Security, integrity, and availability of PHI (disclosures of PHI that are not permitted - Safeguard physical access to PHI (protected networks and computers
34
What is Protected Health Information and list for examples
- All individually identifiable health information created, transmitted, received or maintained by a healthcare institution - Identification of an individual - Health condition - Treatment - Provision/payment for healthcare
35
List some examples of identifying information
- Name, address, city, address, county, names of relatives. names of employers, photographic images. DOB, telephone number, fax number. email address social security number, medical record number, certificate/license
36
Name the Safeguards in HIPPA's security Rule
Administrative, Physical, Technical
37
Name some examples of Administrative Safeguard
1. Clear roles and responsibility for who can see what information 2. Documented policies including password policies 3. Security awareness training 4. Security risk assessment 5. Privacy and Security Officer
38
Name some examples of Technical Control Safeguards
1. Firewalls 2. Encryption - Transmission Security 3. Audit trails 4. Antivirus programs 5. Use of passwords or other authentication methods - ---ex----encryption and decryption---------
39
A technical control audit trail consist of
- A log of each user and what is viewed and accessed in any given amount of time - Evaluated for inappropriate access to function or information
40
Technical Controls consists of Data Integrity which is
Required to maintain data integrity so organizations should have - a disaster recovery to protect against the loss of data - ensuring data validity which means having good clean data and: - --editing against list of values - --required fields (can not go any further without being filled in - --required values - -compliance with data standards
41
Technical Control Authentication consist of
The way a system knows who you are and what access and control to give you
42
Authentication is based on
1. What you have (A special card or token) 2. What you know (Password or personal identification number PIN) 3. Who you are - fingerprint or other biometric scan
43
Name the Do's and Don'ts of passwords
1. Do Not Share passwords or cards 2. Do not log on for someone else 3. Do not keep passwords in an obvious place 4. Make sure system has a time-out and auto log off 5. Use a strong password
44
What are the characteristics of a strong password
Upper case, number and symbol
45
Explain Role-Based security
- The job you have will dictate what you have the right to access and to disclose - ONLY access information that you absolutely need to know and have the right to know - Authentication may include electronic signature required for a document ( example is the Practice Fushion Encounter Note)
46
What is the minimum necessary concept (rule)
In all uses/disclosures of PHI under the Privacy Rule, healthcare entities must use.disclose the minimum amount of PHI NECESSARY TO ACHIEVE THE PURPOSE OF THE USE/DISCLOSURE
47
What is a Limited data set?
A "limited data set" means PHI with its patient identifiers removed. The Privacy Rule allows covered entities to use/disclosure limited data sets for certain purposes, if safeguards are put in place to protect the PHI remaining in the data.
48
Name the allowed purposes for "limited data sets"
research, healthcare operations, and public health activities
49
Give some examples of Physical Controls
-Locking down computer =Placement of computer relative to viewing by other -Computer does not allow the use of jump drives -Physically securing data center were servers are located
50
Explain the HIPPA Privacy Rule
- Patients given more control/rights over their personal health information - Safeguards to protect the privacy of health information - Boundaries on use and release of health records - Balances public responsibility that may require disclosure of some data to protect public health - Patients have right to as to amend PHI if inaccurate or incomplete - Patients have right to request restriction on PHI disclosure, BUT covered entities so not have to agree to these requests
51
What does the HIPPA Privacy Rule allow use/disclosure of PHI by a covered entity for its own:
T- treatment activities P- payment activities O- operations of the facility supporting healthcare activities
52
CMS
Centers for Medicare and Medicaid Services
53
EDI
Electronic data interchange
54
EIN
Employer identification number
55
PHI
Protected health information
56
TPO
Treatment, payment or healthcare operations (to carry out)
57
BAA
Business Associate Agreement
58
Legislation focused on Privacy and Security
ARRA
59
Uses a variety of characters
STRONG PASSWORD
60
authorized uses for disclosure of PHI
TPO
61
requires a key
ENCRYPTION
62
protects against viruses
FIREWALL
63
Used to ensure data integrity
REQUIRED FIELD
64
type of safeguard
PHYSICAL
65
removes patient identifiers
LIMITED DATA SET
66
Requires additional disclosure
PSYCHIATRIC NOTE
67
used to identify inappropriate access to PHI
AUDIT TRAIL
68
use for authentication method
TOKEN
69
Required before using an external transcription company
BAA
70
identifies an individual
PHI
71
legislation that included HITECH
HIPPA
72
For providers and insureers, release of information is limited to the minimum needed for
TPO--treatment, payment, operations
73
What is monitored to assess inappropriate access to a patient's record
audit trail
74
What should the individual responsible for the security of health care data do first
perform a risk assessment
75
Tokens and biometric devices are examples of
authentication methods
76
For providers and insurers, release of information is limited to the minimum need for
TPO - treatment, payment, and operations
77
Your screen saver should activate in how many minutes
5 minutes
78
A clearinghouse that processes claims data must sign what kind of agreement
BAA - Business Associate Agreement
79
In Practice Fusion assignment where each physician sent a SOAP Note to the instructor what was the security risk?
Lack of encryption, ability of instructor to download the SOAP note to a personal hard drive
80
Encryption requires use of
a key
81
The last steps in your workday should be to
ensure the computer is physically secure, complete a full logoff to the system