Rules, Regulations, and Standards Flashcards

(109 cards)

1
Q

Maintains a list of approved accreditation organizations for health care providers, as providers and suppliers who have been accredited by one of these national accrediting agencies are exempt from state surveys in determining if they are in compliance with Medicare - mandated conditions.

A

Centers for Medicare and Medicaid Services (CMS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Approved Medicare accreditation organizations include:

A

The Joint Commission, Community health association program, and the Accreditation Commission for Health Care.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Whose role is it to update documentation requirements based on changes to regulatory or accreditation standards?

A

The Nursing Informatics Specialist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

This committee created the standards associated with administrative medical insurance tasks.

A

The Accreditation Standards Committee (ASC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

This set of standards are used nationwide, helps with claims, enrollment, and determining insurance eligibility.

A

X12N

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This council developed pharmacy standards for the U.S. Electronic claims processing under this standard was first introduced in 1992, and has gone on to make up nearly 100% of retail pharmacy claims being processed in real - time.

A

The National Council for Prescription Drugs Program (NCPDP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Another NCPDP set of standards, focuses on the communication of information within and between different healthcare facilities.

A

HL7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Reimbursement systems

A

Pay for Performance (P4P) or Value - based purchasing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the primary objective of P4P programs?

A

to reward the health care providers when patients have good results.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

P4P payment

A

related to quality versus quantity of service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Under the Medicare Inpatient Prospective Payment System (IPPS), patient must be given…

A

A present - on - admission (POA) Medicare severity diagnosis - related group (MS-DRG) diagnosis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the “Y” POA indicator on Medicare claims?

A

Medicare pays for a condition if a hospital acquired condition (HAC) is present on admission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the “N” POA indicator on Medicare claims?

A

Medicare will not pay for condition if a HAC is present on discharge but not on admission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the “U” POA indicator on Medicare claims?

A

Medicare will not pay for condition if a HAC is present and documentation is not adequate to determine if the condition was present on admission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the “W” POA indicator on Medicare claims?

A

Medicare will not pay for condition if a HAC is present and if the health care provider cannot determine if the condition was present on admission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Medicare instituted, what, for serious, preventable, hospital - acquired conditions and complications for which Medicare will not reimburse hospitals?

A

Do not pay list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Why does Medicare have a Do not pay list?

A

to control quality of care and to cut costs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

How many categories are currently on the do not pay list for Medicare?

A

over forty

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What department handles negligence and malpractice?

A

Risk Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Indicates that improper care has not been provided.

A

Negligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Indicates that an individual failed to provide reasonable care or to protect/ assist another, based on the standards and expertise.

A

Negligent conduct

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Willfully providing inadequate care while disregarding the safety and security of another

A

Gross negligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Involves the injured parties contributing to the harm done.

A

Contributory negligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Attempts to determine what percentage of negligence is attributed to each individual involved.

A

Comparative Negligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
If health care providers provide patients access to them via e-mail or messaging and do not respond promptly to those messages, then they be liable for what?
Malpractice
26
Types of patient data misuse include:
Identity theft Unauthorized access Privacy violations Security breaches
27
Health records often contain identifying information, such as Social Security numbers, credit card numbers, birthdates, and addresses, making patients vulnerable.
Identify theft
28
Although EHRs and computerized documentation systems are password protected, providers sometimes share passwords or unwittingly expose their passwords when logging in, inadvertently allowing access to information about patients.
Unauthorized access
29
Even professionals authorized to access a patient's record may share private information with others, such as family or friends.
Privacy violations
30
Data are vulnerable to security breaches of careless, inadequate security, especially when various business associates, such as billing companies, have access to private information.
Security breaches
31
Those who use proprietary software should require all those working with the data, including third parties, sign ____________________, to prevent information regarding the software or data from being stolen or misused.
a Nondisclosure agreement
32
Stealing proprietary data is most common when ...
people leave an organization and is often used to benefit a new employer.
33
Stealing legally protected information is an act of?
Fraud
34
The Health insurance portability and accountability act of 1996 mandates ____________ and _______________ to ensure that health information and individual privacy are protected.
Privacy and Security
35
Protected information includes any information included in the medical record (electronic or paper), conversations between the physician and other health care providers, billing information, and any other form of health information. Procedures must be in place to limit access and disclosures.
Privacy Rule
36
Any electronic health information must be secure and protected against threats, hazards, or nonpermitted disclosures, in compliance with established standards.
Security Rule
37
Limiting access to those authorized, use of unique identifiers for each user, automatic logoff, encryption and decryption of protected health care information, authentication that health care data have not been altered or destroyed, monitoring of logins and security of transmission.
Security Requirements
38
This must include a unique identifier, procedures to access the system in emergencies, time out, and encryption/ decryption
Access controls
39
The two major factors for security of patient information include:
Information should be transmitted accurately and quickly. Clinical and non - clinical systems should be fully integrated.
40
Requested information should be supplied within _______________ of the request.
24 hours
41
Passed in 1996 to protect patient privacy rights
Health Insurance Portability and Accountability Act (HIPAA)
42
Compliance dates: Electronic transactions and code sets are to be identified.
October 16, 2002
43
Compliance dates: Privacy standards are to be set.
April 14, 2003
44
Compliance dates: Standards for employer identification are to be set.
July 30, 2004
45
Compliance dates: Standards for system and data security are to be set.
April 21, 2005
46
Compliance dates: Standards for provider identification are to be set.
May 23, 2007
47
Freedom from intrusion, or control over the exposure of self or personal information. In Healthcare, an individual's right to privacy includes remaining anonymous by request, deciding what information is collected and that information is used.
Privacy
48
The careful sharing of private information to people who have a valid interest in helping the individual.
Confidentiality
49
Occurs when someone other than the authorized system personnel access a private computer system.
System Penetration
50
The willful destruction of computer equipment (or database records).
Sabatoge
51
Majority of sabotage occurrences come from?
Angry or unhappy employees
52
There are several ways that __________ occur in computer systems: poor design, incorrect data entry, or retrieval of an incorrect entry.
Error
53
May cause the system to shut down entirely for an undefined length of time.
Disasters
54
The biggest security problem for health database systems is. ...
Unauthorized User
55
An employee of the company that has legitimate access to the database system, but access of information beyond what is needed for their job or task.
Unauthorized User
56
Five types of malicious computer programs:
Viruses Worms Trojan Horses Logic Bombs Bacteria
57
Can damage data, but may only be an annoyance.
Viruses
58
Computer must be running in order for these to spread
Viruses
59
Named after the pattern of damage they perform
Worms
60
Use LAN and WAN practices to spread and reproduce
Worms
61
Appear to be performing a legitimate task, but actually do something else.
Trojan Horse
62
These malicious programs do not self- replicate.
Trojan Horse
63
These malicious programs can be easily confined once found.
Trojan Horse
64
Triggered by a specific bit of data.
Logic Bombs
65
Can be hidden in a normal program.
Logic Bombs
66
Type of virus
Logic bombs & Bacteria
67
Are not attached to existing programs
Bacteria
68
Malicious software
Viruses or Trojan horses
69
Two types of programs are essential to the security of today's computers
Antivirus software and spyware detection software
70
The process of using mathematical formulas to code data so that it is unrecognizable if it is intercepted by someone outside of the system.
Encryption
71
Three ways that encryption can be handled by the company:
At the desktop, administrated, or server wide.
72
How many levels are there for user authentication security?
Three
73
What level of Authentication Security: Once an individual is logged into the system (using their name and password), their name appears on the screen and their access is tracked as they use the system.
Level One
74
What level of Authentication Security: Users are automatically logged out after some period of inactivity and must log in again.
Level One
75
What level of Authentication Security: Must update their password on a regular basis.
Level One
76
What level of Authentication Security: Most Secured level
Level Three
77
What level of Authentication Security: Encrypted key- based authentication
Level Two
78
What level of Authentication Security: User must present computer access card (CAC) to the system before they can log in.
Level Two
79
What level of Authentication Security: Automatic log out if CAC is too far from the computer.
Level Two
80
What level of Authentication Security: Uses something unique to the individual such as: fingerprint, retinal scan, or face recognitition
Level Three; Biometric authentication
81
What level of Authentication Security: Cannot be lost or stolen
Level Three
82
How many characters for a secured password?
Eight
83
Records of activity related to systems and applications, users' access, and use of systems and applications.
Audit Trials
84
A security tool that allows administrators to track individual users, identify the cause of problems, note data modification and misuse of equipment, and reconstruct computer events.
Audit Trials
85
Include event records and keystroke monitoring
Audit trials
86
Audit trials at this level generally record any logins, including identification, date, and time, devices used, and functions.
System Level
87
Audit trials at this level monitor activity within the application, including opened files, editing, reading, deleting, and printing.
Application Level
88
items used to authenticate a person's identity and allow access to a system.
Tokens
89
Generate one time passwords
SecureID by RSA
90
These include driver's licenses and employee badges but provide very little security as they can easily be falsified or stolen.
ID cards
91
These combine use of the token with other information, such as user name and password.
Challenge- response tokens
92
These contain microchips with information that can be programmed to allow access, like a debit card.
Smart cards
93
Track who is accessing a system and the duration of access.
Databases
94
May occur as the result of a number of different problems.
Security failures
95
Penetration can result from undetected vulnerabilities.
System Penetration
96
System penetration perpretrators
cyberhackers, hackers, computer specialists, authorized users, unauthorized users, and opportunists.
97
This includes physical damage to the system or purposeful alterations in applications
Destruction/ sabotage
98
May result from poor design, incorrect entries, system changes, poorly trained personnel, and absence of adequate procedures, policies and education
Password management
99
How many categories of threats to a computer system are there?
Four
100
Can be either natural or man made.
Environmental Disasters
101
These include blizzards, earthquakes, epidemics, floods, tornadoes, and hurricanes.
Natural Disaster
102
Chemical contamination, power outages, accidents when hardware is being transported, and toxic fumes.
Man- made environmental disasters
103
One of the major causes of problems with a computer system.
Human errors
104
Includes overwriting files, accidently deleting files, and overloading the system with unnecessary programs.
Human errors
105
Includes theft, malicious programs, terrorism, and cybercrime.
Human mischieft
106
Includes disconnecting wiring, CPU crashes, and storage drive failure
Equipment failure
107
the American Recovery and Reinvestment Act of 2009 included:
Health Information Technology and Economic and Clinical Health Act (HITECH)
108
Provides incentive payments to Medicare practitioners to adopt electronic health records (EHRs)
HITECH
109
Provides penalties in the form of reduced Medicare payments for those who do not adopt EHRs, unless exempted by hardship.
HITECH