Unit 5: Privacy and Security of Health Information Flashcards

(41 cards)

1
Q

Privacy

A

The right of an individual to limit access to information about themselves unless it contradicts federal or state law

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Confidentiality

A

The expectation that information shared with a healthcare provider will be used only for its intended purpose

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Security

A

The protective measures and tools for safeguarding information in a system

ex: user names and passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

2009 HITECH Act

A

made laws safeguarding patient information more stringent due to the increased use and access to patient healthcare information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Ohio Revised Code

A

more stringent than 1996 HIPAA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

RED Flag Rules

A

for providers that collect credit card information. Laws regard suspicions of medical identity fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Covered Entity CE

A

Health plan, healthcare clearing house, or healthcare provider that transmits any health information in electronic form

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Protected Health Information PHI

A

individually identifiable health information held or transmitted by a CE or its business associate, electronic, paper, or verbal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Designated Record Set DRS

A

a group of records maintained by the CE (typically a healthcare provider) that may include payment and medical information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Use

A

PHI is used internally; quality department determines whether appropriate care was given

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Disclosure

A

PHI is disseminated from the CE (healthcare provider) and sent to an external source such as an attorney, insurance company, or another hospital

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Minimum Necessary

A

Limit the PHI disclosed to the least amount required to accomplish the intended purpose for which the information was requested

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

PHI Identifiers subject to HIPAA

A
Name
Postal address
Telephone numbers
Fax numbers
Social security numbers
Medical record numbers
Health plan beneficiary numbers
Account numbers
License numbers
Vehicle identifiers (vin or plate)
Medical device identifiers
Biometrics
Full face photographs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

TPO Treatment, payment, operations

A

the times when PHI can be used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

AARA Requirements

A

Certification of EHRs
Mandated HIPAA Audits
Increased penalty severity
Business associates also subject to privacy and security regulations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Internal security threats

A

hardware
Environment
Employees: human error, exploiting access, malice or gain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

External security threats

A

External humans who access data or steal hardware

Natural disasters: necessitates use of backup servers in an alternate location

18
Q

Confidentiality

A

only giving ePHI access to those who need it

19
Q

Integrity

A

Making sure data isn’t altered during transmission or storage

20
Q

Availability

A

Information must be available when needed for patient care and other uses to authorized users

21
Q

Administrative safeguards

A

people focused: training, policies, assessment

22
Q

Physical safeguards

A

mechanisms to protect hardware, software, and data
like locks on the door to the server room
should protect against fire, theft, etc

23
Q

Technical safeguards

A

use technology to protect data and control access

24
Q

Access controls

A

a computer software program designed to prevent unauthorized use of an information resource

Must have policies on who can view, create, and modify data

25
Types of authentication
Role-based User-based Context-based Emergency access procedure
26
Role Based authentication
rights to read or edit are determined by role Coders can read but not edit, wile nurses can add clinical information
27
User Based
more specific and tailored than role based, but can be more difficult to manage and program
28
Context based
combines role and context for data access useful for nurses that may work in multiple unit with different data access needs
29
Emergency access procedure
"break the glass" usually occurs during a medical emergency Need to be able to track who activated emergency access and why
30
One factor authentication
like a user name and password, two things you know, one type of information
31
Two factor authentication
combines two categories of access, such as something you know and something you have
32
Token
physical device for security Like an ID card However these can be lost which is problematic
33
Biometrics
retina scan, finger prints, voice prints, etc. | Very secure and difficult to forge
34
Telephone callback
often used by remote employees to dial into the system with an approved phone number
35
Automatic logoff
logs the use off after a specified amount of inactivity | should be paired with quick acting screensaver to hide patient info from people passing by
36
Audit controls
mechanisms that record and examine activity in information systems Hold users accountable for their actions identify the causes of problems, extent, and how to fix real time monitoring to identify breaches Monitor for intrusions to prevent breaches
37
Audit trails
record of audit system activities system activities: log in and out application level: what systems are used, what was seen and done user level: actions of the user, and resources accessed
38
Triggers
identify the need for a closer inspection
39
Breach
unauthorized use, access, or disclosure of private health information that compromises privacy and security
40
500 or more in breach
media is notified to increase patients awareness of potential medical fraud
41
Medical identity theft
someone steals your identity and receives healthcare services under your name someones information could end up in your chart and eff up your care as well as use up your insurance