Term
In hospitals, automated systems for registering patients and tracking their encounters are commonly known as _____ systems. |
|
Definition
|
|
Term
Companies that sell specialized Internet applications, such as an EMR or patient registration system, that might otherwise be too expensive for a health care organization are known as _____. |
|
Definition
b. An application service provider Correct |
|
|
Term
Which of the following systems is designed primarily to support patient care by providing healthcare professionals access to timely, complete, and relevant information for patient care purposes? |
|
Definition
b. Clinical information system |
|
|
Term
Which of the following information systems is used for collecting, verifying, and reporting test results? |
|
Definition
a. Laboratory information system |
|
|
Term
Which of the following systems focuses on providing reports and information to managers for day-to-day operations of the organization? |
|
Definition
MANAGEMENT INFORMATION SYSTEM |
|
|
Term
A management information system is different from a strategic decision support system in that it produces reports for _____ and tactical decision making. |
|
Definition
OPERATIONAL SUPPORT SYSTEM |
|
|
Term
Interoperability means that the data exchange across different information systems, software applications and networks works seamlessly. |
|
Definition
|
|
Term
Which of the following information systems is used to assist healthcare providers in the actual diagnosis and treatment of patients? |
|
Definition
CLINICAL DECISION SUPPORT SYSTEM |
|
|
Term
Which of the following information systems is considered an administrative information system? |
|
Definition
FINANCIAL INFORMATION SYSTEM |
|
|
Term
A database that makes it possible to access data from multiple databases |
|
Definition
|
|
Term
State privacy protections for health information are often stronger than federal HIPAA protections. |
|
Definition
|
|
Term
Under HIPAA, Protected Health Information (PHI) includes any information that identifies an individual and describes his or her health status. |
|
Definition
|
|
Term
Sue is an RN on a busy post surgical unit. After receiving a new post-op, Sue starts to get a report about the patient from the transferring nurse in the hall. They use the patients name in report, go over lab findings and complication during surgery while in the hall outside the patient's room. |
|
Definition
|
|
Term
On the way to the cafeteria, John, a radiology technician, receives a call on his cell phone. The call is about Mrs. Arnold, whom he just returned to the unit after a procedure. The nurse had a question about the procedure. John continues into the cafeteria discussing the procedure and how difficult Mrs. Arnold was to deal with as a patient.
John has breached HIPAA regulations. |
|
Definition
|
|
Term
Cheryl works in Admitting. She needs to fax some information regarding a patient at the hospital to a second party regarding payment. In a hurry, she faxes the record to an unlisted fax machine outside the hospital.
Cheryl has violated the HIPAA privacy regulations. |
|
Definition
|
|
Term
During medical rounds, two physicians stop outside Mrs. Smiths room to discuss her case before stepping inside. There are several people in the hall, everyone is busy. The physicians are asked by the manager to discuss the case elsewhere. If they did not comply with this request, this would be a breach of patient privacy. |
|
Definition
|
|
Term
The notice of privacy practices says "Your medical record may be used for quality reviews." The reason this statement is in the notice is: |
|
Definition
IT IS AN EXAMPLE OF HEALTH CARE OPERATIONS |
|
|
Term
Arthur has asked for a list of disclosures of his medical record. He seems surprised not to see that his personal physician, Dr Smith, on it. What do you tell him? |
|
Definition
DISCLOSURES USED FOR TREATMENT ARE NOT RECORDED |
|
|
Term
Dr. Brown is treating Amy for her ulcer. She was in Macon General Hospital a year ago. Dr. Brown has asked the hospital for a copy of her discharge summary and endoscopy report. What action should be taken by the hospital? |
|
Definition
PROVIDE THE RECORDS TO DR BROWN AS HE IS NOW TREATING THE PATIENT |
|
|
Term
Ms Thomas was a patient at your facility. She has been told that there are some records she cannot have access to. These records are most likely: |
|
Definition
|
|
Term
HIPAA was designed to improve the continuity of health insurance coverage, address administrative simplification, and protect data privacy and security. |
|
Definition
|
|
Term
Margaret has signed an authorization to release information to her attorney for a fractured finger treated in an ER visit. Specifically she says to release the ER history and physical, x-rays and any procedure note for her finger fracture. Which of the following violates her privacy? |
|
Definition
|
|
Term
An employee accesses PHI on a computer system that does not relate to her job functions. What security mechanism should have been implemented to minimize this security breach? |
|
Definition
|
|
Term
Within the context of data security, protecting data privacy basically means defending or safeguarding _____. |
|
Definition
|
|
Term
visitor to the hospital looks at the screen of the admitting clerks computer workstation when she leaves her desk to copy some admitting documents. What security mechanism would best have minimized this security breach? |
|
Definition
AUTOMATIC LOG OFF CONTROLS |
|
|
Term
A dietary department donated its old microcomputer to a school. Some old patient data were still on the microcomputer. What controls would have minimized this security breach? |
|
Definition
DEVICE AND MEDIA CONTROLS |
|
|
Term
Which of the following would be the most appropriate means of protecting data that is passed over the Internet? |
|
Definition
|
|
Term
The first and most fundamental strategy for minimizing security threats is to: |
|
Definition
ESTABLISH A SECURITY ORGANIZATION |
|
|
Term
According to an FBI study, most security breaches occur: |
|
Definition
|
|
Term
I am conducting the risk assessment for an ambulatory care center where I work. I am evaluating the medical record file room for security rule violations. The statement that best describes the situation is: |
|
Definition
THIS IS NOT NECCESSARY SINCE SECURITY RULE ONLY ADDRESS ELECTRONIC HEALTH INFORMATION |
|
|
Term
Which of the following statements is true regarding HIPAA security? |
|
Definition
HIPPA ALLOWS FLEXABILITY WHEN IT COMES TO IMPLEMENTATION |
|
|
Term
Administrative controls include policies and procedures that address the _____ of computer resources. |
|
Definition
|
|
Term
Locks on computer room doors is a type of: |
|
Definition
|
|
Term
Locks on computer room doors is a type of: |
|
Definition
MUST BE IDENTIFIED BY EVERY COVERED ENTITY |
|
|
Term
An employee observes an outside individual putting some computer disks in her purse. The employee does not report this security breach. What security measures should have been in place to minimize this threat? |
|
Definition
SECURITY INCIDENT PROCEDURES |
|
|
Term
When addressing physical security, which of the following should be taken into consideration? Select one: |
|
Definition
a. natural threats b. man-made threats c. damaging nearby activities d. all of the above Correct |
|
|
Term
A visitor walks through the computer department and picks up a CD from an employees desk. What security controls should have been implemented to prevent this security breach? |
|
Definition
|
|
Term
In addition to people, threats to data security include: Select one: |
|
Definition
a. Natural disasters b. Power surges c. Hardware malfunctions d. All of the above Correct |
|
|
Term
Prohibiting an employee from sharing his or her password is an example of a physical safeguard. |
|
Definition
|
|
Term
The right of individuals to control access to their personal health information. |
|
Definition
PRIVACY OF HEALTH INFORMATION |
|
|
Term
The ethical and legal concept endorsed by health professionals to meet the expectation of patients that their information, when provided to an authorized used, will not be redisclosed. |
|
Definition
CONFIDENTIALITY OF HEALTH INFORMATION |
|
|
Term
Refers to the physical safety and protection of health information from the elements, from loss, and from alteration or destruction |
|
Definition
SECURITY OF HEALTH INFORMATION |
|
|
Term
Refers to the physical safety and protection of health information from the elements, from loss, and from alteration or destruction |
|
Definition
HIPPA'S TECHNICAL SAFEGAURDS |
|
|
Term
The documented, formal practices to manage data security measures throughout the organization. |
|
Definition
HIPPA'S ADMINISTRATIVE SAFEGAURDS |
|
|
Term
Physical measures, policies, and procedures to protect a covered entitys electronic information systems and related buildings and equipment, from natural and environmental hazards, and unauthorized intrusion. |
|
Definition
HIPPA'S PHYSICAL SAFEGAURDS |
|
|