Study Guide for unit 3

docx

School

Shelton State Community College *

*We aren’t endorsed by this school

Course

255

Subject

Information Systems

Date

Dec 6, 2023

Type

docx

Pages

2

Uploaded by cjirehk

Report
1. What is data recovery and when is it done? Data recovery is the process of recouping any data that has been lost from the information system crash as well as the data that was obtained during the downtime. It is done when the information systems are functional again. 2. What process do they use? The selected CE and business associates may be reviewed remotely at the OCR’s office which is known as a desk audit or it may be an onsite audit 3. What is semantic? Involves the use of standardized terminologies (such as SNOMED-CT) to provide clarity, consistency, and appropriate meaning in HIE. This area of HIE is still undergoing development. 4. Spoliation International destruction, mutilation, alteration, or concealment of evidence or alteration of evidence 5. What agency monitors compliance with HIPAA? The Department of Health and Human Services’ Office of Civil Rights. They identify a random sample of CE’s and business associates who are selected for an audit. 6. Intrusion detection systems Monitor networks and information systems to catch hackers and other intruders along with other security issues. It notifies the information technology staff of the issue. It also assist the information system staff in monitoring the traffic on the Internet to ensure that it is legitimate and does not contain anything that will harm the ePHI or other data stored in the database such as malware. 7. What is forensics? The process that should be used to gather evidence of the security incident. (Used or applied in the investigation and establishment of facts or evidence in a court of law) Policy and procedure development (including strict guidelines) Evidence assessment (determining what should be looked for) Evidence acquisition (how evidence will be captured) Evidence examination (analyzing data obtained) Documenting and reporting (documenting all activities performed) 8. HIE The exchange of health information electronically between providers and others with the same level of interoperability. 9. Interoperability The ability of different information technology systems and software applications to communicate; to exchange data accurately, effectively, and consistently; and to use the information that has been exchanged. 10. Security Event Poor security practices that have not led to harm, whereas security incidents have resulted in harm or a significant risk of harm. 11. Mitigation The process of attempting to reduce or eliminate harmful effects of the breach. 12. Two factor authentications Combines two different categories of access control, such as something you know and something you have. Ex: A TOKEN. Size of a credit card and contain a magnetic strip/chip that identifies the user. Ex: PASSWORD 13. EHR vs EMR An EMR is an electronic collection of all the patient’s health information and clinical care that is stored, managed, and referred to by authorized members of one healthcare entity, much like the actual paper health record only in digital or electronic form. An EHR includes everything in an EMR but is much more comprehensive in terms of the patient’s overall health, the care and services provided to the patient, and all healthcare providers participating in the patient's care. 14. What does a dashboard display? The metrics established by the CE so that the chief security officer will know where the CE stands with regards to compliance with the HIPAA security rule. 15. Best practices for mobile devices Use authentication methods to control access Utilize encryption Install remote wiping and remote disabling software
Do not allow use of data sharing applications on device (Dropbox) Update software frequently Use official sources of software (Google Play) Protect data when using public Wi-Fi 16. Good passwords Passwords are a series of characters that must be entered to authenticate user identity; they are commonly used in conjunction with a username or identifier. Passwords are an example of one factor authentication. Passwords should not easily be guessed. 17. What is Code of conduct and why do you have it? A description of how a CE’s employees are expected to behave. It varies from organization to organization but address operations, the organization’s core values and the culture. You have it so you can report privacy and security concerns . 18. What is the Federal program that improves patient care, engages patients and family, improves care coordination and maintains privacy and security of PHI? 19. Rules about good policies and procedures They should include a variety of topics including sanctions, access authorization, and work station use. They must be retained for 6 years from the date it was created or phased out. There must be a method in place for storage and destruction of the policies and procedures once the retention has passed. They must be available to employees at the CE. Must be posted on the internet. 20. What is CEHRT, why is it important to a facility? An EHR that has been evaluated by a member of the Office of the National Coordinator-Authorized Certification Bodies and verified that it meets the criteria set by the MU incentive programs. It is important because it improves patient access to their health information, the exchange of information between providers and the systematic collection, analysis, and interpretation of healthcare data.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help