Study Guide for unit 3
docx
keyboard_arrow_up
School
Shelton State Community College *
*We aren’t endorsed by this school
Course
255
Subject
Information Systems
Date
Dec 6, 2023
Type
docx
Pages
2
Uploaded by cjirehk
1.
What is data recovery and when is it done?
Data recovery is the process of
recouping any data that has been lost
from the information system crash as
well as the data that was obtained
during the downtime. It is done when
the information systems are functional
again.
2.
What process do they use?
The selected CE and business associates
may be reviewed remotely at the OCR’s
office which is known as a desk audit or
it may be an onsite audit
3.
What is semantic?
Involves the use of standardized
terminologies (such as SNOMED-CT) to
provide clarity, consistency, and
appropriate meaning in HIE. This area of
HIE is still undergoing development.
4.
Spoliation
International destruction, mutilation,
alteration, or concealment of evidence
or alteration of evidence
5.
What agency monitors compliance with HIPAA?
The Department of Health and Human
Services’ Office of Civil Rights. They
identify a random sample of CE’s and
business associates who are selected for
an audit.
6.
Intrusion detection systems
Monitor networks and information
systems to catch hackers and other
intruders along with other security
issues. It notifies the information
technology staff of the issue. It also
assist the information system staff in
monitoring the traffic on the Internet to
ensure that it is legitimate and does not
contain anything that will harm the ePHI
or other data stored in the database
such as malware.
7.
What is forensics?
The process that should be used to
gather evidence of the security incident.
(Used or applied in the investigation and
establishment of facts or evidence in a
court of law)
Policy and procedure
development (including
strict guidelines)
Evidence assessment
(determining what should
be looked for)
Evidence acquisition (how
evidence will be captured)
Evidence examination
(analyzing data obtained)
Documenting and reporting
(documenting all activities
performed)
8.
HIE
The exchange of health information
electronically between providers and
others with the same level of
interoperability.
9.
Interoperability
The ability of different information
technology systems and software
applications to communicate; to
exchange data accurately, effectively,
and consistently; and to use the
information that has been exchanged.
10.
Security Event
Poor security practices that have not led
to harm, whereas security incidents
have resulted in harm or a significant
risk of harm.
11.
Mitigation
The process of attempting to reduce or
eliminate harmful effects of the breach.
12.
Two factor authentications
Combines two different categories of
access control, such as something you
know and something you have.
Ex: A TOKEN. Size of a credit
card and contain a
magnetic strip/chip that
identifies the user.
Ex: PASSWORD
13.
EHR vs EMR
An EMR is an electronic collection of all
the patient’s health information and
clinical care that is stored, managed, and
referred to by authorized members of
one healthcare entity, much like the
actual paper health record only in digital
or electronic form. An EHR includes
everything in an EMR but is much more
comprehensive in terms of the patient’s
overall health, the care and services
provided to the patient, and all
healthcare providers participating in the
patient's care.
14.
What does a dashboard display?
The metrics established by the CE so
that the chief security officer will know
where the CE stands with regards to
compliance with the HIPAA security rule.
15.
Best practices for mobile devices
Use authentication methods to control
access
Utilize encryption
Install remote wiping and remote
disabling software
Do not allow use of data sharing
applications on device (Dropbox)
Update software frequently
Use official sources of software (Google
Play)
Protect data when using public Wi-Fi
16.
Good passwords
Passwords are a series of characters that
must be entered to authenticate user
identity; they are commonly used in
conjunction with a username or
identifier. Passwords are an example of
one factor authentication. Passwords
should not easily be guessed.
17.
What is Code of conduct and why do you have it?
A description of how a CE’s employees
are expected to behave. It varies from
organization to organization but address
operations, the organization’s core
values and the culture. You have it so
you can report privacy and security
concerns
.
18.
What is the Federal program that improves patient
care, engages patients and family, improves care
coordination and maintains privacy and security of
PHI?
19.
Rules about good policies and procedures
They should include a variety of topics
including sanctions, access
authorization, and work station use.
They must be retained for 6 years from
the date it was created or phased out.
There must be a method in place for
storage and destruction of the policies
and procedures once the retention has
passed.
They must be available to employees at
the CE.
Must be posted on the internet.
20.
What is CEHRT, why is it important to a facility?
An EHR that has been evaluated by a
member of the Office of the National
Coordinator-Authorized Certification
Bodies and verified that it meets the
criteria set by the MU incentive
programs. It is important because it
improves patient access to their health
information, the exchange of
information between providers and the
systematic collection, analysis, and
interpretation of healthcare data.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help