Privacy and Security (HIPAA) - VOCABULARY Flashcards

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/78

flashcard set

Earn XP

Description and Tags

Vocabulary flashcards covering key terms, definitions, and concepts from the Privacy and Security lecture notes (HIPAA, privacy, security, de-identification, and related laws).

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

79 Terms

1
New cards

Privacy

The right to control personal information and keep it to yourself.

2
New cards

Confidentiality

The right to share personal information only with those you designate.

3
New cards

Security

Mechanisms to protect your personal information from unauthorized access or exposure.

4
New cards

Individually Identifiable Health Information (IIHI)

Data that can be correlated with an individual.

5
New cards

Protected Health Information (PHI)

IIHI as defined by the HIPAA Privacy Rule.

6
New cards

Consent (in privacy context)

Written or verbal permission to allow use of your IIHI.

7
New cards

De-identified data

PHI data that has had identifying information removed or cannot reasonably identify individuals.

8
New cards

De-identification methods – Expert determination

A qualified expert assesses and certifies that re-identification risk is very small.

9
New cards

De-identification methods – Safe Harbor

Removal of specified PHI identifiers to render data de-identified.

10
New cards

Re-identification

Process of linking de-identified data back to individuals.

11
New cards

Small cell counts (re-identification risk)

Low cell counts can increase the risk of identifying individuals in a dataset.

12
New cards

Wall of Shame

HHS list of breaches of unsecured PHI affecting more than 500 individuals.

13
New cards

Breaches

Acquisition, access, use, or disclosure of PHI in a way not permitted.

14
New cards

Ransomware

Malware that encrypts data, potentially blocking access and demanding payment.

15
New cards

Medical identity theft

Using IIHI to obtain property or services fraudulently.

16
New cards

Health Information Exchange (HIE)

Systems and networks that move health data across organizations.

17
New cards

Cloud computing

Delivery of computing services over the internet; changes the data protection perimeter.

18
New cards

Individually Identifiable Information (IIHI) vs PHI

IIHI is the broader term; PHI is IIHI as defined under HIPAA rules.

19
New cards

Accountable care organizations (ACOs)

New care models requiring broader team access to information.

20
New cards

Bring Your Own Device (BYOD)

Clinicians using personal devices to access health information.

21
New cards

De-identification – OCR guidance

Official guidance on de-identification methods provided by HHS/OCR.

22
New cards

Governor Weld re-identification (historical example)

Illustrates how individual identity can be inferred from data (e.g., linking registries to health data).

23
New cards

Genomic data and re-identification

Genomics can aid re-identification in research data.

24
New cards

Re-identification risk in practice

Even de-identified data can potentially be re-identified under certain conditions.

25
New cards

Temporal information in de-identified data

Removing timing data can reduce usefulness for longitudinal analysis.

26
New cards

De-identified data not a panacea

Ethical concerns and potential loss of analytical value if over-scrubbed.

27
New cards

Concerns about security

Security threats and leakages across multiple points, including paper records.

28
New cards

Paper records insecurity

Fax, copying, and lack of auditable trails create privacy risks.

29
New cards

Consequences of poor security

Patient avoidance, misreporting, delayed care, and worse outcomes.

30
New cards

IOM For the Record (1997)

Early government report informing HIPAA-style privacy practices.

31
New cards

Threats to security – Insider

Disclosures or access caused by insiders (accidental, curious, etc.).

32
New cards

Threats to security – Outside

External breaches or attacks on a health organization.

33
New cards

Deterrents to security

Alerts and audit trails that discourage improper access or disclosure.

34
New cards

System management precautions

Software management and vulnerability assessments to reduce risk.

35
New cards

Authentication

Verifying the identity of a user or system before granting access.

36
New cards

Authorization

Granting permissions to access PHI based on roles and need-to-know.

37
New cards

Integrity management

Ensuring data has not been altered in an unauthorized way.

38
New cards

Digital signatures

Cryptographic method to verify the source and integrity of data.

39
New cards

Encryption

Scrambling data so it is unreadable without a key; essential for public networks.

40
New cards

Symmetric vs. Asymmetric encryption

Symmetric uses one key; asymmetric uses a public/private key pair.

41
New cards

NIST / ISO 27000 / OAuth2 / OpenID

Standards and frameworks guiding information security and authentication.

42
New cards

SMART on FHIR

API approach using standards for secure healthcare app integrations.

43
New cards

Best practices for secure APIs

Guidelines to securely expose and consume health IT APIs.

44
New cards

Authentication challenges

Problems with passwords, aging policies, and usability vs security.

45
New cards

Two-factor authentication (2FA)

Combining something you know with something you have (e.g., device, biometrics).

46
New cards

Password challenges

Reuse, memorability vs complexity, key-logging, and policy burden.

47
New cards

NIST 800-63 evolution

Shift from strict complexity to usable, long passwords and risk-based changes.

48
New cards

New password recommendations

Allow long passwords (e.g., up to 64 chars); meaningful feedback; avoid arbitrary rules.

49
New cards

Security culture – user behavior

'Good users' can still do bad things; data hygiene and cautious behavior are essential.

50
New cards

HIPAA Privacy Rule

Regulates how PHI may be used/disclosed by covered entities and business associates.

51
New cards

HIPAA Security Rule

Sets security requirements for protecting electronic PHI (ePHI) across CE and BA.

52
New cards

Covered Entities (CEs)

Entities that handle PHI and bill electronically (providers, plans, clearinghouses).

53
New cards

Business Associates (BAs)

Entities or individuals performing work on behalf of CEs with PHI access.

54
New cards

Business Associate Agreement (BAA)

Contract ensuring PHI privacy protections between CE and BA.

55
New cards

Minimum Necessary

Standard to limit PHI disclosures to the minimum amount needed.

56
New cards

Notice of Privacy Practices (NPP)

Plain-language notice of how PHI is used/disclosed and individual rights.

57
New cards

Authorization (non-TPO disclosures)

Permission required to disclose PHI for purposes other than treatment, payment, or operations.

58
New cards

Treatment, Payment, and Health Care Operations (TPO)

Disclosures allowed without authorization when for patient care and related activities.

59
New cards

Public health disclosures

Permitted disclosures to public health authorities for health surveillance and safety.

60
New cards

Research disclosures (non-TPO)

Disclosures allowed under IRB/OHRP oversight; may use existing data with exemptions.

61
New cards

De-identified data disclosures

Disclosures allowed when data are de-identified under expert determination or safe harbor.

62
New cards

Marketing and fundraising

PHI use for marketing requires authorization; fundraising may be permitted with opt-out.

63
New cards

Notice of privacy practices – plain language

NPP must be understandable and include complaint process and privacy officer.

64
New cards

Training and privacy program

Organizations must train staff and designate a privacy officer with sanctions for violations.

65
New cards

Breaches and penalties (OCR)

Breach notification timelines; penalties tiered by severity and neglect.

66
New cards

HIPAA Security Rule core requirements

Access control, emergency access, automatic log-off, audit trails, data integrity, authentication.

67
New cards

Access control

Unique user identities and restricted PHI access based on role.

68
New cards

Audit trail

Records of PHI access/transactions to monitor and investigate activity.

69
New cards

Data integrity

Ensuring PHI is not altered or corrupted; use checksums/digital verification.

70
New cards

Cloud computing and HIPAA

Cloud use allowed with proper safeguards and BAAs; risk assessments advised.

71
New cards

TEFCA (Trusted Exchange Framework and Common Agreement)

Proposed framework to enable nationwide health information exchange.

72
New cards

Common Rule / 45 CFR 46

Federal rules governing rights of human subjects in research.

73
New cards

FERPA

Family Educational Rights and Privacy Act protecting student records.

74
New cards

GINA

Genetic Information Nondiscrimination Act protecting genetic information in health and employment.

75
New cards

GDPR

European data protection law governing personal data and privacy rights.

76
New cards

CCPA

California consumer privacy law granting rights over personal data.

77
New cards

HIPAA pre-emption

HIPAA generally supersedes state privacy laws unless the state law is more protective.

78
New cards

IIHI custodians and processors (proposed evolution)

Concepts for redefining entities responsible for handling IIHI under HIPAA.

79
New cards

Access rights under HIPAA

Individuals have rights to access, amend, and obtain copies of PHI.