1/9
Ten flashcards covering key concepts from the lecture on data governance, DSAs, DURSA, and HIE layers.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
What is the learning objective for Unit 4, Module 1, Lecture 2 on Common Components for Data Sharing Agreements?
To list common components and elements found in policies, sharing agreements, and contracts.
Which Act strengthens patient access to information and promotes interoperability priorities?
The 21st Century Cures Act.
What are the main priorities of the 21st Century Cures Act regarding data sharing?
Improved data sharing across disparate networks; reduction of information blocking; promoting a trusted exchange framework; promoting APIs to support patient access.
When defining data sharing, what four questions describe the scope?
What data are we sharing? How? When? And with whom?
Name the layers of Health Information Exchange (HIE) discussed in the notes.
At the individual health center; among separate providers in a region; data exchanges that cross geographic boundaries.
What types of policies are necessary to govern data exchange and transmission?
Policies protecting safety and security, including data use limitations, data ownership, governance, liability, antitrust, and roles/responsibilities.
What does DURSA stand for and what is its purpose in data sharing?
Data Use and Reciprocal Support Agreement; describes mutual responsibilities, obligations, and safeguards and fosters trust among participants.
List some common elements found in Data Sharing Agreements (DSAs).
Contact information; general terms and conditions; data elements; data transfer security; access permissions; breach response; data destruction at agreement end.
What are the key attributes of data governance?
Availability, accessibility, interoperability, auditability, quality, and security.
What are the Trust Principles for patients regarding data sharing?
Be informed of data practices and why data may be shared; receive a simple explanation of privacy and security policies; be able to request limits on data exchange; be able to electronically access and request corrections to their data.