General Rules-Chapter 10

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/15

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

16 Terms

1
New cards

What must covered entities (CEs) demonstrate regarding electronic protected health information (ePHI)?

CEs must ensure the confidentiality, integrity, and availability of all ePHI they create, receive, maintain, or transmit.

2
New cards

What should CEs protect ePHI against?

CEs must protect ePHI against reasonably anticipated threats or hazards to the security or integrity of ePHI.

3
New cards

How is the HIPAA Security Rule described in terms of flexibility?

The HIPAA Security Rule is flexible, scalable, and technology neutral, allowing CEs to adopt appropriate and reasonable security measures.

4
New cards

What should be considered when determining security measures for a CE?

Consider the size, complexity, and capabilities of the CE, technical infrastructure, security measure costs, and probability of potential risks.

5
New cards

What does scalable mean in the context of the HIPAA Security Rule?

It means the Security Rule accommodates CEs of any size.

6
New cards

What are implementation specifications in the HIPAA Security Rule?

They define how standards are to be implemented, and can be required or addressable.

7
New cards

What action must a CE take if it decides against encrypting PHI?

The CE must document why encryption is not reasonable and appropriate and implement an equivalent alternative method.

8
New cards

What are administrative safeguards?

Documented formal practices to manage data security measures throughout the CE.

9
New cards

What is the purpose of a security management process for CEs?

To create, maintain, and oversee the development of security policies and procedures and conduct risk analysis.

10
New cards

Who must each CE designate regarding security responsibility?

Each CE must designate a security official to oversee security measures.

11
New cards

What should the information access management program include?

Policies and procedures to determine who should have access to what information.

12
New cards

What must CEs provide to their workforce regarding security?

Security awareness and training for all members of the workforce.

13
New cards

What does the contingency plan for CEs include?

Policies for responding to emergencies or failures in systems that contain ePHI, including data backup and disaster recovery plans.

14
New cards

What do physical safeguards protect against?

They protect hardware, software, and data from natural and environmental hazards.

15
New cards

What are facility access controls?

Policies and procedures to manage the physical security of a facility.

16
New cards

What must CEs do regarding business associate contracts?

CEs must require business associates to appropriately safeguard information and receive assurances that they will do so.