1/18
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
What does hippa stand for
Health information portability and accountability act
What is hippa
Federal law requiring the creation of national standards to protect sensitive patient health from being disclosed without patients consent or knowledge
When was hippa signed into law
1996
Why was hippa signed into law
To stop health care fraud and abuse
Enforce standards for health information
Guarantee the security and privacy of health information
Ensure health insurance portability for employed persons
What is phi
Protected health infomation is individually identifiable health information Guarantee tht is transmitted or maintained by any form of medium by a covered entity or business associates
What is hitech act
Health information technology for economic and clinical health act established the office of national coordinator for health information technologies which oversee nationwide hit infrastructure that support the exchange of phi
Is hitech apart of hippa
No
What does hitech provide
Financial incentives for EHR adoption through cms (medicade)
What does hitech require
Compliance with hippa rules, audits, and immediate breach remedies for covered entities and business associates
Hippa privacy rules
Safeguard phi from unauthorized use or exposure
Hippa security rule
Protects electronic phi by creating safeguards like not sharing passwords, alarm systems, security systems, administrative safeguards (training)
Breach notification hippa rule
Outline process hippa beholden entities must follow in the event of a breach
(Notify each person affected)
Hippa omnibus rule
Business associates of covered entities must be hippa compliant
List some international threats to phi
Cyber attacks, unauthorized access, negligent employee
List some unintentional threats to phi
Human error, weak security, outdated systems
List some consequences of breached phi
Patient harm, legal penalties, reputational damage, financial loss, operation disruption
How can you minimize risk of phi breach
No not share passwords, be aware of phishing scams, log out computer when stepping away, handle and dispose of phi properly, report all breaches immediately
Define ehr
Electronic health records (electronic version of patients medical history)
What is a covered entities
An individual or organization that must comply with hippa regulations