Domain 2 - Access, Disclosure, Privacy, and Security

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/86

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

87 Terms

1
New cards

Public Law

Involves the government at any level and its relationship with individuals and organizations

2
New cards

Criminal Law

Where the government is a party against an accused who has been charged with violating a criminal statute

3
New cards

Private Law

Involves rights and duties among private entities and individuals

4
New cards

Civil Law

Non criminal law

5
New cards

Torts

Wrongful civil act that results in injury to another

6
New cards

Constitutional Law

Defines the amount and types of power and authority governments are given

7
New cards

Legislative

U.S. Congress and House of Representatives and Senate, creates statutory law

8
New cards

Executive Branch

President and staff at cabinet level agencies, enforces law Judi

9
New cards

Judicial Branch

The court system, interprets law passed by the legislative branch

10
New cards

Statutes

Enacted by legislative bodies

11
New cards

Administrative Law

Public law, develop and enforce rules and regulations that carry out the intent of statutes

12
New cards

Judicial Law

Law created from the court decisions

13
New cards

Arbitration

Parties agree to submit a dispute to a third party to decide

14
New cards

Mediation

Parties agree to submit a dispute to a third party who assists the parties in reaching a resolution

15
New cards

Discovery

Pretrial process in a time period in which parties to a lawsuit use various strategies to discover or obtain information about a case

16
New cards

Deposition

Obtains the parties and other witnesses out of court testimony under oath

17
New cards

Interrogatories

Written questions to the parties in order to obtain information

18
New cards

Subpoena

Legal document that facilitates discovery by instructing someone to do something

19
New cards

Subpoena Ad Testificantum

Seek’s one’s testimony

20
New cards

Subpoena Duces Tecum

Seeks documents and other records can bring with him or her

21
New cards

Contempt of Court

Failure to comply

22
New cards

Metadata

Data about data

23
New cards

Spoilation

Act of destroying, changing, or hiding evidence intentionally

24
New cards

Legal Hold

Generally a court order to preserve a health record if there is concern about destruction

25
New cards

Voir Dire

Selecting a jury

26
New cards

Federal Rules of Evidence (FRE)

Govern admissibility in the federal court system H

27
New cards

Hearsay

Out of court statement used to prove the truth of the matter and is inherently deemed untrustworthy

28
New cards

Business Records Exemption

Business records are deemed inherently trustworthy and are admissible as long as they are made at or near the time of the event being recorded

29
New cards

Negligence

Unintentional wrongdoing

30
New cards

Nonfeasance

Failure to act as a prudent person would

31
New cards

Malfeasance

Wrong or improper act that may be unlawful

32
New cards

Misfeasance

Improper performance during an otherwise correct act

33
New cards

For a negligence lawsuit to be successful the plaintiff must prove what four elements?

  • The existence of duty to me is standard of care

  • Breach or deviation from that duty

  • Causation, the relationship between the defendants conducts and the harm that was suffered

  • Injury that may be economic or non economic

34
New cards

General Consent

Consent for routine treatment

35
New cards

Informed Consent

Patient has basic understanding of the diagnosis and nature of the treatment or procedure

36
New cards

Durable Power of Attorney for Healthcare Decisions (DPOA-HCD)

An individual while still competent designates another person to make healthcare decisions consistent with the individuals wishes on his or her behalf

37
New cards

Living Will

Executed by a competent adult expressing the individual’s wishes on his or her behalf

38
New cards

Living Will

Executed by a competent adult expressing the individual’s wishes regarding treatment should the individual became afflicted with certain conditions

39
New cards

Privileged Communication

Laws generally prohibit medical practitioners from disclosing information during litigation if that information arises from the parties professional relationship and relates to the patients care and treatment

40
New cards

Jurisdiction

Legal authority to make decisions

41
New cards

Authentication

Affirms a health record legitimacy through testimony or written validation

42
New cards

Personal Health Record (PHR)

Owned and managed by the individual who was the subject of the health record, not the business record of the organization

43
New cards

False Claims Act

False claims against the government

44
New cards

Licensure

Designation given to any individual organizations by a government agency or board that gives the individual permission to practice

45
New cards

Certification

A designation given by a private organization to acknowledge a requisites level of knowledge competency and skills

46
New cards

HIPPA Privacy Act

Governs the protection of protected health information

47
New cards

Preemption

Federal law may supersede state law, HIPPA privacy rule is only a federal floor of privacy requirements so it does not supersede stricter state statutes

48
New cards

American Recovery and Reinvestment Act (ARRA)

Provided significant funding for health information technology and other economic stimulus funding, creator of HITECH

49
New cards

Covered Entity

Person or organization other than a member of the CE’s workforce that performs functions or activities on behalf of a CEO that involves the use or disclosure of PHI

50
New cards

Three part test in order to identify PHI

First - The information to be held or transmitted by a CEO or a BA

Second - The information must be individually identifiable health information

Third - It must relate to a person’s past, present, or future physical or mental health condition

51
New cards

Designated Record Set

Includes the health records, billing records, and various claim records that are used to make decisions about an individual

52
New cards

Minimum Necessary Standard

Requires that uses, disclosures, and requests may be limited to only the amount needed to accomplish the intended purpose

53
New cards

Public interest and Benefit Circumstances

16 Circumstances where PHI can be used or disclosed without an individuals authorization

54
New cards

Breach Notification

  • Breach notification regulations are issued by the Federal Trade Commission (FTC)

  • A breach should be presumed following an impermissible use of disclosure unless the covered entity demonstrates a low probability that the PHI has been compromised

  • All individuals whose information has been breached must be notified without unreasonable delay no more than 60 days

  • If 500 or more individuals are affected, they must be individually notified as well

  • Individuals must be given a description of what occurred, the types of PHI that were involved, and the steps that can be taken to protect themselves

55
New cards

Disclosure of Health Information

Process of providing PHI access to individuals or entities that are authorized to either receive or review it

Step 1 - Enter the request and the disclosure of Health Information Database

Step 2 - Determine the validity of authorization

Step 3 - Verify the patients identity

Step 4 - Process the request

56
New cards

Data Integrity

Data is complete, accurate, consistent and up to date, so the data is reliable

57
New cards

Social Engineering

Manipulation of individual’s to freely disclose personal information or account credentials to hackers

58
New cards

Phishing

Hacker sends what appears to be a legitimate e-mail from a legitimate company requesting the target to click a link within the email

59
New cards

Spear Phishing

The hacker researches the individual and comes up with an e-mail that would be interesting to that individual

60
New cards

Baiting

Leaving an infected USB in a public area and hope that someone will come by and pick it up

61
New cards

Tailgaiting

Hacker gains access to a restricted area by using an authorized individual access

62
New cards

Malware

Any type of software attack designed to disrupt mobile or computer operations

63
New cards

Computer Virus

Program that reproduces itself and attaches itself to legitimate programs on a computer

64
New cards

Computer Worm

Program that reproduces itself and attaches itself to legitimate programs on a computer

65
New cards

Trojan Horse

Program that gains unauthorized access to a computer and masquerades as a useful function

66
New cards

Spyware

Computer program that tracks an individual’s activity on a computer system

67
New cards

Back Door Program

Computer program that bypasses unauthorized access to a computer and assumes control of it and modifies the operating system

68
New cards

Ransomware

Malicious software that a hacker sends employees to block access to a computer system, victims will see an electronic ransom note appears on the screen

69
New cards

Security Incident

Attempted or successful unauthorized access use disclosure modification or destruction of information

70
New cards

Risk Management

Comprehensive program of activity that is intended to minimize the potential for injuries to occur in a facility

71
New cards

Risk Analysis

Involves assessing security threats and vulnerabilities and the likely impact of any vulnerabilities

72
New cards

Access Safeguards

Fundamental security strategy is the identification of which employees should have access to what data

73
New cards

Access Control

Restriction of access to information and information resources to only those who are authorized

74
New cards

Two Factor Authorization

Providing information from two or three different types of authentications information

75
New cards

Three types of authentication information are

Passwords, Smart Cards and tokens, and biometrics

76
New cards

Physical Safeguards

Physical protection of information resources from physical damage, loss from natural or other disasters and theft

77
New cards

Administrative Safeguards

Physical protection of information resources from physical damage loss from natural ior other disasters and theft

78
New cards

Administrative Safeguards

Policies and procedures that address the management of computer resources

79
New cards

Edit Check

Help ensure data integrity by allowing only reasonable and predetermined values to be entered into the computer

80
New cards

Firewall

Designed to block unauthorized access while permitting authorized communications

81
New cards

Cryptography

Branch of Mathematics that is based on the transformation of data by developing ciphers

82
New cards

Encryption

Method of encoding data converting them to jumble of unreadable, scrambled characters and symbols as they are transmitted through a telecommunication network, so they are not understood by persons who do not have a key

83
New cards

Risk Analysis

Helps to ensure maintenance of the confidentiality, integrity, and availability of e-phi

84
New cards

Workforce Security

Ensuring appropriate clearance procedures to grant access to individually identifiable information to workforce members who need to use PHI to perform their duties

85
New cards

Facility Access Controls

Allowing access to the appropriate people to the facility

86
New cards

Workstation Use

How workstations are used that access PHIS

87
New cards

Server Redudancy

Reduce the risk that information is not accessible during a server crash