Domain 2 Flashcards

(50 cards)

1
Q

What is the primary purpose of the HIPAA Privacy Rule?

A

To protect patient health information and control its use and disclosure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does PHI stand for?

A

Protected Health Information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the minimum necessary standard?

A

Limiting PHI access to only what is needed for a specific task.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What document authorizes release of information?

A

A valid patient authorization form.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How long must HIPAA documentation be retained?

A

6 years.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is an audit trail?

A

A record of system activity tracking access and changes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a covered entity?

A

Healthcare providers, plans, and clearinghouses under HIPAA.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a business associate?

A

A third party that handles PHI on behalf of a covered entity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is required before releasing PHI for non-treatment purposes?

A

Patient authorization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a breach under HIPAA?

A

Unauthorized access, use, or disclosure of PHI.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How soon must patients be notified of a breach?

A

Within 60 days.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is de-identified information?

A

Data with all identifiers removed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the purpose of the HIPAA Security Rule?

A

To protect electronic PHI.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Name one administrative safeguard.

A

Employee training.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Name one physical safeguard.

A

Locked file cabinets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Name one technical safeguard.

A

Encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is role-based access?

A

Access based on job responsibilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the purpose of access controls?

A

To limit who can view or use PHI.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is a subpoena?

A

A legal document requiring records or testimony.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What must be verified before releasing records?

A

Patient identity and authorization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the purpose of an ROI log?

A

To track disclosures of PHI.

22
Q

What is accounting of disclosures?

A

A record of certain PHI disclosures.

23
Q

When is patient consent not required?

A

For treatment, payment, and operations.

24
Q

What is incidental disclosure?

A

Unavoidable disclosure during normal operations.

25
What is a data breach risk assessment?
Evaluation of potential harm from a breach.
26
What is secure disposal of PHI?
Proper destruction to prevent unauthorized access.
27
What is shredding used for?
Destroying paper PHI.
28
What is encryption?
Converting data to unreadable form.
29
What is authentication?
Verifying a user's identity.
30
What is a firewall?
A system that protects networks from unauthorized access.
31
What is two-factor authentication?
Using two methods to verify identity.
32
What is a confidentiality agreement?
A promise to protect sensitive information.
33
What is an incident response plan?
Steps to take after a breach.
34
What is data integrity?
Accuracy and completeness of data.
35
What is data availability?
Ensuring data is accessible when needed.
36
What is a security risk analysis?
Identifying vulnerabilities in systems.
37
What is patient access right?
Ability to view and obtain their records.
38
What is amendment of records?
Correcting errors in health records.
39
What is a designated record set?
Records used to make decisions about patients.
40
What is workforce training?
Educating staff on HIPAA compliance.
41
What is sanction policy?
Disciplinary actions for violations.
42
What is workstation security?
Protecting devices used to access PHI.
43
What is a login credential?
Username and password.
44
What is data backup?
Copying data for recovery.
45
What is disaster recovery?
Restoring systems after failure.
46
What is remote access risk?
Security risk from off-site access.
47
What is phishing?
Fraud attempt to obtain sensitive info.
48
What is malware?
Malicious software.
49
What is social engineering?
Manipulating people to gain access.
50
What is least privilege principle?
Giving only necessary access.