click below
click below
Normal Size Small Size show me how
Week 10 Informatics
Week 10 Informatics Safeguarding Patient Privacy
Question | Answer |
---|---|
Which are governed by HIPAA security rules for physical data safety? | - How workstations are used - Who has access to patient data - Who has access to workstations |
Match the facility requirements with examples. - Disaster recovery plan and emergency mode operations -Surveillance cameras, property control tags, and ID badges -Documentation of security updates or modifications | - Contingency operations - Facility Security Plan - Maintenance Records |
What covered entities are under HIPAA’s Security Rule? | - Private health plans - Health Care Clearing House - Providers transmitting health care data electronically |
Which describes suggested standards of the National Institutes of Standards and Technology (NIST)? | - Implement data encryption - Determine who has access to protected health information - Remove system access by persons no longer employed by the facility |
Which describes technical safeguards for patient data? | Policies and procedures relating to PHI |
Which is a technical method for protecting data? | Encryption |
Which are methods for workstation safety and security? | - Assure workstation placement is secure - Remove all data before reassigning the device - Policy development for workstation use and safety. |
Which describe physical security measures that safely secures patient data? | - Plans to recover data inadvertently deleted - Dispose of electronic media so that it cannot be reused - Documentation of regular data security checks and updates |
What is the goal of a facility security plan? | Protection from unauthorized use |
Match the technical problem with its definition - Uninvited manipulation of a computer’s behavior - Scam posing in a legitimate manner to access - Software which gathers information about a user - Software which accesses and damages a compute | Hacking - Phishing - Spyware- Malware |
Which method is used to prevent hacking? | Adequate firewall |
Which are examples of access control? | Unique User Identification |