Ethics,Privacy,Legal,Regulatory Issues in Informatics

Description

Board Exam Fundamentals Flashcards on Ethics,Privacy,Legal,Regulatory Issues in Informatics, created by Michael Riben on 07/08/2013.
Michael Riben
Flashcards by Michael Riben, updated more than 1 year ago
Michael Riben
Created by Michael Riben over 11 years ago
84
0

Resource summary

Question Answer
Confidentiality A condition in which information is shared in a controlled maner
Confidentiality as Defined by HIPPA Security Rule e-PHI is not available or disclosed to unauthorized people
Security # of measures that organizations implement to protect information and systems 1) includes efforts to maintain confidentiality of information 2) Also ensure integrity and availability of that information and the information systems used to access it
Privacy Individual's desire to limit the disclosure of personal information
Universal Decleration of human rights Protection of privacy is in Article 12
Privacy in the Hippocratic Oath Statement that physicians will keep all information secret and private
Privacy in European Convention on Human Rights ROME , 1950 and 5 protocols Article 8 says everyone has right to respect for his private and family life , his home and correspondence
US Ethical Codes Code of Fair Information Practice Belmont Report and common Rule Conflict of Interest
Code of Fair information Practice 1)no secret record keeping systems 2)Must be able to find out what is in a record and how it is used 3)Must be able to limit use of information 4) Must be able to correct or amend identifiable information 5)must ensure reliability of use of information and prevent misuse of the data
Belmont Report On Ethical Principles and Guidelines for the Protection of Human Subjects Research - 1979 1) respect for Persons 2) Beneficence 3)Justice
How was the Federal Policy for Protection of Human Subjects implemented Published the "common rule" in 1991 codifing regulations by 15 federal departments and agencies
What Federal policy outlines the basic provisions for IRB's, Informed consent, and Assurances of Compliance The Commone Rule (1991)
Which Amendment to the bill of Rights protects people from Unreasonable search and seizure Fourth Ammendment
How do hospitals implement Privacy Protection within EMRs? Policy and Audits are used to protect access to records by staff who have no professional access
List Technical Practices and Procedures for Security Individual Authentication, Access Controls, Audit Trails, Physical security and database recovery, remote access point protection, external communication protection, software discipline, and system wide assessments
List Organizational practices for Security Security and Confidentiality Practice, Security and confidentiality committees, Chief info sec officers, education/training, sanctions, auth, patient access to audit logs
List Organizational practices for Security Security and Confidentiality Practice, Security and confidentiality committees, Chief info sec officers, education/training, sanctions, auth, patient access to audit logs
Who can use a Macro in an EMR? Teaching Physicians can use macros as long as they are used with in a secure and authenticated system
What are The JACHO standards for patient specific informations ? 1) Complete and Accurate Medical Records 2) records have patient specific information 3) Throughly documents procedures and use of anesthesia 4) Ambulatory pts have diagnosis, procedures, allergies and meds in a summary lists 5) Designated qualified personell accept and transcribe verbal orders 6) Hospital provides access to all relevant information for a patient for those who needed it for patient care, treatment, and services
What are Patient Bills based upon? Based on codes which are based on Documentation , in this service
What is the Model for Privacy and Security include Threat Assessment, Asset List, Policy, Education, and Technical Measures
List the IM regulation from Jacho (joint commission) Hospital plans and designs information management processes to meet internal and external information needs
What is role of Medical Records Committee Meet EMR Standards. , oversight for activities including IM , regulations, policies, systems, and advisory
What is the critical sequence for Billing? Patient Bill is based on Codes and codes are based on medical record documentation
What are key operations for HIM personnel Release of Information, Master Patient Index
What credentials and certifications do HIM staff need/have? Coding certifications, privacy certification and credentials including Registered Health Information Administrator Registered Health Information Technician
What does JCAHO stand for Joint Commission on Accreditation of Healthcare Organization
What does Hipaa stand for? Health Insurance Portability and Accountability Act
What does HIPAA address? Information Security and Protected Health Information
What is ARRA and HITECH American Recovery and Reinvestment Act and Health Information Technology for Economic and Clinical Health , Breach Notification and Accounting of Disclosures
What is Sarbane Oxley Act Audit functions for financial Data
What is the Common Rule about ? 45 CFR Part 46 Protection of human subjects , requires the IRB and GCP
What does 21 CFR part 11 cover? Data Security (FDA), electronic signatures, etc
What is the FERPA Act? Family Educational Rights and Privacy Act-regarding medical, nursing, dental , students data
What does SSSNPA State Social Security Number Protection ACt
What does SISBNA? State Information Security , Breach and Notification Act
What is PCIDSS? Payment Card Industry Data Security Standard
what is DMCA? Digital Millenium Copyright Act of 1998
what is Protecting Access to Medicare Act (2014) ? ordering clinicians consult appropriate use criteria (AUC) through a qualified clinical decision support mechanism when requesting advanced imaging services (ie, SPECT/PET MPI, CT, and MR) on outpatients and nonemergent emergency room for the furnishing provider to receive payment approval from CMS
define a macro? macro is a command in a computer or dictation application in a EMR that automatically generates predetermined text that is not edited by the user
Show full summary Hide full summary

Similar

Fundamentals of a Computer System
Holksta
Fundamentals of remote sensing
Iain Woodhouse
Part 4: Final Exam Nursing 112 GBCC
Tess Nicholson
Steps Skips Unit Quiz
dobieorch
History and Current State of Informatics
Michael Riben
Algebra in Design Fundamentals Exam
Jacob Owczarzak
Chapter 2 question pool
Snack Pack
Computer Systems
Dean Whittle
Intro to Psychology Ch. 1
Kira Manning
CP!402 quiz
d_cull91
Intro to Psychology ch. 2
Kira Manning