Exam 26: Privacy and Security

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

What is a negative impact of the increased use of mobile devices in transmitting health data?

Free
(Multiple Choice)
4.9/5
(28)
Correct Answer:
Verified

B

What are some examples of indirect costs to organizations that have security breaches? (Select all that apply.)

Free
(Multiple Choice)
4.7/5
(18)
Correct Answer:
Verified

A, C, D

Which example constitutes an internal security event?

Free
(Multiple Choice)
4.9/5
(36)
Correct Answer:
Verified

D

What is the difference between the safe harbor and expert determination methods of de-identifying data?

(Multiple Choice)
4.7/5
(33)

Which principles are included in IMIA's Code of Ethics for informatics? (Select all that apply.)

(Multiple Choice)
4.7/5
(37)

An organization implements a policy on installing software service packs on all its computers. This is an example of which type of control?

(Multiple Choice)
4.8/5
(34)

Which organization works on an international level to improve information privacy?

(Multiple Choice)
4.9/5
(30)

A healthcare provider forgets to update a patient's medications. Which fair information principle is being violated?

(Multiple Choice)
4.9/5
(34)

Which are examples of secondary use of health information? (Select all that apply.)

(Multiple Choice)
4.8/5
(32)

Which definition most accurately describes privacy?

(Multiple Choice)
4.8/5
(34)
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)