Deck 12: Clinical Confidentiality, Privacy Ethical Issues in the Digital Age

Full screen (f)
exit full mode
Question
Concern with medical privacy stretches at least as far back as which culture?

A) Ancient Romans
B) Ancient Greeks
C) Mycenaeans
D) Ancient Egyptians
Use Space or
up arrow
down arrow
to flip the card.
Question
The HMISS has approximately how many members globally?

A) 10,000
B) 25,000
C) 55,000
D) 70,000
Question
From what group can the CPHMIS be obtained?

A) HMISS
B) ACA
C) HHS
D) AMA
Question
Which of the following falls outside the normal bounds of the competence of due care?

A) Confidentiality
B) Access control
C) Cost control
D) Security
Question
Which of the following is true about privacy and confidentiality?

A) They are nonidentical but have many overlapping features.
B) They are essentially the same.
C) They are legally indistinguishable.
D) They are imprecisely separated.
Question
When were the HIPAA rules first created?

A) 1990
B) 1996
C) 2000
D) 2008
Question
Which part of the government would require a new act of Congress for it to have health IT data oversight?

A) ONC
B) FDA
C) HHS
D) FCC
Question
In health IT, mobile devices include which of the following?

A) Smartphone
B) Desktop computer
C) Server
D) Mouse
Question
Healthcare apps are used by approximately how many people?

A) 500,000
B) 1,000,000,000
C) 1,200,000,000
D) 1,700,000,000
Question
If you email a copy of our own medical records to a provider, this is an example of a:

A) directed exchange.
B) legal exchange.
C) consumer-mediated exchange.
D) query-based exchange.
Question
Which of the following is an example of telemedicine?

A) Getting medical advice from a nurse practitioner over the phone
B) Calling a doctor's office to make an appointment
C) Answering a phone survey about provider quality
D) Calling a lay friend for medical advice
Question
For health IT professionals, which of the following is the greatest danger of social media?

A) Publicizing new software
B) Privacy violations
C) Customer feedback
D) Finding a position
Question
The Privacy Rule is intended to protect data while allowing it to be used in practice.
Question
The HIPAA Security Rule created protected health information.
Question
The HIPAA Privacy Rule governs e-PHI.
Question
The HITECH Act raised financial penalties for HIPAA violations.
Question
If your local hospital sends you a fundraising letter based on your latest ER visit, that may be a HIPAA violation.
Question
In 2017, approximately 250 privacy breaches of health information were publicly reported in the United States.
Question
Between 2014 and 2016, approximately 50% of providers had data breaches.
Question
The Joint Commission has banned the use of text messaging for patient data.
Question
A physician who uses a secure device and secure software to text medical orders violates privacy standards.
Question
Passwords should be used on mobile devices involved in health IT.
Question
Frequent updates to security software when health data are involved is a very wise thing.
Question
HIPAA defines what is protected _________ information.
Question
The HITECH Act protected patients from the dissemination of their _________ data for underwriting purposes.
Question
How are the HIMSS and the corresponding TIGER Initiative competencies relevant to clinical professionals?
Question
Since most, if not all, EHR vendors supply security software, why should providers be concerned with security issues?
Question
While some entities are covered under HIPAA privacy and security, others are not. What risk does a non-covered entity pose to a healthcare provider?
Question
What should providers consider in the use and storage of mental health records?
Question
Does the requirement for accurate medical documentation change with new technology? If so, how?
Question
List and define the different types of health IT introduced in the chapter. Based on use and functionality, do some types inherently have more legal and ethical risks? If so, how are the risks greater?
Question
Other than privacy and security, what are other legal and ethical risks that are involved with the use of health IT?
Question
The end of the chapter describes the "four principles approach" to healthcare ethics. In contemplating the scenario at the beginning of the chapter, how are each of the four principles either promoted or detracted?
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/33
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 12: Clinical Confidentiality, Privacy Ethical Issues in the Digital Age
1
Concern with medical privacy stretches at least as far back as which culture?

A) Ancient Romans
B) Ancient Greeks
C) Mycenaeans
D) Ancient Egyptians
B
2
The HMISS has approximately how many members globally?

A) 10,000
B) 25,000
C) 55,000
D) 70,000
D
3
From what group can the CPHMIS be obtained?

A) HMISS
B) ACA
C) HHS
D) AMA
A
4
Which of the following falls outside the normal bounds of the competence of due care?

A) Confidentiality
B) Access control
C) Cost control
D) Security
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
5
Which of the following is true about privacy and confidentiality?

A) They are nonidentical but have many overlapping features.
B) They are essentially the same.
C) They are legally indistinguishable.
D) They are imprecisely separated.
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
6
When were the HIPAA rules first created?

A) 1990
B) 1996
C) 2000
D) 2008
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
7
Which part of the government would require a new act of Congress for it to have health IT data oversight?

A) ONC
B) FDA
C) HHS
D) FCC
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
8
In health IT, mobile devices include which of the following?

A) Smartphone
B) Desktop computer
C) Server
D) Mouse
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
9
Healthcare apps are used by approximately how many people?

A) 500,000
B) 1,000,000,000
C) 1,200,000,000
D) 1,700,000,000
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
10
If you email a copy of our own medical records to a provider, this is an example of a:

A) directed exchange.
B) legal exchange.
C) consumer-mediated exchange.
D) query-based exchange.
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
11
Which of the following is an example of telemedicine?

A) Getting medical advice from a nurse practitioner over the phone
B) Calling a doctor's office to make an appointment
C) Answering a phone survey about provider quality
D) Calling a lay friend for medical advice
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
12
For health IT professionals, which of the following is the greatest danger of social media?

A) Publicizing new software
B) Privacy violations
C) Customer feedback
D) Finding a position
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
13
The Privacy Rule is intended to protect data while allowing it to be used in practice.
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
14
The HIPAA Security Rule created protected health information.
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
15
The HIPAA Privacy Rule governs e-PHI.
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
16
The HITECH Act raised financial penalties for HIPAA violations.
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
17
If your local hospital sends you a fundraising letter based on your latest ER visit, that may be a HIPAA violation.
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
18
In 2017, approximately 250 privacy breaches of health information were publicly reported in the United States.
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
19
Between 2014 and 2016, approximately 50% of providers had data breaches.
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
20
The Joint Commission has banned the use of text messaging for patient data.
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
21
A physician who uses a secure device and secure software to text medical orders violates privacy standards.
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
22
Passwords should be used on mobile devices involved in health IT.
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
23
Frequent updates to security software when health data are involved is a very wise thing.
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
24
HIPAA defines what is protected _________ information.
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
25
The HITECH Act protected patients from the dissemination of their _________ data for underwriting purposes.
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
26
How are the HIMSS and the corresponding TIGER Initiative competencies relevant to clinical professionals?
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
27
Since most, if not all, EHR vendors supply security software, why should providers be concerned with security issues?
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
28
While some entities are covered under HIPAA privacy and security, others are not. What risk does a non-covered entity pose to a healthcare provider?
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
29
What should providers consider in the use and storage of mental health records?
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
30
Does the requirement for accurate medical documentation change with new technology? If so, how?
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
31
List and define the different types of health IT introduced in the chapter. Based on use and functionality, do some types inherently have more legal and ethical risks? If so, how are the risks greater?
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
32
Other than privacy and security, what are other legal and ethical risks that are involved with the use of health IT?
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
33
The end of the chapter describes the "four principles approach" to healthcare ethics. In contemplating the scenario at the beginning of the chapter, how are each of the four principles either promoted or detracted?
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 33 flashcards in this deck.