Deck 12: Clinical Confidentiality, Privacy Ethical Issues in the Digital Age
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/33
Play
Full screen (f)
Deck 12: Clinical Confidentiality, Privacy Ethical Issues in the Digital Age
1
Concern with medical privacy stretches at least as far back as which culture?
A) Ancient Romans
B) Ancient Greeks
C) Mycenaeans
D) Ancient Egyptians
A) Ancient Romans
B) Ancient Greeks
C) Mycenaeans
D) Ancient Egyptians
B
2
The HMISS has approximately how many members globally?
A) 10,000
B) 25,000
C) 55,000
D) 70,000
A) 10,000
B) 25,000
C) 55,000
D) 70,000
D
3
From what group can the CPHMIS be obtained?
A) HMISS
B) ACA
C) HHS
D) AMA
A) HMISS
B) ACA
C) HHS
D) AMA
A
4
Which of the following falls outside the normal bounds of the competence of due care?
A) Confidentiality
B) Access control
C) Cost control
D) Security
A) Confidentiality
B) Access control
C) Cost control
D) Security
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
5
Which of the following is true about privacy and confidentiality?
A) They are nonidentical but have many overlapping features.
B) They are essentially the same.
C) They are legally indistinguishable.
D) They are imprecisely separated.
A) They are nonidentical but have many overlapping features.
B) They are essentially the same.
C) They are legally indistinguishable.
D) They are imprecisely separated.
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
6
When were the HIPAA rules first created?
A) 1990
B) 1996
C) 2000
D) 2008
A) 1990
B) 1996
C) 2000
D) 2008
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
7
Which part of the government would require a new act of Congress for it to have health IT data oversight?
A) ONC
B) FDA
C) HHS
D) FCC
A) ONC
B) FDA
C) HHS
D) FCC
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
8
In health IT, mobile devices include which of the following?
A) Smartphone
B) Desktop computer
C) Server
D) Mouse
A) Smartphone
B) Desktop computer
C) Server
D) Mouse
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
9
Healthcare apps are used by approximately how many people?
A) 500,000
B) 1,000,000,000
C) 1,200,000,000
D) 1,700,000,000
A) 500,000
B) 1,000,000,000
C) 1,200,000,000
D) 1,700,000,000
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
10
If you email a copy of our own medical records to a provider, this is an example of a:
A) directed exchange.
B) legal exchange.
C) consumer-mediated exchange.
D) query-based exchange.
A) directed exchange.
B) legal exchange.
C) consumer-mediated exchange.
D) query-based exchange.
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
11
Which of the following is an example of telemedicine?
A) Getting medical advice from a nurse practitioner over the phone
B) Calling a doctor's office to make an appointment
C) Answering a phone survey about provider quality
D) Calling a lay friend for medical advice
A) Getting medical advice from a nurse practitioner over the phone
B) Calling a doctor's office to make an appointment
C) Answering a phone survey about provider quality
D) Calling a lay friend for medical advice
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
12
For health IT professionals, which of the following is the greatest danger of social media?
A) Publicizing new software
B) Privacy violations
C) Customer feedback
D) Finding a position
A) Publicizing new software
B) Privacy violations
C) Customer feedback
D) Finding a position
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
13
The Privacy Rule is intended to protect data while allowing it to be used in practice.
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
14
The HIPAA Security Rule created protected health information.
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
15
The HIPAA Privacy Rule governs e-PHI.
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
16
The HITECH Act raised financial penalties for HIPAA violations.
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
17
If your local hospital sends you a fundraising letter based on your latest ER visit, that may be a HIPAA violation.
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
18
In 2017, approximately 250 privacy breaches of health information were publicly reported in the United States.
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
19
Between 2014 and 2016, approximately 50% of providers had data breaches.
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
20
The Joint Commission has banned the use of text messaging for patient data.
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
21
A physician who uses a secure device and secure software to text medical orders violates privacy standards.
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
22
Passwords should be used on mobile devices involved in health IT.
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
23
Frequent updates to security software when health data are involved is a very wise thing.
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
24
HIPAA defines what is protected _________ information.
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
25
The HITECH Act protected patients from the dissemination of their _________ data for underwriting purposes.
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
26
How are the HIMSS and the corresponding TIGER Initiative competencies relevant to clinical professionals?
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
27
Since most, if not all, EHR vendors supply security software, why should providers be concerned with security issues?
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
28
While some entities are covered under HIPAA privacy and security, others are not. What risk does a non-covered entity pose to a healthcare provider?
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
29
What should providers consider in the use and storage of mental health records?
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
30
Does the requirement for accurate medical documentation change with new technology? If so, how?
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
31
List and define the different types of health IT introduced in the chapter. Based on use and functionality, do some types inherently have more legal and ethical risks? If so, how are the risks greater?
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
32
Other than privacy and security, what are other legal and ethical risks that are involved with the use of health IT?
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
33
The end of the chapter describes the "four principles approach" to healthcare ethics. In contemplating the scenario at the beginning of the chapter, how are each of the four principles either promoted or detracted?
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck