Deck 26: Privacy and Security

Full screen (f)
exit full mode
Question
Which definition most accurately describes privacy?

A) The means to ensure health record privacy and confidentiality
B) Accuracy and completeness of health information
C) The rights of individuals to control access to their person or information about themselves
D) An act that has the potential to cause harm to an informational asset
Use Space or
up arrow
down arrow
to flip the card.
Question
A healthcare provider forgets to update a patient's medications. Which fair information principle is being violated?

A) Correction
B) Openness and transparency
C) Data quality and integrity
D) Safeguards
Question
Which organization works on an international level to improve information privacy?

A) Health and Human Services Office of Civil Rights
B) Health Information Security and Privacy Collaboration (HISPC)
C) Department of Health and Human Services (DHHS)
D) Electronic Frontier Foundation (EFF)
Question
What is the difference between the safe harbor and expert determination methods of de-identifying data?

A) The safe harbor method involves removal of 18 types of identifiers, and the expert determination method involves the application of statistical or scientific models.
B) The safe harbor method involves the application of statistical or scientific models, and the expert determination method involves removal of 18 types of identifiers.
C) The safe harbor method involves removal of all identifiers, and the expert determination method involves the removal of 18 types of identifiers.
D) The safe harbor method involves securing identifiers in an encrypted database, and the expert determination specifically determines the riskiest identifiers to remove.
Question
What is a negative impact of the increased use of mobile devices in transmitting health data?

A) They support increased health data access for providers.
B) They increase the risk of a security breach.
C) They decrease productivity.
D) They increase the number of medication errors.
Question
Which example constitutes an internal security event?

A) Servers containing clinical data were stolen from a facility.
B) A person hacks into a facility's server and steals PHI electronically.
C) A person installs a malicious code past a facility's firewall.
D) A system administrator installed a new server without any security measures.
Question
An organization implements a policy on installing software service packs on all its computers. This is an example of which type of control?

A) Administrative
B) Technical
C) Physical
D) Electronic
Question
What are some examples of indirect costs to organizations that have security breaches? (Select all that apply.)

A) Lost productivity
B) Expensive fines
C) Damaged public trust
D) Remediation costs
E) Repeating medical procedures
Question
Which are examples of secondary use of health information? (Select all that apply.)

A) Treatment
B) Surveillance
C) Research
D) Marketing
E) Prevention
Question
Which principles are included in IMIA's Code of Ethics for informatics? (Select all that apply.)

A) Information-Privacy and Disposition
B) Openness
C) Elimination of Threats
D) Legitimate Infringement
E) Accountability
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/10
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 26: Privacy and Security
1
Which definition most accurately describes privacy?

A) The means to ensure health record privacy and confidentiality
B) Accuracy and completeness of health information
C) The rights of individuals to control access to their person or information about themselves
D) An act that has the potential to cause harm to an informational asset
The rights of individuals to control access to their person or information about themselves
2
A healthcare provider forgets to update a patient's medications. Which fair information principle is being violated?

A) Correction
B) Openness and transparency
C) Data quality and integrity
D) Safeguards
Data quality and integrity
3
Which organization works on an international level to improve information privacy?

A) Health and Human Services Office of Civil Rights
B) Health Information Security and Privacy Collaboration (HISPC)
C) Department of Health and Human Services (DHHS)
D) Electronic Frontier Foundation (EFF)
Electronic Frontier Foundation (EFF)
4
What is the difference between the safe harbor and expert determination methods of de-identifying data?

A) The safe harbor method involves removal of 18 types of identifiers, and the expert determination method involves the application of statistical or scientific models.
B) The safe harbor method involves the application of statistical or scientific models, and the expert determination method involves removal of 18 types of identifiers.
C) The safe harbor method involves removal of all identifiers, and the expert determination method involves the removal of 18 types of identifiers.
D) The safe harbor method involves securing identifiers in an encrypted database, and the expert determination specifically determines the riskiest identifiers to remove.
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
5
What is a negative impact of the increased use of mobile devices in transmitting health data?

A) They support increased health data access for providers.
B) They increase the risk of a security breach.
C) They decrease productivity.
D) They increase the number of medication errors.
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
6
Which example constitutes an internal security event?

A) Servers containing clinical data were stolen from a facility.
B) A person hacks into a facility's server and steals PHI electronically.
C) A person installs a malicious code past a facility's firewall.
D) A system administrator installed a new server without any security measures.
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
7
An organization implements a policy on installing software service packs on all its computers. This is an example of which type of control?

A) Administrative
B) Technical
C) Physical
D) Electronic
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
8
What are some examples of indirect costs to organizations that have security breaches? (Select all that apply.)

A) Lost productivity
B) Expensive fines
C) Damaged public trust
D) Remediation costs
E) Repeating medical procedures
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
9
Which are examples of secondary use of health information? (Select all that apply.)

A) Treatment
B) Surveillance
C) Research
D) Marketing
E) Prevention
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
10
Which principles are included in IMIA's Code of Ethics for informatics? (Select all that apply.)

A) Information-Privacy and Disposition
B) Openness
C) Elimination of Threats
D) Legitimate Infringement
E) Accountability
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 10 flashcards in this deck.