Deck 13: Information Systems

Full screen (f)
exit full mode
Question
The health care provider should consider improved controls,including the establishment of written policies and procedures covering the loan and use of _____ and whether ePHI should even be maintained on these media/devices at all

A) Computer devices that are portable
B) Electronic surveillance equipment
C) Mainframe and archived computers
D) Off-site storage of paper records
Use Space or
up arrow
down arrow
to flip the card.
Question
To establish a health record as admissible under a business record exemption,the requesting party must show that _____.

A) An injury documented in the record was caused by negligence
B) "Duty to act" information was included in the patient record
C) The record was kept during the ordinary course of business
D) Warehoused data about patients was reviewed by the risk manager
Question
In meeting the accuracy requirement,the health information manager must _____.

A) Be familiar with the hardware and software used in the system
B) Determine which providers made entries in the patient record
C) Know whether the entries made were telephone orders or not
D) State which data entry procedures made in the record are routine
Question
E-SIGN refers to the _____.

A) Electronic Signatures in Global and National Commerce Act of 2001
B) Encryption program used by healthcare facilities that implement an EHR
C) Laws that state electronic signatures may not be used in foreign commerce
D) Programs developed to support insurance reimbursement for health care
Question
Damage prevention in an electronic health record system refers to _____.

A) Judiciously maintaining data in the EHR through authentication measures
B) Keeping data or equipment from being brought down by malicious attempts
C) Preventing third parties from gaining access to healthcare communications
D) Resuming immediate computer operations in the event of a problem
Question
A printout of the patient record,which has been maintained in an electronic medium is _____.

A) Considered inadmissible because it is not the actual patient record
B) Entered into evidence with testimony by the custodian of health records
C) Not required to meet foundation,trustworthiness,or accuracy requirements
D) Paper-based,which means it was generated manually by providers
Question
Which is considered a human resources security issue that impacts health care records?

A) Backing up healthcare data
B) Documenting care provided
C) Court-ordered release of records
D) Hiring appropriate personnel
Question
The patient's legal electronic health record is _____

A) Clearly defined by federal statues and written regulations
B) Defined by each institution with input from its legal counsel
C) Healthcare documentation imported from an R.H.I.O.
D) Information captured from one health care setting to another
Question
What measures can be taken to discourage or prevent sabotage?

A) Adding unlimited access.
B) Expanding log-on attempts.
C) Installing antivirus software.
D) Limiting methods of encryption.
Question
An advantage of switching to electronic health records is _____.

A) Decreased accessibility of information
B) Establishment of data mining procedures
C) Illegibility of information in the patient record
D) Reduced capacity for information storage
Question
HIPAA safeguards include _____.

A) Administrative and insurance
B) Informational and technical
C) Physical and technical
D) Physical and theoretical
Question
A risk prevention technique that is used to protect electronic health records is _____.

A) Authenticating all entries
B) Destroying sensitive data
C) Restricting copy functions
D) Using PDAs and iPads
Question
What constitutes a legal heath record?

A) Business record generated at or for a healthcare organization.
B) Dictation of a healthcare facility's physicians and other providers.
C) Results of quality management audits that impact patient care.
D) Statistical reports that contain data used for accreditation purposes.
Question
The electronic authentication of medical record entries _____.

A) does not hold the author of the entries accountable
B) is recognized by national accreditation organizations
C) is required by federal and state legislatures in the U.S.
D) requires paper record as a backup to verify authenticity
Question
Authentication of an electronic health record _____.

A) Ensures that people are who they say they are
B) Is accomplished by a method to prevent eavesdropping
C) Refers to the level of access to an operating system
D) Prevents malicious attempts to damage healthcare data
Question
Which is an Institute of Medicine core functionality that constitutes an electronic health record?

A) Clinical decision support
B) Dictation and transcription
C) Enforcement of collections
D) Gatekeeping for patients
Question
To be able to establish foundation,the health information manager needs to _____.

A) Be familiar with the computer system hardware and software used
B) Ensure the reliability and validity of data using QM and UM measures
C) Establish policies that govern how corrections in the record are made
D) Know the manner in which patient healthcare data is recorded
Question
Permissions granted in an electronic health record system involve _____.

A) Authenticating individual entries made in the EHR
B) Ensuring that people are who they say they are
C) Levels of access granted to an operating system
D) Preventing malicious attempts to destroy health data
Question
An electronic health record includes _____.

A) Healthcare information that always resides off site in a computer system
B) Patient documentation created,authenticated,and retrieved manually
C) Systems that may contain links to clinical decision support systems
D) Warehoused data that is accessible by patients and third-party payers
Question
Safeguards established by HIPAA security rules _____.

A) Ensure data integrity by protecting it from unauthorized deletion
B) Limit the availability of healthcare and other data to authorized users
C) Operate within the confines of stricter state legislation and rules
D) Protect confidentiality by allowing all providers to access information
Question
Under HIPAA,administrative safeguards _____.

A) Assist entities protect information from physical intrusions
B) Define the framework of an excellent security program
C) Help develop security measures,which protect PHI
D) Include optional risk assessments that can be implemented
Question
Privacy is the means to regulate access to and ensure preservation of data.
Question
E-health practices _____.

A) Are subject to the same requirements for safeguarding confidentiality of PHI
B) Have been assigned exempt status from HIPAA regulations and requirements
C) Govern only those patients who receive Medicare reimbursable services
D) May be implemented by entities subject to Medicare Conditions of Participation
Question
Under HIPAA's security rules,addressable specifications _____.

A) Are mandatory and must be implemented in health care facilities and covered entities
B) Do not bind the entity to implementation but require documentation of alternatives
C) Permit the health care facilities and the covered entities to ignore unreasonable rules
D) Impact only the hybrid medical records that are maintained by covered entities
Question
Physical security focuses on the human aspect of security.
Question
Digital imaging in the context of maintaining PHI refers to _____.

A) Electronic indexing of patient records and other documents
B) Photographs taken of patients before and after surgery
C) Scanning a paper document,to be viewed over a server
D) Using fiberoptics in minimally invasive procedures
Question
Authentication confirms the entry,either by written signature,initials,or computer generated signature code.
Question
Under HIPAA security rules,required specifications _____.

A) Are optional for certain types of facilities
B) Help in detecting security violations
C) Must be implemented by all facilities
D) Provide opportunities to ignore certain rules
Question
List three advantages of a Digital Imaging System
Question
Beyond the responsibility for maintaining protected health information (PHI),health information managers will not be responsible for _____.

A) inappropriate access to genetic information
B) pharmacy calculations
C) statistics
D) vendor contracts
Question
Restricting copy functions is a risk prevention technique for an EHR.
Question
HIPAA security safeguards include Administrative,Technical and Physical.
Question
Improved access to health care,such as obtaining second opinions,is a benefit of telemedicine.
Question
List three benefits of telemedicine.
Question
Under HIPAA,a patient has the right to _____.

A) Alter the original medical record in person
B) Know how his information is being disclosed
C) Receive copies of any records upon request
D) Restrict all disclosures of information
Question
HIPAA Security Rules and Privacy Rules are similar,yet different,in that both _____.

A) Are different names for the same regulations
B) Limit patient access and control of information
C) Often oppose each rule's efforts and results
D) Protect information from different aspects
Question
List three ways for risk prevention in an EHR.
Question
Telemedicine is the use of electronic communications and information technologies to provide or support clinical care at a distance.
Question
ARRA establishes a process for adoption and endorsement of standards,implementation specifications,and certification criteria for electronic health records.
Question
HIPAA security officers lead awareness and training efforts for the workforce.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/40
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 13: Information Systems
1
The health care provider should consider improved controls,including the establishment of written policies and procedures covering the loan and use of _____ and whether ePHI should even be maintained on these media/devices at all

A) Computer devices that are portable
B) Electronic surveillance equipment
C) Mainframe and archived computers
D) Off-site storage of paper records
Computer devices that are portable
2
To establish a health record as admissible under a business record exemption,the requesting party must show that _____.

A) An injury documented in the record was caused by negligence
B) "Duty to act" information was included in the patient record
C) The record was kept during the ordinary course of business
D) Warehoused data about patients was reviewed by the risk manager
The record was kept during the ordinary course of business
3
In meeting the accuracy requirement,the health information manager must _____.

A) Be familiar with the hardware and software used in the system
B) Determine which providers made entries in the patient record
C) Know whether the entries made were telephone orders or not
D) State which data entry procedures made in the record are routine
Be familiar with the hardware and software used in the system
4
E-SIGN refers to the _____.

A) Electronic Signatures in Global and National Commerce Act of 2001
B) Encryption program used by healthcare facilities that implement an EHR
C) Laws that state electronic signatures may not be used in foreign commerce
D) Programs developed to support insurance reimbursement for health care
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
5
Damage prevention in an electronic health record system refers to _____.

A) Judiciously maintaining data in the EHR through authentication measures
B) Keeping data or equipment from being brought down by malicious attempts
C) Preventing third parties from gaining access to healthcare communications
D) Resuming immediate computer operations in the event of a problem
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
6
A printout of the patient record,which has been maintained in an electronic medium is _____.

A) Considered inadmissible because it is not the actual patient record
B) Entered into evidence with testimony by the custodian of health records
C) Not required to meet foundation,trustworthiness,or accuracy requirements
D) Paper-based,which means it was generated manually by providers
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
7
Which is considered a human resources security issue that impacts health care records?

A) Backing up healthcare data
B) Documenting care provided
C) Court-ordered release of records
D) Hiring appropriate personnel
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
8
The patient's legal electronic health record is _____

A) Clearly defined by federal statues and written regulations
B) Defined by each institution with input from its legal counsel
C) Healthcare documentation imported from an R.H.I.O.
D) Information captured from one health care setting to another
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
9
What measures can be taken to discourage or prevent sabotage?

A) Adding unlimited access.
B) Expanding log-on attempts.
C) Installing antivirus software.
D) Limiting methods of encryption.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
10
An advantage of switching to electronic health records is _____.

A) Decreased accessibility of information
B) Establishment of data mining procedures
C) Illegibility of information in the patient record
D) Reduced capacity for information storage
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
11
HIPAA safeguards include _____.

A) Administrative and insurance
B) Informational and technical
C) Physical and technical
D) Physical and theoretical
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
12
A risk prevention technique that is used to protect electronic health records is _____.

A) Authenticating all entries
B) Destroying sensitive data
C) Restricting copy functions
D) Using PDAs and iPads
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
13
What constitutes a legal heath record?

A) Business record generated at or for a healthcare organization.
B) Dictation of a healthcare facility's physicians and other providers.
C) Results of quality management audits that impact patient care.
D) Statistical reports that contain data used for accreditation purposes.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
14
The electronic authentication of medical record entries _____.

A) does not hold the author of the entries accountable
B) is recognized by national accreditation organizations
C) is required by federal and state legislatures in the U.S.
D) requires paper record as a backup to verify authenticity
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
15
Authentication of an electronic health record _____.

A) Ensures that people are who they say they are
B) Is accomplished by a method to prevent eavesdropping
C) Refers to the level of access to an operating system
D) Prevents malicious attempts to damage healthcare data
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
16
Which is an Institute of Medicine core functionality that constitutes an electronic health record?

A) Clinical decision support
B) Dictation and transcription
C) Enforcement of collections
D) Gatekeeping for patients
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
17
To be able to establish foundation,the health information manager needs to _____.

A) Be familiar with the computer system hardware and software used
B) Ensure the reliability and validity of data using QM and UM measures
C) Establish policies that govern how corrections in the record are made
D) Know the manner in which patient healthcare data is recorded
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
18
Permissions granted in an electronic health record system involve _____.

A) Authenticating individual entries made in the EHR
B) Ensuring that people are who they say they are
C) Levels of access granted to an operating system
D) Preventing malicious attempts to destroy health data
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
19
An electronic health record includes _____.

A) Healthcare information that always resides off site in a computer system
B) Patient documentation created,authenticated,and retrieved manually
C) Systems that may contain links to clinical decision support systems
D) Warehoused data that is accessible by patients and third-party payers
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
20
Safeguards established by HIPAA security rules _____.

A) Ensure data integrity by protecting it from unauthorized deletion
B) Limit the availability of healthcare and other data to authorized users
C) Operate within the confines of stricter state legislation and rules
D) Protect confidentiality by allowing all providers to access information
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
21
Under HIPAA,administrative safeguards _____.

A) Assist entities protect information from physical intrusions
B) Define the framework of an excellent security program
C) Help develop security measures,which protect PHI
D) Include optional risk assessments that can be implemented
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
22
Privacy is the means to regulate access to and ensure preservation of data.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
23
E-health practices _____.

A) Are subject to the same requirements for safeguarding confidentiality of PHI
B) Have been assigned exempt status from HIPAA regulations and requirements
C) Govern only those patients who receive Medicare reimbursable services
D) May be implemented by entities subject to Medicare Conditions of Participation
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
24
Under HIPAA's security rules,addressable specifications _____.

A) Are mandatory and must be implemented in health care facilities and covered entities
B) Do not bind the entity to implementation but require documentation of alternatives
C) Permit the health care facilities and the covered entities to ignore unreasonable rules
D) Impact only the hybrid medical records that are maintained by covered entities
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
25
Physical security focuses on the human aspect of security.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
26
Digital imaging in the context of maintaining PHI refers to _____.

A) Electronic indexing of patient records and other documents
B) Photographs taken of patients before and after surgery
C) Scanning a paper document,to be viewed over a server
D) Using fiberoptics in minimally invasive procedures
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
27
Authentication confirms the entry,either by written signature,initials,or computer generated signature code.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
28
Under HIPAA security rules,required specifications _____.

A) Are optional for certain types of facilities
B) Help in detecting security violations
C) Must be implemented by all facilities
D) Provide opportunities to ignore certain rules
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
29
List three advantages of a Digital Imaging System
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
30
Beyond the responsibility for maintaining protected health information (PHI),health information managers will not be responsible for _____.

A) inappropriate access to genetic information
B) pharmacy calculations
C) statistics
D) vendor contracts
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
31
Restricting copy functions is a risk prevention technique for an EHR.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
32
HIPAA security safeguards include Administrative,Technical and Physical.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
33
Improved access to health care,such as obtaining second opinions,is a benefit of telemedicine.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
34
List three benefits of telemedicine.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
35
Under HIPAA,a patient has the right to _____.

A) Alter the original medical record in person
B) Know how his information is being disclosed
C) Receive copies of any records upon request
D) Restrict all disclosures of information
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
36
HIPAA Security Rules and Privacy Rules are similar,yet different,in that both _____.

A) Are different names for the same regulations
B) Limit patient access and control of information
C) Often oppose each rule's efforts and results
D) Protect information from different aspects
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
37
List three ways for risk prevention in an EHR.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
38
Telemedicine is the use of electronic communications and information technologies to provide or support clinical care at a distance.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
39
ARRA establishes a process for adoption and endorsement of standards,implementation specifications,and certification criteria for electronic health records.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
40
HIPAA security officers lead awareness and training efforts for the workforce.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 40 flashcards in this deck.