• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/56

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

56 Cards in this Set

  • Front
  • Back
A computer software program designed to prevent unauthorized use of an information resource
Access controls
Amended by HITECH, The implementation specifications of the HIPAA security rule that are designated addressable rather than required to be in compliance with the role the covered entity must implement the specification as written implement an alternative or document that the risk for which the addressable implementation specification was provided either does not exist in the organization or exist with a negligible
Addressable standards
Administrative actions and policies and procedures to manage the selection development implementation and maintenance of security measures to protect electronic protected health information and to manage the conduct of the covered entity's workforce
Administrative safeguard
As amended by HITECH, Authorizes to adopt standards for transactions and code sets that are used to exchange health data adopt standard identifiers for health plans healthcare providers employers and individuals for use on standard transactions
Administration simplification
Accredited standards committee electronic data interchange
ASC X12 standards
The mechanisms that record and examine activity in information systems
Audit controls
Review the audit trail and compare it to criteria are specified by the organization which illuminates routine injuries such as the periodic back ups
Audit reduction tool
A chronological set of computerized records that provides evidence of information system activity used to determine security violations a record that shows who has access a computer system
Audit trail
The physical characteristics of users such as fingerprints voice print retinal scan Iris traits that system store and use to authenticate Identity before allowing the user access to a system
Biometrics
A person or organization other than a member of a covered entities workforce that performs functions or activities on behalf of or fit in a covered entity that involves the use or disclosure of individually identifiable health information
Business associate
AHIMA credential that recognizes advanced competency in designing implementing and administering comprehensive privacy and security protection program in all types of healthcare organizations
CHPS
Certification sponsored by the international information system security certification consider Tory him it is a generic security certification and therefore is not healthcare specific
CISSP
Under HIPAA means any set of codes used to encoded data elements such as tables of terms medical concepts medical diagnostic codes or medical procedure codes a code set includes the codes in the descriptions of the codes
Code set
Recovery plan in the event of a power failure disaster or other emergency that limits or eliminate axis to Basilica ease and electronic protected personal health information
Contingency Plan
A health plan healthcare clearinghouse or a healthcare provider who transmits any health information in electronic form in connection with a transaction covered by the sub-chapter
Covered Entity
The process of recouping any data that has been lost from the system crashed as well as the data that were obtained during the downtime
Data Recovery
The process of removing or rearranging the magnetic field of a disc in order to render the data recoverable
Degaussing
A category of organization established under HIPAA to maintain the electronic transaction standards
DSMO
To be subject to HIPAA and organization must meet the definition of a
Covered Entity
One of the purposes of the administrative simplification title is to
Improve efficiency and effectiveness of healthcare business processes
Is an example of the designated standard maintenance organization
HL7
What would make patient information PHI
Account Number
Which encodes data
Code Set
Allow inequivalent method to be used
Addressable Standards
A healthcare organization can consider size and complexity of the organization when developing the security plan this flexibility is called
Scalability
What type of safeguard is more people focused in nature
Administrative
Ensuring that data are not altered either during transmission across a network or during storage is called
Integrity
Construction workers accidentally cut the power to the data center this is an example of what type of threat
Human Error
We found a weakness in our security through which a hacker can't access the system this weakness is known as
Vulnerability
Security control should be monitored periodically for inappropriate disclosure or use this review is called
Information System Activity Review
The standard that determines whether or not an employees access to the ePHI Is appropriate is called
Workforce Security
The individual assigned the responsibility of managing the security process is called
Security Official
We have spent a lot of money purchasing duplicate hardware cables and such this duplication is known as
Redundancy
Periodically the files containing the documentation of security awareness training are cleaning out how many years back must records be kept
6 years
If the EHR crushes what plants should be implemented
Contingency
Security awareness training must be provided to
All members of the workforce
Which is a business associate
Company that bills for a physicians office
An example of a technical safeguard is
Audit Control
Is used to indicate that data I sent is the same as data received
Integrity
An example of a person or entity authentication
Password
Where should the audit trail be stored
On a different computer from the database
Our computer system just notified us that Mary has just looked up another patient with the same last name this notification is called a
Trigger
What type of malware can capture keystrokes
Spyware
The term used to describe viruses and spyware is called
Malicious Software
An example of two factor authentication
Retinal Scan and Password
A labor and delivery nurse has the same access to the information system as the perinatal nurse even though the job varies this is what type of access
Role-Based
Data lost due to Malware being downloaded onto a computer may be caused by which of the following
Virus
Using a magnet to destroy data on a magnetic disk is called
Degaussing
An example of a facility access control is
Escorting visitors in the data center
Where should backup disk be stored?
In an area that would not be subjected to the same natural disasters as the original data
Physical safeguards include
Hardware and Software
Poor security practices that do not lead to disclosure of the ePHI are called
Security Events
It security breach has been reported what concept describes the process used to gather evidence
Forensics
The inadvertent deletion of data needed for a court case is known as
Spoiliation
Our hardware repair service needs access to the data center he signed in and is escorted this is an example of what
Facility Access Controls
An example of a security incident
Virus Attack