• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/16

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

16 Cards in this Set

  • Front
  • Back
Firewall
A technological barrier designed to prevent unauthorized or unwanted communication between computer networks or hosts; prevents access from outside individuals through a router. Firewalls protect computers.
VPN
Virtual Private Network; allows you to log in from an outside system. For example, a radiologist can access HIS from home. VPN uses the internet to allow secure access to an organization's network. VPN's protects entire networks.
Encryption
The process of transforming information using an algorithm to make it unreadable. Information is encrypted during transmission over public lines making it secure over a virtual private network (VPN).
Access Requirements
Only certain individuals are allowed access to an organization's network. These individuals are given a user name and password to gain access. All internal users in the enterprise should have access to only their data. Their passwords should also be changed regularly.
Server
A physical computer dedicated to running services, to serve the needs of programs running on other computers on the same network.
Back up schedule
The critical data on the server should be backed up regularly, daily.
Access logs
This is a file automatically created and maintained by a server showing the history of users who have accessed the network.
Anti-virus software
Used to prevent, detect, and remove computer viruses, worms and trojan horses. The software scans data for known viruses or suspicious data and prevents it from going through the network.
Integrity verification
Verifies that data was not altered during transmission. Ensures that you are looking at the same image that was originally sent to you and that the information you send will indeed be received as such.
Origin Validation
Where did the information come from?? Digital signatures are used to ensure that the information received by a recipient came from a known sender and was not altered during transmission.
HIPAA
Health Insurance Portability and Accountability Act (1996). The when, how and who of patient data access.
Identifiers
All images contain information that associates that image to a specific patient. This information can be found in the DICOM header. HIPAA has produced a list of 18 identifiers which must be removed to protect a patient's identity.
Anonymization software
The process of removing confidential entries from DICOM files. The original, confidential data cannot be recovered from the anonymized file.
Image Identifiers
1. Names
2. Locations
3. Dates
4. Numbers; telephone, fax, email, social security, medical record, health plan benficiary, account, certificate/license, VIN, license plate, serial, etc.
5. URL's
6. IP addresses
7. Biometric Identifiers, including finger and voice prints
8. full face photographic images
9. any other unique identifying number, characteristic or code.
Legal considerations
Data on images must be in compliance with HIPAA and JCAHO standards for insurance reimbursement purposes.
HIPAA Considerations
Identifiers on images; radiologist reports; patient records including radiologist access, student access and usage, research, and medical usage.