Deck 26: Privacy and Security

ملء الشاشة (f)
exit full mode
سؤال
Which definition most accurately describes privacy?

A) The means to ensure health record privacy and confidentiality
B) Accuracy and completeness of health information
C) The rights of individuals to control access to their person or information about themselves
D) An act that has the potential to cause harm to an informational asset
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
A healthcare provider forgets to update a patient's medications. Which fair information principle is being violated?

A) Correction
B) Openness and transparency
C) Data quality and integrity
D) Safeguards
سؤال
Which organization works on an international level to improve information privacy?

A) Health and Human Services Office of Civil Rights
B) Health Information Security and Privacy Collaboration (HISPC)
C) Department of Health and Human Services (DHHS)
D) Electronic Frontier Foundation (EFF)
سؤال
What is the difference between the safe harbor and expert determination methods of de-identifying data?

A) The safe harbor method involves removal of 18 types of identifiers, and the expert determination method involves the application of statistical or scientific models.
B) The safe harbor method involves the application of statistical or scientific models, and the expert determination method involves removal of 18 types of identifiers.
C) The safe harbor method involves removal of all identifiers, and the expert determination method involves the removal of 18 types of identifiers.
D) The safe harbor method involves securing identifiers in an encrypted database, and the expert determination specifically determines the riskiest identifiers to remove.
سؤال
What is a negative impact of the increased use of mobile devices in transmitting health data?

A) They support increased health data access for providers.
B) They increase the risk of a security breach.
C) They decrease productivity.
D) They increase the number of medication errors.
سؤال
Which example constitutes an internal security event?

A) Servers containing clinical data were stolen from a facility.
B) A person hacks into a facility's server and steals PHI electronically.
C) A person installs a malicious code past a facility's firewall.
D) A system administrator installed a new server without any security measures.
سؤال
An organization implements a policy on installing software service packs on all its computers. This is an example of which type of control?

A) Administrative
B) Technical
C) Physical
D) Electronic
سؤال
What are some examples of indirect costs to organizations that have security breaches? (Select all that apply.)

A) Lost productivity
B) Expensive fines
C) Damaged public trust
D) Remediation costs
E) Repeating medical procedures
سؤال
Which are examples of secondary use of health information? (Select all that apply.)

A) Treatment
B) Surveillance
C) Research
D) Marketing
E) Prevention
سؤال
Which principles are included in IMIA's Code of Ethics for informatics? (Select all that apply.)

A) Information-Privacy and Disposition
B) Openness
C) Elimination of Threats
D) Legitimate Infringement
E) Accountability
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/10
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 26: Privacy and Security
1
Which definition most accurately describes privacy?

A) The means to ensure health record privacy and confidentiality
B) Accuracy and completeness of health information
C) The rights of individuals to control access to their person or information about themselves
D) An act that has the potential to cause harm to an informational asset
The rights of individuals to control access to their person or information about themselves
2
A healthcare provider forgets to update a patient's medications. Which fair information principle is being violated?

A) Correction
B) Openness and transparency
C) Data quality and integrity
D) Safeguards
Data quality and integrity
3
Which organization works on an international level to improve information privacy?

A) Health and Human Services Office of Civil Rights
B) Health Information Security and Privacy Collaboration (HISPC)
C) Department of Health and Human Services (DHHS)
D) Electronic Frontier Foundation (EFF)
Electronic Frontier Foundation (EFF)
4
What is the difference between the safe harbor and expert determination methods of de-identifying data?

A) The safe harbor method involves removal of 18 types of identifiers, and the expert determination method involves the application of statistical or scientific models.
B) The safe harbor method involves the application of statistical or scientific models, and the expert determination method involves removal of 18 types of identifiers.
C) The safe harbor method involves removal of all identifiers, and the expert determination method involves the removal of 18 types of identifiers.
D) The safe harbor method involves securing identifiers in an encrypted database, and the expert determination specifically determines the riskiest identifiers to remove.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
5
What is a negative impact of the increased use of mobile devices in transmitting health data?

A) They support increased health data access for providers.
B) They increase the risk of a security breach.
C) They decrease productivity.
D) They increase the number of medication errors.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
6
Which example constitutes an internal security event?

A) Servers containing clinical data were stolen from a facility.
B) A person hacks into a facility's server and steals PHI electronically.
C) A person installs a malicious code past a facility's firewall.
D) A system administrator installed a new server without any security measures.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
7
An organization implements a policy on installing software service packs on all its computers. This is an example of which type of control?

A) Administrative
B) Technical
C) Physical
D) Electronic
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
8
What are some examples of indirect costs to organizations that have security breaches? (Select all that apply.)

A) Lost productivity
B) Expensive fines
C) Damaged public trust
D) Remediation costs
E) Repeating medical procedures
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
9
Which are examples of secondary use of health information? (Select all that apply.)

A) Treatment
B) Surveillance
C) Research
D) Marketing
E) Prevention
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
10
Which principles are included in IMIA's Code of Ethics for informatics? (Select all that apply.)

A) Information-Privacy and Disposition
B) Openness
C) Elimination of Threats
D) Legitimate Infringement
E) Accountability
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.