Deck 13: Information Systems

Full screen (f)
exit full mode
Question
Damage prevention in an electronic health record system refers to _____.

A)Judiciously maintaining data in the EHR through authentication measures
B)Keeping data or equipment from being brought down by malicious attempts
C)Preventing third parties from gaining access to healthcare communications
D)Resuming immediate computer operations in the event of a problem
Use Space or
up arrow
down arrow
to flip the card.
Question
The health-care provider should consider improved controls, including the establishment of written policies and procedures covering the loan and use of _____ and whether ePHI should even be maintained on these media/devices at all

A)Computer devices that are portable
B)Electronic surveillance equipment
C)Mainframe and archived computers
D)Off-site storage of paper records
Question
A risk prevention technique that is used to protect electronic health records is _____.

A)Authenticating all entries
B)Destroying sensitive data
C)Restricting copy functions
D)Using PDAs and iPads
Question
The electronic authentication of medical record entries _____.

A)does not hold the author of the entries accountable
B)is recognized by national accreditation organizations
C)is required by federal and state legislatures in the U.S.
D)requires paper record as a backup to verify authenticity
Question
HIPAA safeguards include _____.

A)Administrative and insurance
B)Informational and technical
C)Physical and technical
D)Physical and theoretical
Question
In meeting the accuracy requirement, the health information manager must _____.

A)Be familiar with the hardware and software used in the system
B)Determine which providers made entries in the patient record
C)Know whether entries made were telephone orders or not
D)State which data entry procedures made in the record are routine
Question
What measures can be taken to discourage or prevent sabotage?

A)Adding unlimited access
B)Expanding log-on attempts
C)Installing antivirus software
D)Limiting methods of encryption
Question
Permissions granted in an electronic health record system involve _____.

A)Authenticating individual entries made in the EHR
B)Ensuring that people are who they say that they are
C)Levels of access granted to an operating system
D)Preventing malicious attempts to destroy health data
Question
The patient's legal electronic health record is _____

A)Clearly defined by federal statues and written regulations
B)Defined by each institution with input from its legal counsel
C)Healthcare documentation imported from an R.H.I.O.
D)Information captured from one health care setting to another
Question
Which is considered a human resources security issue that impacts health care records?

A)Backing up healthcare data
B)Documenting care provided
C)Court-ordered release of records
D)Hiring appropriate personnel
Question
E-SIGN refers to the _____.

A)Electronic Signatures in Global and National Commerce Act of 2001
B)Encryption program used by healthcare facilities that implement an EHR
C)Laws that state electronic signatures may not be used in foreign commerce
D)Programs developed to support insurance reimbursement for health care
Question
An electronic health record includes _____.

A)Healthcare information that always resides off site in a computer system
B)Patient documentation created, authenticated, and retrieved manually
C)Systems that may contain links to clinical decision support systems
D)Warehoused data that is accessible by patients and third-party payers
Question
Authentication of an electronic health record _____.

A)Ensures that people are who they say that they are
B)Is accomplished by a method to prevent eavesdropping
C)Refers to the level of access to an operating system
D)Prevents malicious attempts to damage healthcare data
Question
To be able to establish foundation, the health information manager needs to _____.

A)Be familiar with computer system hardware and software used
B)Ensure reliability and validity of data using QM and UM measures
C)Establish policies that govern how corrections in the record are made
D)Know the manner in which patient healthcare data is recorded
Question
Which is an Institute of Medicine core functionality that constitutes an electronic health record?

A)Clinical decision support
B)Dictation and transcription
C)Enforcement of collections
D)Gatekeeping for patients
Question
An advantage of switching to electronic health records is _____.

A)Decreased accessibility of information
B)Establishment of data mining procedures
C)Illegibility of information in the patient record
D)Reduced capacity for information storage
Question
What constitutes a legal heath record?

A)Business record generated at or for a healthcare organization
B)Dictation of a healthcare facility's physicians and other providers
C)Results of quality management audits that impact patient care
D)Statistical reports that contain data used for accreditation purposes
Question
A printout of the patient record, which has been maintained in an electronic medium is _____.

A)Considered inadmissible because it is not the actual patient record
B)Entered into evidence with testimony by the custodian of health records
C)Not required to meet foundation, trustworthiness, or accuracy requirements
D)Paper-based, which means it was generated manually by providers
Question
Safeguards established by HIPAA security rules _____.

A)Ensure data integrity by protecting it from unauthorized deletion
B)Limit the availability of healthcare and other data to authorized users
C)Operate within the confines of stricter state legislation and rules
D)Protect confidentiality by allowing all providers to access information
Question
To establish a health record as admissible under a business record exemption, the requesting party must show that _____.

A)An injury documented in the record was caused by negligence
B)"Duty to act" information was included in the patient record
C)The record was kept during the ordinary course of business
D)Warehoused data about patients was reviewed by the risk manager
Question
E-health practices _____.

A)Are subject to the same requirements for safeguarding confidentiality of PHI
B)Have been assigned exempt status from HIPAA regulations and requirements
C)Govern only those patients who receive Medicare reimbursable services
D)May be implemented by entities subject to Medicare Conditions of Participation
Question
Beyond the responsibility for maintaining protected health information (PHI), health information managers will not be responsible for _____.

A)inappropriate access to genetic information
B)pharmacy calculations
C)statistics
D)vendor contracts
Question
HIPAA Security Rules and Privacy Rules are similar, yet different, in that both _____.

A)Are different names for the same regulations
B)Limit patient access and control of information
C)Often oppose each rule's efforts and results
D)Protect information from different aspects
Question
Under HIPAA, a patient has the right to _____.

A)Alter the original medical record in person
B)Know how his information is being disclosed
C)Receive copies of any records upon request
D)Restrict all disclosures of information
Question
Under HIPAA security rules, required specifications _____.

A)Are optional for certain types of facilities
B)Help in detecting security violations
C)Must be implemented by all facilities
D)Provide opportunities to ignore certain rules
Question
Under HIPAA, administrative safeguards _____.

A)Assist entities protect information from physical intrusions
B)Define the framework of an excellent security program
C)Help develop security measures, which protect PHI
D)Include optional risk assessments that can be implemented
Question
Under HIPAA's security rules, addressable specifications _____.

A)Are mandatory and must be implemented in health care facilities and covered entities
B)Do not bind the entity to implementation but require documentation of alternatives
C)Permit the health care facilities and the covered entities to ignore unreasonable rules
D)Impact only the hybrid medical records that are maintained by covered entities
Question
Digital imaging in the context of maintaining PHI refers to _____.

A)Electronic indexing of patient records and other documents
B)Photographs taken of patients before and after surgery
C)Scanning a paper document, to be viewed over a server
D)Using fiberoptics in minimally invasive procedures
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/28
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 13: Information Systems
1
Damage prevention in an electronic health record system refers to _____.

A)Judiciously maintaining data in the EHR through authentication measures
B)Keeping data or equipment from being brought down by malicious attempts
C)Preventing third parties from gaining access to healthcare communications
D)Resuming immediate computer operations in the event of a problem
Keeping data or equipment from being brought down by malicious attempts
2
The health-care provider should consider improved controls, including the establishment of written policies and procedures covering the loan and use of _____ and whether ePHI should even be maintained on these media/devices at all

A)Computer devices that are portable
B)Electronic surveillance equipment
C)Mainframe and archived computers
D)Off-site storage of paper records
Computer devices that are portable
3
A risk prevention technique that is used to protect electronic health records is _____.

A)Authenticating all entries
B)Destroying sensitive data
C)Restricting copy functions
D)Using PDAs and iPads
Restricting copy functions
4
The electronic authentication of medical record entries _____.

A)does not hold the author of the entries accountable
B)is recognized by national accreditation organizations
C)is required by federal and state legislatures in the U.S.
D)requires paper record as a backup to verify authenticity
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
5
HIPAA safeguards include _____.

A)Administrative and insurance
B)Informational and technical
C)Physical and technical
D)Physical and theoretical
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
6
In meeting the accuracy requirement, the health information manager must _____.

A)Be familiar with the hardware and software used in the system
B)Determine which providers made entries in the patient record
C)Know whether entries made were telephone orders or not
D)State which data entry procedures made in the record are routine
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
7
What measures can be taken to discourage or prevent sabotage?

A)Adding unlimited access
B)Expanding log-on attempts
C)Installing antivirus software
D)Limiting methods of encryption
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
8
Permissions granted in an electronic health record system involve _____.

A)Authenticating individual entries made in the EHR
B)Ensuring that people are who they say that they are
C)Levels of access granted to an operating system
D)Preventing malicious attempts to destroy health data
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
9
The patient's legal electronic health record is _____

A)Clearly defined by federal statues and written regulations
B)Defined by each institution with input from its legal counsel
C)Healthcare documentation imported from an R.H.I.O.
D)Information captured from one health care setting to another
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
10
Which is considered a human resources security issue that impacts health care records?

A)Backing up healthcare data
B)Documenting care provided
C)Court-ordered release of records
D)Hiring appropriate personnel
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
11
E-SIGN refers to the _____.

A)Electronic Signatures in Global and National Commerce Act of 2001
B)Encryption program used by healthcare facilities that implement an EHR
C)Laws that state electronic signatures may not be used in foreign commerce
D)Programs developed to support insurance reimbursement for health care
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
12
An electronic health record includes _____.

A)Healthcare information that always resides off site in a computer system
B)Patient documentation created, authenticated, and retrieved manually
C)Systems that may contain links to clinical decision support systems
D)Warehoused data that is accessible by patients and third-party payers
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
13
Authentication of an electronic health record _____.

A)Ensures that people are who they say that they are
B)Is accomplished by a method to prevent eavesdropping
C)Refers to the level of access to an operating system
D)Prevents malicious attempts to damage healthcare data
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
14
To be able to establish foundation, the health information manager needs to _____.

A)Be familiar with computer system hardware and software used
B)Ensure reliability and validity of data using QM and UM measures
C)Establish policies that govern how corrections in the record are made
D)Know the manner in which patient healthcare data is recorded
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
15
Which is an Institute of Medicine core functionality that constitutes an electronic health record?

A)Clinical decision support
B)Dictation and transcription
C)Enforcement of collections
D)Gatekeeping for patients
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
16
An advantage of switching to electronic health records is _____.

A)Decreased accessibility of information
B)Establishment of data mining procedures
C)Illegibility of information in the patient record
D)Reduced capacity for information storage
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
17
What constitutes a legal heath record?

A)Business record generated at or for a healthcare organization
B)Dictation of a healthcare facility's physicians and other providers
C)Results of quality management audits that impact patient care
D)Statistical reports that contain data used for accreditation purposes
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
18
A printout of the patient record, which has been maintained in an electronic medium is _____.

A)Considered inadmissible because it is not the actual patient record
B)Entered into evidence with testimony by the custodian of health records
C)Not required to meet foundation, trustworthiness, or accuracy requirements
D)Paper-based, which means it was generated manually by providers
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
19
Safeguards established by HIPAA security rules _____.

A)Ensure data integrity by protecting it from unauthorized deletion
B)Limit the availability of healthcare and other data to authorized users
C)Operate within the confines of stricter state legislation and rules
D)Protect confidentiality by allowing all providers to access information
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
20
To establish a health record as admissible under a business record exemption, the requesting party must show that _____.

A)An injury documented in the record was caused by negligence
B)"Duty to act" information was included in the patient record
C)The record was kept during the ordinary course of business
D)Warehoused data about patients was reviewed by the risk manager
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
21
E-health practices _____.

A)Are subject to the same requirements for safeguarding confidentiality of PHI
B)Have been assigned exempt status from HIPAA regulations and requirements
C)Govern only those patients who receive Medicare reimbursable services
D)May be implemented by entities subject to Medicare Conditions of Participation
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
22
Beyond the responsibility for maintaining protected health information (PHI), health information managers will not be responsible for _____.

A)inappropriate access to genetic information
B)pharmacy calculations
C)statistics
D)vendor contracts
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
23
HIPAA Security Rules and Privacy Rules are similar, yet different, in that both _____.

A)Are different names for the same regulations
B)Limit patient access and control of information
C)Often oppose each rule's efforts and results
D)Protect information from different aspects
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
24
Under HIPAA, a patient has the right to _____.

A)Alter the original medical record in person
B)Know how his information is being disclosed
C)Receive copies of any records upon request
D)Restrict all disclosures of information
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
25
Under HIPAA security rules, required specifications _____.

A)Are optional for certain types of facilities
B)Help in detecting security violations
C)Must be implemented by all facilities
D)Provide opportunities to ignore certain rules
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
26
Under HIPAA, administrative safeguards _____.

A)Assist entities protect information from physical intrusions
B)Define the framework of an excellent security program
C)Help develop security measures, which protect PHI
D)Include optional risk assessments that can be implemented
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
27
Under HIPAA's security rules, addressable specifications _____.

A)Are mandatory and must be implemented in health care facilities and covered entities
B)Do not bind the entity to implementation but require documentation of alternatives
C)Permit the health care facilities and the covered entities to ignore unreasonable rules
D)Impact only the hybrid medical records that are maintained by covered entities
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
28
Digital imaging in the context of maintaining PHI refers to _____.

A)Electronic indexing of patient records and other documents
B)Photographs taken of patients before and after surgery
C)Scanning a paper document, to be viewed over a server
D)Using fiberoptics in minimally invasive procedures
Unlock Deck
Unlock for access to all 28 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 28 flashcards in this deck.