HAP 308

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which nonprofit organization works independent of the government to provide unbiased and authoritative medical advice to stakeholders and the public? a. Certification Commission for Health Information Technology (CCHIT) b. Institute of Medicine (IOM) c. National Committee on Vital and Health Statistics (NCVHS) d. None of the above.

Institute of Medicine (IOM)

HIPAA stands for: What does HIPPA stand for? a. Health Industry Privacy and Accountability Act. b. Health Insurance Portability and Accountability Act. c. Health Delivery Privacy and Administration Act. d. Health Insurance Portability and Privacy Act.

Health Insurance Portability and Privacy Act

T/F A limited focus on human factors has been highlighted as the most crucial design challenge facing health information systems.

True

The HITECH Act was established in: a. 2011. b. 2010. c. 2009. d. None of the above.

2009

Which of the following provides a comprehensive and authoritative listing of all certified health information technology that has been successfully tested and certified? a. Certified Health IT Product List (CHPL) b. National Committee on Vital and Health Statistics (NCVHS) c. Health Common Procedure Coding System (HCPCS) d. Institute of Medicine (IOM)

Certified Health IT Product List (CHPL)

As part of EHR certifications, which of these modalities allow data storage exclusively by using a vendors' software and servers, rather than the physicians' servers? a. Physician-hosted systems b. Remotely hosted systems c. Dedicated-host systems d. None of the above.

Dedicated-host systems

Which of the following replaces handwritten prescriptions and incorporates electronic tools as part of the EHR in processing medication prescriptions? a. E-prescriptions b. Health information exchange (HIE) c. Interoperability d. None of the above.

E-prescriptions

Which of the following is a method of masking data that involves removing data elements that are not needed in anonymized data? a. Pseudoanonymization b. Randomization c. Field data suppression

Field data suppression

Which of the following is a form of PHR that utilizes interconnected systems with enhanced functionality, allowing patients to schedule doctor appointments and initiate prescription refills while allowing direct patient-to-physician communication? a. Hybrid PHR b. PHR interconnected to an EHR c. Stand-alone PHR

PHR interconnected to an EHR

The components of fair information practices (FIPs) include all except for which of the following? (Slide 7) a. Purpose specification and use limitation (full disclosure of how the data is used) b. User participation and transparency c. State-of-the art information systems d. Relevance of security

State-of-the art information systems

T/F Functional analysis refers to the identification of domain structures, broader system functions, objectives, and goals in the application of the human-centered design approach

True

The lack of interoperability and sharing common standards for data sets are the major barriers to the implementation and communication of health information across PHRs. a. True b. False

True

Which of the following allows a connection to be made and maintained between two or more points in a telecommunication system, without using hard wires or cables, and allows data to be viewed and transferred from one computer system to another using electromagnetic waves? a. Local area network (LAN) b. Server c. Wireless connectivity d. Computer on wheels (COW)

Wireless connectivity

Unauthorized access to patient health data constitutes a. disclosure of information among physicians without due consent. b. access that violates HIPAA privacy stipulations. c. looking through patient data records without written consent from the patient in question. d. All of the above.

all of the above

What are the functions of HIPAA? a. Ensuring privacy and security protection of patient health data b. Providing electronic security for patient health data c. Tackling healthcare fraud d. All of the above

all of the above

A computerized individual healthcare record that contains lifelong data from healthcare providers is known as: a. an electronic health record. b. an electronic medical record. c. a personal health record. d. All of the above.

an electronic medical record

Individual privacy may be achieved through a high level of de-identification, but perhaps at the expense of data quality. Alternatively, data quality may be preserved, but at the expense of patient privacy. This situation is known as: a. positive-sum paradigm. b. classic zero-sum paradigm.. c. privacy by design. d. None of the above.

classic zero-sum paradigm

A critical goal in the transition to PHRs is: a. consumer health education and empowerment. b. limiting health insurance company access to data. c. restricting the use of PHRs in health information exchange. d. None of the above.

consumer health education and empowerment.

Variables that can be used to uniquely identify an individual, either alone or by combining them with other readily available information, are known as: a. quasi identifiers. b. direct identifiers. c. None of the above.

direct identifiers

The goal of healthcare consumerism is to: a. increase the number of insurable consumers. b. reduce need for caregivers because health service demand supersedes supply. c. drive healthcare providers to improve quality and reduce cost. d. None of the above.

drive healthcare providers to improve quality and reduce cost.

A set of universally recognized principles adopted by various jurisdictions around the world for managing personal data is called: a. privacy by design. b. fair information practices. c. global privacy principles. d. None of the above.

fair information practices.

All physicians are required to convert to electronic medical record systems. a. True b. False

false

An electronic medical record (EMR) system provides very little statistical information. a. True b. False

false

In a PHR in which information is stored by an application provider, information is not necessarily available when needed. a. True b. False

false

Notes made by doctors, nurses, therapists, and social workers during the care of a patient, which reflect treatment response, observations, and management plans, are often not included in PHRs and are instead restricted to EHRs. Book says false. But how could the answer be true? a. True b. False

false

Only objective data can be included within a PHR. a. True b. False

false

Patients are obligated to share their PHR with their healthcare providers. a. True b. False

false

Physicians who perform consultations still must request paper records on a patient, even if both the referring physician and the consulting physician use an EMR system. a. True b. False

false

The term electronic medical record relates to multiple healthcare organizations that provide patient health data. Why true or false? a. True b. False

false

Under meaningful use, EHR technology that has been certified to meet all the standards stipulated by the secretary of the Department of Health and Human Services is known as a complete EHR. a. True b. False

false

Stand-alone PHRs are: a. individually owned. b. subject to privacy issues over the Internet. c. part of HIPAA's designated record set. d. None of the above.

individually owned

Three properties of identifiers need to be considered in protecting patient data privacy and security. They include the ability of identifiers to be knowable, distinguishable, and: a. replicable. b. sustainable. c. feasible. d. None of the above.

replicable

Which of the following services use electronic and communication technology to deliver medical information and services over large and small distances through a standard telephone line? a. Practice management system (PMS) b. Health Common Procedure Coding System (HCPCS) c. Telehealth d. E-prescriptions

telehealth

According to HITECH, a breach is defined as: a. the unauthorized acquisition, access, use, or disclosure of protected health information that compromises the security or privacy of such information. b. the unintentional acquisition of or inadvertent disclosure of protected health information by a person who is authorized to access this information. c. None of the above.

the unauthorized acquisition, access, use, or disclosure of protected health information that compromises the security or privacy of such information.

A PHR may be separate from, and does not normally replace, the legal medical record of any provider. a. True b. False

true

An EHR relates to more than one healthcare organization. a. True b. False

true

An EMR system gives patients the ability to schedule their own appointments using the Internet. Can be either true or false? Please explain. a. True b. False

true

An advantage of a tethered PHR is that updating is not required by patients, but rather by the medical providers. a. True b. False

true

An advantage of stand-alone systems is that the information is more secure because it does not send or receive data over a network. Compare with hosted and know difference. a. True b. False

true

Health information that is de-identified in a manner so that it is highly unlikely that an individual may be re-identified falls outside of the scope of privacy laws, even with ad hoc methods of de-identification. (Slide 13) a. True b. False

true

Lost productivity and the earnings lost due to illness are classified as indirect costs. a. True b. False

true

Office of the National Coordinator (ONC) for Health Information Technology is a leadership agency that guides the development and implementation of interoperable HIT infrastructure in the United States for healthcare quality improvement. a. True b. False

true

The HIPAA privacy rule is concerned only with statistical disclosure control, for which the purpose of de-identification is to prevent third parties working with these data to recognize individuals in the data. (Page 341 in Textbook) a. True b. False

true

The terms untethered and stand-alone mean the same thing; that is, a system is not connected to any other computer system. a. True b. False

true


Ensembles d'études connexes

Windows 10 Chapter 4To see the permissions a user has to a file that takes into account their group memberships, what tab should you open in the Advanced Security Settings window for the file? a. Standard Permissions b. Effective Access c. Special Per

View Set

• Eugene V. Debs, Speech to the Jury (1918)

View Set

48.4 Documentation and Reporting

View Set