HAP 308
Which nonprofit organization works independent of the government to provide unbiased and authoritative medical advice to stakeholders and the public? a. Certification Commission for Health Information Technology (CCHIT) b. Institute of Medicine (IOM) c. National Committee on Vital and Health Statistics (NCVHS) d. None of the above.
Institute of Medicine (IOM)
HIPAA stands for: What does HIPPA stand for? a. Health Industry Privacy and Accountability Act. b. Health Insurance Portability and Accountability Act. c. Health Delivery Privacy and Administration Act. d. Health Insurance Portability and Privacy Act.
Health Insurance Portability and Privacy Act
T/F A limited focus on human factors has been highlighted as the most crucial design challenge facing health information systems.
True
The HITECH Act was established in: a. 2011. b. 2010. c. 2009. d. None of the above.
2009
Which of the following provides a comprehensive and authoritative listing of all certified health information technology that has been successfully tested and certified? a. Certified Health IT Product List (CHPL) b. National Committee on Vital and Health Statistics (NCVHS) c. Health Common Procedure Coding System (HCPCS) d. Institute of Medicine (IOM)
Certified Health IT Product List (CHPL)
As part of EHR certifications, which of these modalities allow data storage exclusively by using a vendors' software and servers, rather than the physicians' servers? a. Physician-hosted systems b. Remotely hosted systems c. Dedicated-host systems d. None of the above.
Dedicated-host systems
Which of the following replaces handwritten prescriptions and incorporates electronic tools as part of the EHR in processing medication prescriptions? a. E-prescriptions b. Health information exchange (HIE) c. Interoperability d. None of the above.
E-prescriptions
Which of the following is a method of masking data that involves removing data elements that are not needed in anonymized data? a. Pseudoanonymization b. Randomization c. Field data suppression
Field data suppression
Which of the following is a form of PHR that utilizes interconnected systems with enhanced functionality, allowing patients to schedule doctor appointments and initiate prescription refills while allowing direct patient-to-physician communication? a. Hybrid PHR b. PHR interconnected to an EHR c. Stand-alone PHR
PHR interconnected to an EHR
The components of fair information practices (FIPs) include all except for which of the following? (Slide 7) a. Purpose specification and use limitation (full disclosure of how the data is used) b. User participation and transparency c. State-of-the art information systems d. Relevance of security
State-of-the art information systems
T/F Functional analysis refers to the identification of domain structures, broader system functions, objectives, and goals in the application of the human-centered design approach
True
The lack of interoperability and sharing common standards for data sets are the major barriers to the implementation and communication of health information across PHRs. a. True b. False
True
Which of the following allows a connection to be made and maintained between two or more points in a telecommunication system, without using hard wires or cables, and allows data to be viewed and transferred from one computer system to another using electromagnetic waves? a. Local area network (LAN) b. Server c. Wireless connectivity d. Computer on wheels (COW)
Wireless connectivity
Unauthorized access to patient health data constitutes a. disclosure of information among physicians without due consent. b. access that violates HIPAA privacy stipulations. c. looking through patient data records without written consent from the patient in question. d. All of the above.
all of the above
What are the functions of HIPAA? a. Ensuring privacy and security protection of patient health data b. Providing electronic security for patient health data c. Tackling healthcare fraud d. All of the above
all of the above
A computerized individual healthcare record that contains lifelong data from healthcare providers is known as: a. an electronic health record. b. an electronic medical record. c. a personal health record. d. All of the above.
an electronic medical record
Individual privacy may be achieved through a high level of de-identification, but perhaps at the expense of data quality. Alternatively, data quality may be preserved, but at the expense of patient privacy. This situation is known as: a. positive-sum paradigm. b. classic zero-sum paradigm.. c. privacy by design. d. None of the above.
classic zero-sum paradigm
A critical goal in the transition to PHRs is: a. consumer health education and empowerment. b. limiting health insurance company access to data. c. restricting the use of PHRs in health information exchange. d. None of the above.
consumer health education and empowerment.
Variables that can be used to uniquely identify an individual, either alone or by combining them with other readily available information, are known as: a. quasi identifiers. b. direct identifiers. c. None of the above.
direct identifiers
The goal of healthcare consumerism is to: a. increase the number of insurable consumers. b. reduce need for caregivers because health service demand supersedes supply. c. drive healthcare providers to improve quality and reduce cost. d. None of the above.
drive healthcare providers to improve quality and reduce cost.
A set of universally recognized principles adopted by various jurisdictions around the world for managing personal data is called: a. privacy by design. b. fair information practices. c. global privacy principles. d. None of the above.
fair information practices.
All physicians are required to convert to electronic medical record systems. a. True b. False
false
An electronic medical record (EMR) system provides very little statistical information. a. True b. False
false
In a PHR in which information is stored by an application provider, information is not necessarily available when needed. a. True b. False
false
Notes made by doctors, nurses, therapists, and social workers during the care of a patient, which reflect treatment response, observations, and management plans, are often not included in PHRs and are instead restricted to EHRs. Book says false. But how could the answer be true? a. True b. False
false
Only objective data can be included within a PHR. a. True b. False
false
Patients are obligated to share their PHR with their healthcare providers. a. True b. False
false
Physicians who perform consultations still must request paper records on a patient, even if both the referring physician and the consulting physician use an EMR system. a. True b. False
false
The term electronic medical record relates to multiple healthcare organizations that provide patient health data. Why true or false? a. True b. False
false
Under meaningful use, EHR technology that has been certified to meet all the standards stipulated by the secretary of the Department of Health and Human Services is known as a complete EHR. a. True b. False
false
Stand-alone PHRs are: a. individually owned. b. subject to privacy issues over the Internet. c. part of HIPAA's designated record set. d. None of the above.
individually owned
Three properties of identifiers need to be considered in protecting patient data privacy and security. They include the ability of identifiers to be knowable, distinguishable, and: a. replicable. b. sustainable. c. feasible. d. None of the above.
replicable
Which of the following services use electronic and communication technology to deliver medical information and services over large and small distances through a standard telephone line? a. Practice management system (PMS) b. Health Common Procedure Coding System (HCPCS) c. Telehealth d. E-prescriptions
telehealth
According to HITECH, a breach is defined as: a. the unauthorized acquisition, access, use, or disclosure of protected health information that compromises the security or privacy of such information. b. the unintentional acquisition of or inadvertent disclosure of protected health information by a person who is authorized to access this information. c. None of the above.
the unauthorized acquisition, access, use, or disclosure of protected health information that compromises the security or privacy of such information.
A PHR may be separate from, and does not normally replace, the legal medical record of any provider. a. True b. False
true
An EHR relates to more than one healthcare organization. a. True b. False
true
An EMR system gives patients the ability to schedule their own appointments using the Internet. Can be either true or false? Please explain. a. True b. False
true
An advantage of a tethered PHR is that updating is not required by patients, but rather by the medical providers. a. True b. False
true
An advantage of stand-alone systems is that the information is more secure because it does not send or receive data over a network. Compare with hosted and know difference. a. True b. False
true
Health information that is de-identified in a manner so that it is highly unlikely that an individual may be re-identified falls outside of the scope of privacy laws, even with ad hoc methods of de-identification. (Slide 13) a. True b. False
true
Lost productivity and the earnings lost due to illness are classified as indirect costs. a. True b. False
true
Office of the National Coordinator (ONC) for Health Information Technology is a leadership agency that guides the development and implementation of interoperable HIT infrastructure in the United States for healthcare quality improvement. a. True b. False
true
The HIPAA privacy rule is concerned only with statistical disclosure control, for which the purpose of de-identification is to prevent third parties working with these data to recognize individuals in the data. (Page 341 in Textbook) a. True b. False
true
The terms untethered and stand-alone mean the same thing; that is, a system is not connected to any other computer system. a. True b. False
true