Definitions | Questions | Questions | T or F |
---|---|---|---|
Security incident
The attempted or successful unauthorized access, use, disclosure, modification, or destruction of information or interference.
|
All ePHI
The Security Rule safeguards are to address
|
Technical Safeguards
The technology and the policies and procedures for its use that protect electronic protected health information and control access to it is
|
False
T or F: The Security Rule Specifies the methods for conductions the required risk analysis
|
Threat
The potential for exploitation of a vulnerability or potential danger to a computer, network, or data.
|
Vulnerability
An Inherent weakness or absence of a safeguard that could be exploited by a threat is a
|
From improper alteration or destruction
The integrity standard protects
|
False
T or F: When encrypted information is decrypted, it is in a different format than the original state
|
Red Flag
Suspicious documents, information, or behaviors that indicate the possibility of identity theft.
|
Know what data needs to be backed up and sources of that data
The data backup plan requires that organizations
|
When personal information, such as name, SSN, or Medicare number is taken without the patients knowledge
When does Medical Identity theft occur?
|
True
T or F: the Privacy Rule is the name given to the 1996 HIPAA law, its regulations, the HITECH Act, and other related regulations.
|
Encryption
A technical method that reduces access and viewing of ePHI by unauthorized users.
|
Impermissible uses and disclosures of PHI
What has been the most common complaint investigated for potential HIPAA violations?
|
||