T/F data can only be hacked through external sources?
False-internal hackers can manipulate data and are a valid security concern.
A system that traces the detailed transactions relating to any item in an accounting record
What assures that the data is accurate and has not been changed
Integrity
What is the most important thing an OT must do to secure any patient document?
Sign and date
T/F: Information can be released for treatment, payment, or administrative purposes without a patient’s authorization?
True
A part of a computer system or network which is designed to block unauthorized access while permitting outward communication
What is a firewall?
Electronic health record systems often have “fault-tolerance systems” to ensure what?
Availability
Why is converting/flattening documents to PDF format important?
Prevents documents from being altered and manipulated
Name one type of secondary authentication often used to secure privacy and confidentiality
Facial recognition
Who defines information security as the preservation of data confidentiality, integrity and availability
National Institute of of Standards and Technology (NIST)
In 2011 employees of which health system were found to have had access to celebrities’ records without proper authorization?
What is UCLA?
According to our interviewee, how do other professions get access to client information regarding their occupational therapy services?
Ongoing cybersecurity training and education that emphasizes that every member of an organization is responsible for protecting patient data, creates what?
Security Culture
An increasing number of health care providers are using mobile devices at work. Using ____ helps to to ensure that any information on these devices is secure
Encryption
Data breaches cost the health care industry approximately how much money per year?
What is? $5.6 billion per year
Blood pressure recorded as 102/80 is an example of what?
What is Unintentional data manipulation
If documents are hacked, what is the first thing the OT must do?
Contact supervisor to take legal action
What can hacked documents lead to if appropriate action is not taken?
Billing and financial issues