Legal Stuff
Secure Me
I Like My Privacy
Protect Yourself
You've Messed Up
100

In 1996, this act was created to ensure the privacy and security of protected health information.

What is the Health Insurance Portability and Accountability Act?


U.S. Department of Health & Human Services [USDHHS], Office for Civil Rights [OCR]. (2013). Summary of the HIPAA security rule. Retrieved from https://www.hhs.gov/hipaa/for-professionals/security/laws-regulations/index.html

100

This rule sets national standards for the security of electronic Protected Health Information (ePHI).

What is Security Rule?


U.S. Department of Health & Human Services [USDHHS], Office for Civil Rights [OCR]. (2013). Summary of the HIPAA security rule. Retrieved from https://www.hhs.gov/hipaa/for-professionals/security/laws-regulations/index.html

100

These rules protect the privacy of individually identifiable health information; establishes national standards for the protection of certain health information; and addresses the use and disclosure of PHI as well as standards for individuals’ privacy rights to understand and control how their health information is used and shared.

What are Privacy Rules?



The Office of the National Coordinator for Health Information Technology. (2015). Guide to privacy and security of electronic health information. Retrieved from https://www.healthit.gov/sites/default/files/pdf/privacy/privacy-and-security-guide.pdf

100

You are logged into a workstation in your patient’s room when you remember you forgot one of the patient’s medications; it is in your best interest to...

What is secure the workstation by logging out of the EMR?


Robichau, B. P. (2014). Healthcare Information Privacy + Security. Apress: New York, NY.
p. 112

100

Protected health information disclosure the poses a significant risk to the affected individual.

What is a breach?


Robichau, B. P. (2014). Healthcare Information Privacy + Security. Apress: New York, NY.
p. 171

200

This rule requires covered entities (CEs) and business associates (BAs) to provide notification following a breach of unsecured Protected Health Information (PHI).

What is a breach notification rule?


The Office of the National Coordinator for Health Information Technology. (2015). Guide to privacy and security of electronic health information. Retrieved from https://www.healthit.gov/sites/default/files/pdf/privacy/privacy-and-security-guide.pdf


200

Prior to a cyber-attack, breach of protected health information or a natural disaster, it is important for each covered entity and business associate to have this in place.

What is a contingency plan?


The Office of the National Coordinator for Health Information Technology. (2015). My entity just experienced a cyber-attack! What do we do now? Retrieved from https://www.hhs.gov/sites/default/files/cyber-attack-checklist-06-2017.pdf


200

Maintaining a copy of protected health information on a server that is maintained both on and off site is a method of...

What is backing up data?


The Office of the National Coordinator for Health Information Technology. (2015). Guide to privacy and security of electronic health information. Retrieved from https://www.healthit.gov/sites/default/files/pdf/privacy/privacy-and-security-guide.pdf

200

To ensure safety of the electronic medical record these should be of a specific length and complexity and changed at least every 90 days.

What is a password?



Robichau, B. P. (2014). Healthcare Information Privacy + Security. Apress: New York, NY.
p. 120

200

You have had multiple breaches this year but your max payout cannot be more than.

What is $1.5 million?


The Office of the National Coordinator for Health Information Technology. (2015). Guide to privacy and security of electronic health information. Retrieved from https://www.healthit.gov/sites/default/files/pdf/privacy/privacy-and-security-guide.pdf


300

The protected information has gotten out, now we will investigate.

Who is the Office of Civil Rights (OCR)?



Robichau, B. P. (2014). Healthcare Information Privacy + Security. Apress: New York, NY.
p. 172

300

The Security Rule requires covered entities to maintain reasonable and appropriate administrative, technical, and physical these for protecting e-PHI.

What are safeguards?


Robichau, B. P. (2014). Healthcare Information Privacy + Security. Apress: New York, NY.
p. 23

300

It is important to always maintain developer documentation that provides contact information and the serial numbers of your server and other hardware and software used, etc. An even more important to keep one copy offsite in a secure place. In case of a...

What is a disaster?


The Office of the National Coordinator for Health Information Technology. (2015). Guide to privacy and security of electronic health information. Retrieved from https://www.healthit.gov/sites/default/files/pdf/privacy/privacy-and-security-guide.pdf

300

Before storing and sending protected health information by mobile device and/or email it is best to make the information has an...

What is encryption?



Official Website of The Office of the National Coordinator for Health Information Technology (ONC). (2019). How Can You Protect and Secure Health Information When Using a Mobile Device? Retrieved from https://www.healthit.gov/topic/privacy-security-and-hipaa/how-can-you-protect-and-secure-health-information-when-using-mobile-device


300

The media must now be notified because you have allowed this many people protected health information to breached.

What is 500?


Robichau, B. P. (2014). Healthcare Information Privacy + Security. Apress: New York, NY.
p. 172

400

This provision was created by the American Recovery and Reinvestment Act (ARRA) detailing the legal and legislative guidelines for healthcare information privacy and security. It's meaningful.

What is the Health Information Technology for Economic and Clinical Health Act (HITECH Act)?


Robichau, B. P. (2014). Healthcare Information Privacy + Security. Apress: New York, NY.
p. 19

400

When you conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality, integrity, and availability of electronic protected health information held by the covered entity, you are performing a...

What is a risk analysis?


Official Website of The Office of the National Coordinator for Health Information Technology (ONC). (2017). Guidance on Risk Analysis. Retrieved from https://www.hhs.gov/hipaa/for-professionals/security/guidance/guidance-risk-analysis/index.html?language=es


400

This is given to patients to describe the ways in which the covered entity may use and disclose protected health information.

What is a Notice of Privacy Practice?



The Office of the National Coordinator for Health Information Technology. (2015). Guide to privacy and security of electronic health information. Retrieved from https://www.healthit.gov/sites/default/files/pdf/privacy/privacy-and-security-guide.pdf

400

Before discarding, repurposing, or reusing a computer or mobile device that has protected health information it is mandatory to due this to prevent disclosure of information.

What is delete the data?



Official Website of The Office of the National Coordinator for Health Information Technology (ONC). (2019). How Can You Protect and Secure Health Information When Using a Mobile Device? Retrieved from https://www.healthit.gov/topic/privacy-security-and-hipaa/how-can-you-protect-and-secure-health-information-when-using-mobile-device


400

I knew the act would lead to the disclosure of the protected health information.

What is willful neglect?


Robichau, B. P. (2014). Healthcare Information Privacy + Security. Apress: New York, NY.
p. 19

500

The HIPAA Security Rule has requirements that these must be included to specify the what and how things should be handled.

What are policies and procedures?


The Office of the National Coordinator for Health Information Technology. (2015). Guide to privacy and security of electronic health information. Retrieved from https://www.healthit.gov/sites/default/files/pdf/privacy/privacy-and-security-guide.pdf

500

When a covered entity makes reasonable efforts to use, disclose, and request only the amount of protected health information needed to accomplish the intended purpose of the use, disclosure, or request.

What is minimal necessity?


U.S. Department of Health & Human Services [USDHHS], Office for Civil Rights [OCR]. (2013). Summary of the HIPAA privacy rule. Retrieved from https://www.hhs.gov/hipaa/for-professionals/privacy/laws-regulations/index.html

500

In order to ensure that privacy is maintained and protected and the electronic medical record and protected health information are secure and that all the mechanisms are working properly; you must...

What is test your plan?


The Office of the National Coordinator for Health Information Technology. (2015). Guide to privacy and security of electronic health information. Retrieved from https://www.healthit.gov/sites/default/files/pdf/privacy/privacy-and-security-guide.pdf

500

Your colleague is having trouble signing into the workstation and asks you to sign-in so he/she can review a patient’s labs; you say no and instruct her to...

What is call technical support?

Or 

What is call the help desk?


Robichau, B. P. (2014). Healthcare Information Privacy + Security. Apress: New York, NY.
p. 135


500

You have accessed the chart of a famous person that is in the hospital but is not your patient; when asked about it by management you deny doing so, but management produces this that says otherwise.

What is an audit log?


Robichau, B. P. (2014). Healthcare Information Privacy + Security. Apress: New York, NY.
p. 61