protection that occurs while information is being transmitted
Encryption
The traditional method used in the collection and storage of medical information is _____________
paper-based records
A healthcare clearinghouse company performs what type of function?
billing
What is a covered entity?
a health care provider, plan, or clearinghouse
Authentication controls encrypting and decrypting data are examples of what?
security
what rule procides standards for the elctronic protected health information?
HIPPA security rule
Whistle-blower protections are known as
Qui Tam statute
This is a standard that provides a means to exchange (communicate) patient information
data exchange standard
An individual's right to control his or her personal information, with the understanding that the info will not be disseminated without his or her permission is called
privacy
this is defined as the ability of systems to work together through common standards
interoperability
a wireless device that allows the clinician to enter or input data at the point of care such as a pocket size computer used to document appointments, notes, and other info is commonly referred to as ________
Persnoal data assistants (PDA)
A principle of the HIPPA pricacy rule that allows access to protected health info based on the user's role or job requirement is called
technical safeguards
Improper or harmful conduct by a health care business in its fiscal or ethical practices is called?
risk
tools that offer assistance when clinicians make complex decisions
decision support
demographic, medical #, phys name and address are examples of what type of data?
administrative
The acronym used in the HIPPA security rule for protected health information in the electronic format
EPHI electronic protected health information
Data elements such as temp, pluse, an drespiration would be chartes as what type of data?
clinical
what is EHR
Electronic Health Record
Federal law that prohibits fraudulent claims to the government
false claims act
Standardized form that has a predesigned format and a limited selection of choices
Template
A practice that allows or permits only authorized individuals to access medical records
Confidentiality
what is computerized physician order entry
CPOE
Alert
reminder
The electronic medical record differs from paper based record by including
links to medical knowledge, alerts and reminders, decision support
Software applications commonly interfaces with EHR
transcriptions
The _______published 2 major reports that outlined the functionality of the computerized pt record
institute of medicine
a drug interaction alert would be a typical funtion of a _________________
clinical decision support system
Health care organization, administrators, and clinicans want to be assured the EHR will __________________
improve the quality of care
Legislation which makes it a criminal offense to accept bribes or payment for services
Anit-Kickback Statute
Advantages of the EHR
security
multiple users
decision support
One of the major challenges in developing a computer-based pt record is
interoperability
Which of the following is the primary professional association working towards the advancement of the electronic health record?
D. all of the above
Federal mandates to protect pt information are incorporated into the _____________________
HIPPA act of 1996
transactiosn standards for electronic data interchange in health care have been developed by ____________
HL-7
the most common type of health information is
clinical data
practice has the potential for fraud and abuse in the electronic enviroment by doing what?
cutting and pasting info
borrowing info from other pts records
copying info from another entry in same record
disadvantage of EHR
cost and training
an industry standard that expalins what should, shall, an dmust be included in the EHR is call a __________ standard
functional model
under the security rule, phys practices that transmit electronic data, must provide what?
risk analysis
backup procedure for data
security plan
hippa established national standards that address what?
confidentiality, privacy, security
when a medical assistant requests the record of a pt for whom he or she did not provide care or treatment, the medical assistant has violated HIPPA's ____________
need to know principle
___________is best demonstrated when data elements and info are collected by one system and shared with another
accessibility
tracking an appointment is considered ___________ use of the EHR
administrative
Bridge to the EHR
stored both on paper and electronic media
hybrid
what is the major differences between privacy and security rules?
the security rule covers only electroinic PHI while privacy covers oral, written or electronic PHI
__________ is defined as intentional acts, deception or misrepresentation of billing info to gain insurance benefits
fraud
sagety requirements such as fire alarms, extinguishers, smoke detectors and equipment are referred to as _________ safeguards