SEARCH
You are in browse mode. You must login to use MEMORY

   Log in to start

level: Regulatory Compliance

Questions and Answers List

level questions: Regulatory Compliance

QuestionAnswer
A document that approves disclosure of protected health information unrelated to treatment under the HIPAA Privacy Rule.Authorization
A third-party entity that has contact with protected health information to provide services unrelated to treating patients.Business Associate
A legal contract dictating a business associate to comply with protection of protected health information under the HIPAA Privacy Rule.Business Associate Agreement
Any medical or health care service, organization, agency, or individual that has protected health information.Covered Entity
The process of removing personal health information that can clearly identify a patient.De-Identification
Examination of in-house government and financial processes for appropriateness and accuracy.Internal Audit
Ensure there are several copies and paper documents in case of unscheduled downtime. Information is often stored on multiple servers in different locationRedundancy
To adhere to the professional standards of care. That follows as Standards of quality, interoperability, functionality, privacy, and security.Regulatory Compliance
is a series of records of computer events, about an operating system, an application, or user activities. A computer system may have several, each devoted to a particular type of activity.Audit Trail
a disclosure about wrongdoing in the public sector that serves (government organizations, including the federal government, states, and localities) or is a danger to the public (education, welfare, the legal system, employment, natural resources, and health services).Public Interest Disclosure
minor disclosures that may occur during legitimate use of information even when reasonable security measures are in place.Incidental Disclosures
the practice of maintaining the security and confidentiality of patient records. It involves both the conversational discretion of health care providers and the security of medical records.Privacy Rule
to ensure that every covered entity has implemented safeguards to protect the confidentiality, integrity, and availability of electronic protected health information.Security Rule
referring to periods when a system is unavailable. This is usually a result of the system failing to function because of an unplanned event, or because of routine maintenance (a planned event).Downtime
When a healthcare provider submits codes to Medicare, Medicaid or private insurers for more serious (and more expensive) diagnoses or procedures than the provider actually diagnosed or performed.Upcoding
refers to coding at a lower level than the level or service supported by medical documentation or medical necessity.Downcoding
encouraged healthcare providers to adopt electronic health records and improved privacy and security protections for healthcare data. This was achieved through financial incentives for adopting EHRs and increased penalties for violations of the HIPAA Privacy and Security Rules.Health Information Technology for Economic and Clinical Health Act (HITECH)
limiting access to work areas, as well as proper disposal and re-use of electronic media and devices.Physical Safeguards
password protection, a secure server with dual authentication systems for remote access, and backup systems that maintain an exact copy of each patient record.Technical Safeguards
can include having designated employees responsible for security, training, staff education, and having a system for evaluating effectiveness of security measures.Administrative safeguards