Integrated Electronic Health Records Chapters 7 & 8

Unlock all answers in this set

Unlock answers
question
which is used to code procedures in an office, is an example of a
answer
code set
question
The law which strengthened HIPAA privacy and security regulations was:
answer
Health Information Technology for Economic and Clinical Health Act (HITECH)
question
HIPAA defines a patient's name, social security number, employer, or medical record/account numbers that tie information to a particular person as:
answer
protected health information
question
Keeping health information to oneself is known as protecting:
answer
confidentiality
question
E-mails or faxes that are sent and arrive at the wrong location constitute a privacy _____________.
answer
breach
question
Blocking access to a facility's computer systems by unauthorized users is accomplished through use of _______________.
answer
a firewall
question
Of the following, which password is most secure?
answer
Record**58
question
Nancy Jackson is the office manager of a medical practice. Each month she reviews a report that shows which staff members viewed, edited, or deleted data on a random selection of patient's records, and whether or not the access or the actions taken were justified. Nancy is performing which function?
answer
auditing
question
CPT, which is used to code procedures in an office, is an example of a/an _____________.
answer
code set
question
In 2004, the ______________, the Healthcare Information and Management Systems Society, and the National Alliance for Health Information Technology organized the Certification Commission for Health Information Technology.
answer
American Health Information Management Association
question
Each person who has the ability to access a computer software system is set up within the software and assigned a/an __________________, which is typically based on their name.
answer
user ID
question
James Philips has asked that certain personnel within the office be prohibited from seeing his health information. This record will be flagged as?
answer
restricted access
question
When correcting written documentation in a paper record, it is necessary to:
answer
cross out the incorrect information with one line, enter the correct information, date and initial the correction
question
How is a correction made to an electronic health record?
answer
The incorrect entry is corrected and the original entry is hidden from view, but is still retrievable
question
An employee at Memorial Medical Practice released the diagnosis of a patient to the patient's spouse without an authorization. This is known as a/an _________________________.
answer
breach of confidentiality
question
Lisa Haver is a patient of Dr. Randolph's. You have just opened today's mail and opened a letter from Ms. Haver's attorney because she is involved in a lawsuit regarding an auto accident. What will you do?
answer
look for a signed authorization in the envelope which authorizes the office to release Lisa Haver's records to the attorney
question
You are the office manager of Greensburg Medical Center. You have received a letter from one of your patients, Ida Healthway, asking to know the names of all employees and care providers who have accessed her EHR within the last year, since she believes someone has been spreading information about her in the community. You will provide Ms. Healthway with this information, which is known as:
answer
accounting of information disclosures
question
Some states have a Health Information __________________, funded through the ONC, which allows the sharing of health information for continuity of care purposes.
answer
Exchange
question
A staff member who monitors existing and new regulations and is the \"go-to\" person should an incident occur is known as the _____________________.
answer
compliance officer
question
In order for the healthcare facility to know what to do in case of a situation that interrupts access to the EHR, a written ____________________ should be in place.
answer
disaster recovery plan
question
Which of the following may result in the need to deploy the disaster recovery plan?
answer
A computer hacker has gained access to the database and corrupt files have been found
question
\"Which of the following is not included in the Notice of Privacy Practices? A. how a patient's health information may be used B. the name of the individual to whom a record was released C. that the patient may request correction or amendment to their health record D. entities to whom a patient's information may be released
answer
the name of the individual to whom a record was released
question
Healthcare providers, clearinghouses, and insurance plans are able to access protected health information (PHI) when needed under HIPAA. These healthcare providers are known as what under HIPAA?
answer
covered entities
question
The right to be left alone, or in healthcare, to undergo care without others infringing on one's personal space is known as what?
answer
privacy
question
The fact that a patient is either admitted to or is undergoing treatment in a facility, and his or her location within the facility is known as what kind of information?
answer
Directory information
question
To help guard against unauthorized individuals accessing a practice's computer system, a unique access code that is known only to the user is used. What is this unique access code called?
answer
a password
question
Facilities typically have policies prohibiting the downloading of music, pictures, and the like in order to prevent attacks from viruses or ______ that might be carried on downloaded items.
answer
malware
question
What is the process whereby electronic transmission of any health information sent in such a way that it cannot be read without a special code that reads it?
answer
encryption
question
In addition to the American Health Information Management Association, an independent, name another non-profit organization that promotes the effective use of health information technology.
answer
The Healthcare Information and Management Systems Society
question
What is the name of the private, non-profit organization that certifies EHR software?
answer
CCHIT Certification Commission for Health Information Technology
question
Data that is timely, consistent, secure, and correct is said to have data __________________.
answer
integrity
question
Records were released to a life insurance company without authorization, and the release was not required by law. This is known as a/an _______________.
answer
breach of confidentiality
question
Dr. Patterson has referred his patient, James Holt, to a dermatologist. James' records were sent electronically to the dermatologist's office. The release of records was done to ensure _______________ of care.
answer
continuity
question
Upon request, Greensburg Medical Center provides patients with a report detailing the disclosures made to external agencies as well as all accesses to a patient's EHR internally. What is this process of providing a listing of the information released and to whom it was released known as?
answer
accounting of disclosures
question
Ongoing communication about a particular topic, for instance satisfaction with a medical office, may be posted on a __________, a social media format where an author provides periodic commentary on various issues.
answer
blog
question
Some offices conduct periodic internal ___________________ on every staff member and care provider for the purpose of determining compliance with data use policies.
answer
audits
question
In order to deter unauthorized access to documentation and patient information, data may be ___________________.
answer
encrypted
question
A suspicious e-mail was received at Greenway Medical Center and included an attachment. the IT consultant informed the office manager that the system was infected by a computer virus because the system was unprotected from outside access. How could the office have avoided such a situation?
answer
Installing a firewall would have prevented this attack.
question
Greensburg Medical Center uses an electronic health record. Anna Oliver, a patient there, has written a letter to the health information manager requesting an accounting of disclosures from her health record during the period of January 1, 2011 through and including June 30, 2011. Is the health information manager able to do this? Explain.
answer
HIPAA and HITECH rules specify that patients may be given a full accounting of all disclosures (internal and external) of his or her health information, who received or accessed the information, and what was accessed, the date(s) on which it occurred, and the reason the access was made.
question
Explain why the Certification Commission for Health Information Technology (CCHIT) was formed.
answer
The purpose of forming CCHIT was to have a non-government, non-profit organization whose function would be to certify electronic health information software.
question
Many offices use an internal, secure environment to communicate important information to their employees. This is known as a/an?
answer
Intranet
question
A hard copy document such as an insurance card may be converted to digital format for inclusion in a patient's health record. The process of converting the document from paper format to digital format is known as _________________.
answer
scanning
question
Preformatted documents built into the practice management and electronic health record software are known as:
answer
templates
question
In the field \"Primary Language\", English appears in the field. This is known as a ___________ value.
answer
default
question
Datasets that provide structure and are the building blocks for parts of the health record are known as ____________ files.
answer
master
question
Dr. Handley prefers to see the Facesheet of her patients in a particular order. Dr. Adams prefers to see his in another order. The software used in their office allows each provider to view screens in a different way. This is known as:
answer
customization
question
A functionality of an EHR or other software that allows the user to assign an electronic \"to-do\" list to themselves or other employees is known as the:
answer
task list
question
Jeannie Clark has requested to be put on a payment plan for her outstanding balance. She came to the office today and while registering her, the healthcare professional saw a dialogue box which alerted her not to collect a late fee. This reminder is known as a ______________.
answer
flag
question
The quality of a digital image is known as the:
answer
resolution
question
Greenway Medical Center uses a priority ranking system for their internal e-mail. The fact that the holiday luncheon will be held on December 6, 2011 would be a __________ priority email.
answer
low
question
Instant access to information is available through a public series of networks. What is this network commonly called?
answer
Internet
question
What is the name of the technology used to scan images and then convert them to a format that is readable by the computer?
answer
optical character recognition
question
Dr. Henderson's office has been installing an EHR system in their office over the past few months. On January 2, 2014, they will begin using the new system for all patients seen on that date and going forward. Using the system for the first time is referred to as what?
answer
\"Going live\"
question
Master files are __________________ that provide structure and are the building blocks for parts of a provider's chart notes.
answer
datasets
question
What step(s) should be taken to ensure a scanned image is properly filed within a patient's health record?
answer
Scanned images must first be verified to ensure they are made a part of the correct patient's record as well as the correct encounter for that patient.
question
A new staff member in your office has a question about scanning. How would you explain the process to her?
answer
Lay the document on the screen, follow the prompts, and merge the digital copy into the proper patient's health record.
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New