HIPPA only applies to organizations that False
have electronic health records.
True
False
The Informatics nurse is involved with d. It is regulated by HIPPA Legislation and The Major cause of security breeches is
measure to protect the security and human error.
confidentiality of patient data because:
a. it is a joint commission mandate
b. it is regulated by HIPPA legislation
c. the major cause of security breaches is
human error
d. both B and C are correct
Controls to protect data privacy and b. analytical
integrity are both logical and:
a. physical
b. analytical
c. theoretical
d. psychological
Which of the following is not a mechanism C. Having one password per nursing unit.
for protecting the security of health data:
a. Automatic sign-offs
b. A Strong Password
c. Having one password per nursing unit
d. Firewalls
1/16
,9/3/24, 5:03 PM
An audit trail is : b. an electronic tool that can track system access by individual user who viewed a
a. a log of which project meetings and specific client record.
events have been completed
b. an electronic tool that can track system
access by individual user who viewed a
specific client record.
c. a proactive tool to monitor who will be
using a system and modifying data.
d. used primarily as a data integrity tool
Data can be represented by all EXCEPT: a. text
a. text
b. audio
c. transmission waves
d. video
Things to consider related to disaster C. Must have a solid communication plan during disaster and recover.
planning include:
a. should have only 1 database to make it
easier to recover
b. all data should be stored onsite so it is
accessible
c. must have a solid communication plan
during disaster and recovery.
d. an association or group that shows
uniformity
Some examples of physical security for TRUE
healthcare data are fences, walls, locks,
safes, vaults, armed guards, sensors, alarms.
True
False
One way to track the activity that is b. an audit trail
occurring in a system is:
a. a GANTT chart
b. an audit trail
c. a data backup
d. biometrics
PHI stands for : d. Protected Health Information
a. physician hospital interchange
b. password hint indicator
c. potential hardware incursion
d. protected health information
If the informatics nurse is concerned that a Load Volume Testing
computer system may not function well
during peak times of access the type of
testing needed is:
a. Functional Testing
b. System Integrated testing
c. Black box testing
d. Load volume testing
2/16
, 9/3/24, 5:03 PM
Load/volume testing is a non-functional testing for reliability that assesses the ability of
the system to function under various loads, such as at peak times when multiple users in
What is Load Volume Testing? multiple departments are accessing the system. The purpose of load/volume testing is
to determine the maximum load capacity and to identify the load at which problems
begin to occur. Testing is done at both the safe working load (SWL) and above the SWL.
In preparation for the workflow redesign map the current workflow
necessitated for implementation of an EHR,
the first step should be to
a. Assess the EHR requirments
b. Conduct surveys about the workflow
c. Assess compatibility with the EHR
d. Map the current workflow
Which resource for evidence-based PubMed is a resource for evidence-based research that is provided by the National
research is provided by the National Library Library of Medicine, which was developed by the National Center for Biotechnology
of Medicine? Information (NCBI). PubMed provides access to numerous databases with 24 million
a. BMJ Publishing citations from MEDLINE (the National Library of Medicine's bibliographic database with
b. CINAHL references to life sciences and biomedical sciences), life science journals, and
c. PubMed electronic books with links to full text when it is available.
d. World View on Evidence based- nursing
When considering transitioning to cloud The most critical assessment relates to compliance with regulatory requirements
storage and assessing vendors, the most because if the vendor cannot verify that the company meets HIPAA requirements and
critical assessment relates to: satisfies the Code of Federal Regulations Title 21, Part 11 (which provides regulations
a. regulatory compliance regarding electronic records and electronic signatures), then security of patient data
b. monitoring mechanisms may be inadequate. Other important considerations include cost analysis (including
c. cost analysis cost of implementation and ongoing costs), monitoring mechanisms, and
d. interoperability interoperability.
When utilizing a prioritization matrix to the informatics nurse must first establish criteria and a rating scale. The criteria includes
prioritize activities as a project manager, the those factors that are utilized to determine how important each project is; for example,
informatics nurse must first establish: a project mandated by regulations is more important than a project that may improve
a. rating scale and categories customer satisfaction. A rating scale for each project should be established with
b. criteria and timeframe numeric values (such as 1 to 10) used to demonstrate how effective the project is in
c. criteria and rating scale meeting the criteria. A typical prioritization matrix may have up to a dozen criteria.
d. rating scale and timeframe
An advantage of an identity and access An advantage of an identity and access management (IAM) system is that the IAM
management (IAM) system is that the IAM system meets HIPAA's Security Rule requirements regarding access to PHI through
system: identity management. An IAM system provides, captures, updates, and records user IDs
a. provides HIPAA-required encryption for and provides appropriate access privileges, preventing "privilege creep," which
PHI increases risks to security. The IAM system should provide authentication (single sign-in
b. satisfies the Code of Federal Regulations and session management), authorization (based on roles, rules, and attributes), user
Title 21, Part 11 management (provisioning and password management), and a central directory.
c. meets HIPAA's Security Rule requirements
regarding access to PHI
d. meets HIPAA's Privacy Rule requirements
regarding identification
When utilizing a prioritization matrix to first establish criteria and a rating scale. The criteria includes those factors that are
prioritize activities as a project manager, the utilized to determine how important each project is; for example, a project mandated
informatics nurse must first establish: by regulations is more important than a project that may improve customer satisfaction.
a. rating scale and categories A rating scale for each project should be established with numeric values (such as 1 to
b. criteria and timeframe 10) used to demonstrate how effective the project is in meeting the criteria. A typical
c. criteria and rating scale prioritization matrix may have up to a dozen criteria.
d. rating scale and timeframe
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Denyss. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $7.99. You're not tied to anything after your purchase.