Filters
Question type

An organization implements a policy on installing software service packs on all its computers. This is an example of which type of control?


A) Administrative
B) Technical
C) Physical
D) Electronic

Correct Answer

verifed

verified

What is a negative impact of the increased use of mobile devices in transmitting health data?


A) They support increased health data access for providers.
B) They increase the risk of a security breach.
C) They decrease productivity.
D) They increase the number of medication errors.

Correct Answer

verifed

verified

B

Which definition most accurately describes privacy?


A) The means to ensure health record privacy and confidentiality
B) Accuracy and completeness of health information
C) The rights of individuals to control access to their person or information about themselves
D) An act that has the potential to cause harm to an informational asset

Correct Answer

verifed

verified

A healthcare provider forgets to update a patient's medications. Which fair information principle is being violated?


A) Correction
B) Openness and transparency
C) Data quality and integrity
D) Safeguards

Correct Answer

verifed

verified

Which are examples of secondary use of health information? (Select all that apply.)


A) Treatment
B) Surveillance
C) Research
D) Marketing
E) Prevention

Correct Answer

verifed

verified

What are some examples of indirect costs to organizations that have security breaches? (Select all that apply.)


A) Lost productivity
B) Expensive fines
C) Damaged public trust
D) Remediation costs
E) Repeating medical procedures

Correct Answer

verifed

verified

A, C, D

What is the difference between the safe harbor and expert determination methods of de-identifying data?


A) The safe harbor method involves removal of 18 types of identifiers, and the expert determination method involves the application of statistical or scientific models.
B) The safe harbor method involves the application of statistical or scientific models, and the expert determination method involves removal of 18 types of identifiers.
C) The safe harbor method involves removal of all identifiers, and the expert determination method involves the removal of 18 types of identifiers.
D) The safe harbor method involves securing identifiers in an encrypted database, and the expert determination specifically determines the riskiest identifiers to remove.

Correct Answer

verifed

verified

Which example constitutes an internal security event?


A) Servers containing clinical data were stolen from a facility.
B) A person hacks into a facility's server and steals PHI electronically.
C) A person installs a malicious code past a facility's firewall.
D) A system administrator installed a new server without any security measures.

Correct Answer

verifed

verified

D

Which organization works on an international level to improve information privacy?


A) Health and Human Services Office of Civil Rights
B) Health Information Security and Privacy Collaboration (HISPC)
C) Department of Health and Human Services (DHHS)
D) Electronic Frontier Foundation (EFF)

Correct Answer

verifed

verified

Which principles are included in IMIA's Code of Ethics for informatics? (Select all that apply.)


A) Information-Privacy and Disposition
B) Openness
C) Elimination of Threats
D) Legitimate Infringement
E) Accountability

Correct Answer

verifed

verified

Showing 1 - 10 of 10

Related Exams

Show Answer