hit 134 unit 1

docx

School

Shelton State Community College *

*We aren’t endorsed by this school

Course

134

Subject

Information Systems

Date

Dec 6, 2023

Type

docx

Pages

2

Uploaded by cjirehk

Report
1. What is the most important way to reduce an organization’s risk due to loss or litigation? Proper documentation 2. Which of the following activities are not performed by risk managers? M aintain a focus on process and not outcomes 3. Which of the following statements accurately reflects quality management? A n activity designed to achieve optimum performance 4. How does risk management differ from quality management? Ri sk management identifies areas of operational and financial loss. 5. HIPAA requires a covered entity to perform a risk analysis and implement standards to protect the institution’s health information records. Which is one of those standards? D ocumentation of the entity’s actions, which are to be maintained for six years. 6. Which is characteristic of an incident report ? Documents circumstances to assess for the possibility of impending litigation. 7. Before an incident report is admitted into evidence, the document must _____. O vercome the application of privileges 8. Automated databases in the context of risk management _____. M ay be used to compile information in an effort to increase prevention of loss 9. Which is an example of a sentinel event ? P atient who reports significant adverse drug reaction 10. Which is an investigation into a serious event, including clinical and administrative review? Root-cause analysis 11. The Joint Commission’s role in sentinel events includes _____. the possibility of placing the organization on Accreditation Watch status 12. The function of analyzing and evaluating all of the risks that affect an organization is called Enterprise risk management 13. Which is an example of a concern that may be addressed as the result of an enterprise risk management assessment? Threats of terrorism and its impact on professionals 14. Which involved a combination of planned functions directed toward prudent allocation of medical resources and the administration of appropriate treatment? Utilization management 15. Medicare’s inpatient prospective payment system _____. changed reimbursement per diem rates to predetermined rates 16. A combination of planned functions directed to patients in a health care facility or setting that includes prudent use of resources, appropriate treatment management, and early comprehensive discharge planning for continuation of care. Utilization Management 17. Function of analyzing and evaluating all of the risks that confront an organization. Enterprise Risk Management 18. An improvement technique that examines patterns of activity to define optimum performance and determine how to achieve that performance. Quality Management 19. An unexpected occurrence involving death or serious physical or psychological injury. Sentinel Event 20. What constitutes a legal heath record?\ Business record generated at or for a health care organization 21. What constitutes a legal heath record? Business record generated at or for a health care organization 22. The patient’s legal electronic health record is _____. defined by each institution with input from its legal counsel 23. An electronic health record includes _____. real-time information available to multiple caregivers at multiple locations 24. To establish a health record as admissible under a business record exemption, the requesting party must show that _____. the record was kept during the ordinary course of business 25. To be able to establish foundation , the health information manager needs to _____. know the manner in which patient health care data is recorded 26. In meeting the accuracy requirement, the health information manager must _____. be familiar with the record-keeping procedures and the trustworthiness of them 27. A printout of the patient record, which has been maintained in an electronic medium, is _____. entered into evidence with testimony by the custodian of health records 28. Authentication of an electronic health record _____. ensures that people are who they say they are 29. Permissions granted in an electronic health record system involve _____. levels of access granted to an operating system 30. Damage prevention in an electronic health record system refers to _____. keeping data or equipment from being brought down by malicious attempts 31. A risk prevention technique that is used to protect electronic health records is ___. restricting copy functions 32. The health care provider should consider improved controls, including the establishment of written policies and procedures covering the loan and use of _____ and whether ePHI should even be maintained on these media/devices at all. computer devices that are portable 33. HIPAA safeguards include _____. physical and technical 34. Safeguards established by HIPAA security rules __.
ensure data integrity by protecting it from unauthorized deletion. 35. Under HIPAA security rules, required specifications _____. must be implemented by all facilities
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help