hit 134 unit 1
docx
keyboard_arrow_up
School
Shelton State Community College *
*We aren’t endorsed by this school
Course
134
Subject
Information Systems
Date
Dec 6, 2023
Type
docx
Pages
2
Uploaded by cjirehk
1.
What is the most important way to reduce an
organization’s risk due to loss or litigation?
Proper documentation
2.
Which of the following activities are not performed by risk
managers?
M
aintain a focus on process and not
outcomes
3.
Which of the following statements accurately reflects
quality management?
A
n activity designed to achieve optimum
performance
4.
How does risk management differ from quality
management?
Ri
sk management identifies areas of
operational and financial loss.
5.
HIPAA requires a covered entity to perform a risk analysis
and implement standards to protect the institution’s health
information records. Which is one of those standards?
D
ocumentation of the entity’s actions,
which are to be maintained for six years.
6.
Which is characteristic of an
incident report
?
Documents circumstances to assess for
the possibility of impending litigation.
7.
Before an incident report is admitted into evidence, the
document must _____.
O
vercome the application of privileges
8.
Automated databases in the context of risk management
_____.
M
ay be used to compile information in an
effort to increase prevention of loss
9.
Which is an example of a
sentinel event
?
P
atient who reports significant adverse
drug reaction
10.
Which is an investigation into a serious event, including
clinical and administrative review?
Root-cause analysis
11.
The Joint Commission’s role in sentinel events includes
_____.
the possibility of placing the organization
on Accreditation Watch status
12.
The function of analyzing and evaluating all of the risks
that affect an organization is called
Enterprise risk management
13.
Which is an example of a concern that may be addressed
as the result of an
enterprise risk
management
assessment?
Threats of terrorism and its impact on
professionals
14.
Which involved a combination of planned functions
directed toward prudent allocation of medical resources
and the administration of appropriate treatment?
Utilization management
15.
Medicare’s inpatient prospective payment system _____.
changed reimbursement per diem rates to
predetermined rates
16.
A combination of planned functions directed to patients in
a health care facility or setting that includes prudent use of
resources, appropriate treatment management, and early
comprehensive discharge planning for continuation of
care.
Utilization Management
17.
Function of analyzing and evaluating all of the risks that
confront an organization.
Enterprise Risk Management
18.
An improvement technique that examines patterns of
activity to define optimum performance and determine
how to achieve that performance.
Quality Management
19.
An unexpected occurrence involving death or serious
physical or psychological injury.
Sentinel Event
20.
What constitutes a legal heath record?\
Business record generated at or for a
health care organization
21.
What constitutes a legal heath record?
Business record generated at or for a
health care organization
22.
The patient’s legal electronic health record is _____.
defined by each institution with input from
its legal counsel
23.
An electronic health record includes _____.
real-time information available to multiple
caregivers at multiple locations
24.
To establish a health record as admissible under a
business record exemption, the requesting party must
show that _____.
the record was kept during the ordinary
course of business
25.
To be able to establish
foundation
, the health information
manager needs to _____.
know the manner in which patient health
care data is recorded
26.
In meeting the
accuracy
requirement, the health
information manager must _____.
be familiar with the record-keeping
procedures and the trustworthiness of
them
27.
A printout of the patient record, which has been
maintained in an electronic medium, is _____.
entered into evidence with testimony by
the custodian of health records
28.
Authentication
of an electronic health record _____.
ensures that people are who they say they
are
29.
Permissions granted in an electronic health record system
involve _____.
levels of access granted to an operating
system
30.
Damage prevention
in an electronic health record system
refers to _____.
keeping data or equipment from being
brought down by malicious attempts
31.
A
risk prevention technique
that is used to protect
electronic health records is ___.
restricting copy functions
32.
The health care provider should consider improved
controls, including the establishment of written policies
and procedures covering the loan and use of _____ and
whether ePHI should even be maintained on these
media/devices at all.
computer
devices that are portable
33.
HIPAA safeguards include _____.
physical and technical
34.
Safeguards established by HIPAA security rules __.
ensure data integrity by protecting it from
unauthorized deletion.
35.
Under HIPAA security rules,
required
specifications
_____.
must be implemented by all facilities
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help