What is the difference between the safe harbor and expert determination methods of de identifying data quizlet?

  1. Science
  2. Medicine
  3. Health Computing

How do you want to study today?

  • Learn

    Focus your studying with a path

  • Match

    Get faster at matching terms

Terms in this set (37)

the use, transmitting, or disclosure of PHI in a manner deemed non-compliant with HIPAA, which may cause potential risk for an individual; i.e. when seen before shredding, disclosure of PHI with an expired authorization, session notes left unsigned, speaking about a client in a public place, storing PHI on unsecured device, photos, video, etc.

Sets with similar terms

How do you want to study today?

  • Review terms and definitions

  • Focus your studying with a path

  • Get faster at matching terms

ANS. A,C,D
Rationale: The safe use of HIT relies on many factors, including clinicians, patients, and socio-technical issues such as the interplay of people, process, and technology. Vendors, users, government, and the private sector all have roles to play.

ANS. A,B,C,E
Rationale: IMIA's Code of Ethics for informatics includes Information-Privacy and Disposition, Openness, Security, Access, Legitimate Infringement, Least Intrusive Alternative, and Accountability. While the principles of the code might be to eliminate threats, elimination of threats is not a specific principle.

117. You want to make sure you consider crucial components as you design your first usability study. One of these components is to consider users and their characteristics. Other components are:
a. information, a developmental timeline, context, and group interactions.
b. a developmental timeline, tasks, information, product, and context.
c. information, testing, errors, and context.
d. tasks, information, projected errors, context, and interactions.

Sets with similar terms