- Science
- Medicine
- Health Computing
Focus your studying with a path
Get faster at matching termsHow
do you want to study today?
Learn
Match
Terms in this set (37)
the use, transmitting, or disclosure of PHI in a manner deemed non-compliant with HIPAA, which may cause potential risk for an individual; i.e. when seen before shredding, disclosure of PHI with an expired authorization, session notes left unsigned, speaking about a client in a public place, storing PHI on unsecured device, photos, video, etc.
Sets with similar termsReview terms and
definitions Focus your studying with a path Get faster at matching termsHow do you want to study today?
ANS. A,C,D
Rationale: The
safe use of HIT relies on many factors, including clinicians, patients, and socio-technical issues such as the interplay of people, process, and technology. Vendors, users, government, and the private sector all have roles to play.
ANS. A,B,C,E
Rationale: IMIA's Code of Ethics for informatics includes Information-Privacy and Disposition, Openness, Security, Access, Legitimate Infringement, Least Intrusive Alternative, and Accountability. While the
principles of the code might be to eliminate threats, elimination of threats is not a specific principle.
117. You want to make sure you consider crucial components as you design your first usability study. One of these components is to consider users and their characteristics. Other components are:
a. information, a developmental timeline, context, and group interactions.
b. a developmental timeline, tasks, information, product, and context.
c.
information, testing, errors, and context.
d. tasks, information, projected errors, context, and interactions.