Explore tens of thousands of sets crafted by our community.
HIPAA Essentials
30
Flashcards
0/30
Covered Entity
A health plan, healthcare clearinghouse, or healthcare provider who transmits any health information in electronic form.
Business Associate
A person or entity that performs certain functions or activities that involve the use or disclosure of PHI on behalf of, or services for, a covered entity.
HIPAA Enforcement Rule
The rule provides standards for the enforcement of all the Administrative Simplification Rules.
Individual Rights Under HIPAA
Rights given to individuals including the right to access their PHI, request amendments, and obtain an accounting of disclosures.
What does HIPAA stand for?
Health Insurance Portability and Accountability Act.
Minimum Necessary Standard
A principle that dictates that only the minimum necessary PHI is to be used or disclosed for a particular task.
HIPAA Privacy Rule
A set of standards that address the use and disclosure of individuals' PHI by covered entities.
HITECH Act
Health Information Technology for Economic and Clinical Health Act; it promotes the adoption and meaningful use of health information technology.
De-identified PHI
PHI that has had identifying information removed, making it no longer subject to HIPAA regulations.
Data Encryption
Conversion of electronic data into another form, or code, that only people authorized to access can read and process.
Audit Controls
Technical tools and mechanisms which record and examine activity in information systems that contain or use e-PHI.
TPO
Treatment, Payment, and Healthcare Operations. These are the main purposes for which the disclosure of PHI is considered permissible under HIPAA.
Administrative Safeguards
Administrative actions, policies, and procedures to manage the selection, development, implementation, and maintenance of security measures to protect e-PHI and to manage the conduct of the covered entity’s workforce in relation to the protection of that information.
Technical Safeguards
The technology and the policy and procedures for its use that protect e-PHI and control access to it.
Workforce Security
Ensuring that each member of the covered entity’s workforce has appropriate access to e-PHI and that the access is in accordance with the applicable provisions of the Security Rule.
Authorization
A detailed document that gives covered entities permission to use protected health information for specified purposes, which are generally other than treatment, payment, or healthcare operations.
PHI
Protected Health Information.
HIPAA Security Rule
A set of standards that set forth administrative, technical, and physical security procedures for covered entities to safeguard electronic PHI (e-PHI).
Permitted Disclosures
Situations where PHI can be disclosed without the individual’s authorization, such as for treatment, payment, or healthcare operations.
Physical Safeguards
Physical measures, policies, and procedures to protect a covered entity’s electronic information systems and related buildings and equipment, from natural and environmental hazards, and unauthorized intrusion.
HITECH Breach Notification Rule
This rule requires covered entities and their business associates to provide notification following a breach of unsecured PHI.
HIPAA Omnibus Rule
A rule that implements modifications to the HIPAA Privacy, Security, and Enforcement Rules, and incorporates the changes made by the HITECH Act.
Breach
An impermissible use or disclosure under the Privacy Rule that compromises the security or privacy of the PHI.
Risk Analysis
Part of the Security Rule obligations, which involves assessing the potential risks and vulnerabilities to the confidentiality, availability, and integrity of e-PHI held by the covered entity.
HIPAA Transaction and Code Sets Rule
The rule that adopts standards for certain transactions and the data elements for those transactions and establishes that all covered entities must use these standards when conducting these transactions electronically.
Security Management Process
The process to reduce risks to e-PHI to reasonable and appropriate levels to comply with the general rules of the HIPAA Security Rule.
Notice of Privacy Practices (NPP)
A document that explains how a covered entity uses and discloses PHI and the individual's rights under HIPAA.
Incidental Use and Disclosure
Secondary use or disclosure of PHI that cannot reasonably be prevented, is limited in nature, and that occurs as a by-product of an otherwise permitted use or disclosure.
HIPAA for Psychotherapy Notes
HIPAA provides special protections for psychotherapy notes, which are given more privacy than other types of PHI.
OCR
Office for Civil Rights. This is the HHS office responsible for enforcing HIPAA's Privacy and Security Rules.
© Hypatia.Tech. 2024 All rights reserved.