HIPAA, ARRA, and HITECH Technology Legislation Kelli Lutz & Terence Brown Health Informatics
Across
- 3. The ________ rule deliberated a standard for electronic signature
- 5. _____A EHR has this to show they meet all requirements.
- 8. Policies and procedures that address the management of computer resources.
- 10. Granted permission to disclose confidential info as defined HIPAA Privacy Rule
- 12. physical characteristics of users (fingerprints etc)
- 13. HIPAA Data security provision that provide objective and scope for rule as a whole.
- 15. HITECH rule that requires covered entities and business associates to identify unpermitted access to PHI requires disclosure
- 18. type of access controls from damage in person.
- 19. a document given to patients to describe how information is used and shared abbreviation.
- 21. Protected Health Information in the Electronic Form.
- 22. Healthcare providers would be offered financial incentives for demonstrating this type of use.
- 23. a violation of the policies or standards develops to ensure security
- 24. Encryption that uses math or logic functions to transform data to useless data.
- 26. ABRV. Authority to manage and set standards for the stimulus program
- 27. Log of Log-ins Log-outs and files accessed with time stamps.
- 29. Act includes requirements for standards development and for investment in health information technology infrastructure originally called stimulus package.
Down
- 1. Process of identifying sound of health record entries by attaching authors signature or e signature.
- 2. Term that HIPPA Title II creates privacy rule security rule code set standards.
- 4. ARRA was developed to preserve and create ______ and promote economic recovery
- 6. (Abbreviation)Prepared a series of webinars to train Federal Agencies on ARRA.
- 7. protections that are requires for every person undergoing medical treatment
- 9. ________severity of payment.
- 11. Alternative name for HIPAA
- 14. Preventative measures restrict access to only those that specifically need access.
- 16. This type of plan is put into effect for responding to system outages or emergencies.
- 17. Agency within the DHHS responsible for enforcement of security and privacy rules Abbreviation.
- 20. Type of associates subject to privacy and security Regulations.
- 24. HITECH Some of the core requirements include using a __________
- 25. The federal legislation enacted to provide continuity of health coverage control fraud and abuse in healthcare reduce healthcare costs and guarantee the security and privacy
- 28. Section of HIPAA that establishes standards for providers,establishes Rights, and Security Rules