HIPAA, ARRA, and HITECH Technology Legislation Kelli Lutz & Terence Brown Health Informatics

1234567891011121314151617181920212223242526272829
Across
  1. 3. The ________ rule deliberated a standard for electronic signature
  2. 5. _____A EHR has this to show they meet all requirements.
  3. 8. Policies and procedures that address the management of computer resources.
  4. 10. Granted permission to disclose confidential info as defined HIPAA Privacy Rule
  5. 12. physical characteristics of users (fingerprints etc)
  6. 13. HIPAA Data security provision that provide objective and scope for rule as a whole.
  7. 15. HITECH rule that requires covered entities and business associates to identify unpermitted access to PHI requires disclosure
  8. 18. type of access controls from damage in person.
  9. 19. a document given to patients to describe how information is used and shared abbreviation.
  10. 21. Protected Health Information in the Electronic Form.
  11. 22. Healthcare providers would be offered financial incentives for demonstrating this type of use.
  12. 23. a violation of the policies or standards develops to ensure security
  13. 24. Encryption that uses math or logic functions to transform data to useless data.
  14. 26. ABRV. Authority to manage and set standards for the stimulus program
  15. 27. Log of Log-ins Log-outs and files accessed with time stamps.
  16. 29. Act includes requirements for standards development and for investment in health information technology infrastructure originally called stimulus package.
Down
  1. 1. Process of identifying sound of health record entries by attaching authors signature or e signature.
  2. 2. Term that HIPPA Title II creates privacy rule security rule code set standards.
  3. 4. ARRA was developed to preserve and create ______ and promote economic recovery
  4. 6. (Abbreviation)Prepared a series of webinars to train Federal Agencies on ARRA.
  5. 7. protections that are requires for every person undergoing medical treatment
  6. 9. ________severity of payment.
  7. 11. Alternative name for HIPAA
  8. 14. Preventative measures restrict access to only those that specifically need access.
  9. 16. This type of plan is put into effect for responding to system outages or emergencies.
  10. 17. Agency within the DHHS responsible for enforcement of security and privacy rules Abbreviation.
  11. 20. Type of associates subject to privacy and security Regulations.
  12. 24. HITECH Some of the core requirements include using a __________
  13. 25. The federal legislation enacted to provide continuity of health coverage control fraud and abuse in healthcare reduce healthcare costs and guarantee the security and privacy
  14. 28. Section of HIPAA that establishes standards for providers,establishes Rights, and Security Rules