An overlay occurs when one individual is assigned in the master patient index to another individual's health record.
A health care facility has discovered that an overlay has occurred resulting in invalid data being stored in key identifying fields. Which of the following information security areas does this breach affect? 1. Survivability
2. Integrity
3. Availability
4. Inadvertent disclosure
Question 2During the course of client care, the 21-year-old client tells the nurse that she had an abortion last year but that no one in her family knows. Which of these terms best describes the situation?
1. Consent
2. Privacy
3. Security
4. Confidentiality
Question 3Which of these is accurate about the Health Insurance Portability and Accountability Act (HIPAA) Security Rule and the use of technology?
1. Does not specify the use of particular technology
2. Refers to the Joint Commission standards for technology
3. Specifies the utilization of HIPAA approved technology
4. Provides a monthly Web-based list of approved technology
Question 4The best time to train an end-user is which of the following?
1. Before the system goes live
2. Upon notice that there will be an upgrade
3. After the system goes live
4. As soon as the vendor has been selected
Question 5The cost of a new or upgraded system can be burdensome on an organization from a budgetary perspective. Which of the following statements can be considered a return on investment?
1. Employees express satisfaction with their jobs and turnover rate is low.
2. Staff with IT skills is more marketable and have greater job flexibility.
3. The newly trained individual can be granted work release time to train new staff members.
4. After the training, the objectives have not been met.