RHIA EXAM PREP WITH ACCURATE
SOLUTIONS
Information from which personal characteristics have been removed and that, as a
result, neither identifies nor provides a reasonable basis to believe it could identify an
individual. Hence no longer protected by HIPAA privacy rule - ANS-Deidentified
information
The facility employee with the most vested interest in the project's success. It is a good
practice to select someone who has responsibility for the organization's departments,
divisions, and personnel that will be affected by the project - ANS-Sponsor
Anyone in the organization who is affected by the project product. - ANS-Stakeholder
These are used to display data from one or more variables - ANS-Bar Charts
An easily understood chart in which the sizes of the slices of the pie show the
proportional contribution of each part. It can be used to show the component parts of a
single group or variable. - ANS-Pie Charts
It may be used to display time trends , and can show trends or patterns of quantitative
data over time. - ANS-Line Graphs
It is used to display a frequency distributions, the categories are noncontinuous, or
discrete. - ANS-Histograms
The combined practices of HIM, IT, and HI that affect how data and documentation
combine to create a single business record for an organization - ANS-Data
management
The process by which data is monitored, maintained and managed by a data
administrator and/or an organization. Data administration allows an organization to
control its data assets, as well as their processing and interactions with different
applications and business processes. Data administration ensures that the entire life
cycle of data use and processing is on par with the enterprise's objective. - ANS-Data
administration
The overall management of the availability, usability, integrity, and security of the data
employed in an organization or enterprise (Data Governance Institute)
, Decision making and authority over data-related matters is data governance. It is clear
that any industry as reliant on data as healthcare needs a plan for managing this asset -
ANS-Data governance
The process of determining the users' information needs and identifying relationships
among the data - ANS-Data modeling
Borrowing record entries from another source as well as representing or displaying past
documentation as current - ANS-Authorship Integrity
Inadequate functions that make it impossible to detect when an entry was modified or
borrowed from another source and misrepresented as an original entry by an authorized
user is an example of a potential breach - ANS-Auditing integrity
Automated insertion of clinical data using templates or similar tools with predetermined
components using uncontrolled and uncertain clinical relevance - ANS-Documentation
integrity
Ensuring that data have been accessed or modified only by those authorized to do so -
ANS-Data integrity
Non binary, human readable data - ANS-Unstructured Data
Data that are narrative in nature: - ANS-Free-text data
The data collected for the purpose of managing the assets of a business (for eg: a
healthcare organization, a product line); in healthcare, data derived from the charge
generation documentation associated with the activities of care and then aggregated by
specific customer grouping for financial analysis.
This data includes details about the patient's occupation, employer, and insurance
coverage and is collected at the time of treatment. Healthcare providers use this data to
complete claims forms that will be submitted to third-party payers - ANS-Financial data
The data elements in a patient's automated laboratory order, or result, are coded and
alphanumeric. Their fields are predefined and limited. In other words, the type of data is
discrete, and the format of this data is structured - ANS-Structured data
A computer system or a combination of systems that provides a security barrier or
supports an access control policy between two networks or between a network and
other traffic outside the network. - ANS-Firewall
4 phases:
1. Analysis
2. Design
3. Implementation
SOLUTIONS
Information from which personal characteristics have been removed and that, as a
result, neither identifies nor provides a reasonable basis to believe it could identify an
individual. Hence no longer protected by HIPAA privacy rule - ANS-Deidentified
information
The facility employee with the most vested interest in the project's success. It is a good
practice to select someone who has responsibility for the organization's departments,
divisions, and personnel that will be affected by the project - ANS-Sponsor
Anyone in the organization who is affected by the project product. - ANS-Stakeholder
These are used to display data from one or more variables - ANS-Bar Charts
An easily understood chart in which the sizes of the slices of the pie show the
proportional contribution of each part. It can be used to show the component parts of a
single group or variable. - ANS-Pie Charts
It may be used to display time trends , and can show trends or patterns of quantitative
data over time. - ANS-Line Graphs
It is used to display a frequency distributions, the categories are noncontinuous, or
discrete. - ANS-Histograms
The combined practices of HIM, IT, and HI that affect how data and documentation
combine to create a single business record for an organization - ANS-Data
management
The process by which data is monitored, maintained and managed by a data
administrator and/or an organization. Data administration allows an organization to
control its data assets, as well as their processing and interactions with different
applications and business processes. Data administration ensures that the entire life
cycle of data use and processing is on par with the enterprise's objective. - ANS-Data
administration
The overall management of the availability, usability, integrity, and security of the data
employed in an organization or enterprise (Data Governance Institute)
, Decision making and authority over data-related matters is data governance. It is clear
that any industry as reliant on data as healthcare needs a plan for managing this asset -
ANS-Data governance
The process of determining the users' information needs and identifying relationships
among the data - ANS-Data modeling
Borrowing record entries from another source as well as representing or displaying past
documentation as current - ANS-Authorship Integrity
Inadequate functions that make it impossible to detect when an entry was modified or
borrowed from another source and misrepresented as an original entry by an authorized
user is an example of a potential breach - ANS-Auditing integrity
Automated insertion of clinical data using templates or similar tools with predetermined
components using uncontrolled and uncertain clinical relevance - ANS-Documentation
integrity
Ensuring that data have been accessed or modified only by those authorized to do so -
ANS-Data integrity
Non binary, human readable data - ANS-Unstructured Data
Data that are narrative in nature: - ANS-Free-text data
The data collected for the purpose of managing the assets of a business (for eg: a
healthcare organization, a product line); in healthcare, data derived from the charge
generation documentation associated with the activities of care and then aggregated by
specific customer grouping for financial analysis.
This data includes details about the patient's occupation, employer, and insurance
coverage and is collected at the time of treatment. Healthcare providers use this data to
complete claims forms that will be submitted to third-party payers - ANS-Financial data
The data elements in a patient's automated laboratory order, or result, are coded and
alphanumeric. Their fields are predefined and limited. In other words, the type of data is
discrete, and the format of this data is structured - ANS-Structured data
A computer system or a combination of systems that provides a security barrier or
supports an access control policy between two networks or between a network and
other traffic outside the network. - ANS-Firewall
4 phases:
1. Analysis
2. Design
3. Implementation