Where are policies located
How many injections do you get in a Hep B series
Who provides cleaning chemicals for the departments to use
If you are out for three days or more what do you need to have to return to work
If we have a disaster and we lose natural gas supply what will we use
who approves personal appliance use in HMH
Do we allow service animals in HMH
How often does a head lice egg hatch
What do we do with a patients clothes that has head lice
What is the surgeon's last name that starts with F
What is the minimum amount of seconds to wash your hands
What is a common food borne illness
How many visitors can a PCU patient have s day
What does Code Gray mean
What protects patient information
Patient ________________ is your right to decide when, how, and to what extent others may access your health information
The privacy rule all healthcare workers must abide by
PHI stands for__________________ ________________ Information
A provider must post the notice of privacy practices in a clear and ______________-to-find location where patients are able to see it
The state of keeping or being kept secret or private
This must be signed by the patient in order to receive a copy of their medical records
Must be included when sending PHI via fax
An act of breaking or failing to observe a law, agreement, or code of conduct
The action or act of complying with rules and standards
This is a digital version of medical records
fraud and abuse
We wear these for protection
Requires part 1 and part 2
Dr Wilhelm ____________
Our suits of armour
Performed with SLP
Exam performed for parotid stones
A Barium Throne
Our first digital room
Raised part on a bone where muscle is attached
Our governing body
An unwanted foreign object or visualization on your image-something that should not be there
Head to Toe development
Development in an outward direction
What children are expected to be able to do at a certain age
Development using muscles in arms and legs
Picking up small items is an example of _________ development
Child from birth to age one
One or two year old child
acronym for developmental domains
development involving the gain/retention of knowledge
An example of approaches to learning
The way we relate to others
development that involves understanding and expressing feelings
The understanding that words are related to print is one aspect of this development.
Assistance for building on previous knowledge
Vygotsky's space between "I can't" and "I can"
Common workplace ethic of respecting others and working well together.
Federal laws that provide protection from retribution against someone for reporting a suspected violation.
The capacity to do what is right even in the face of temptation to do otherwise.
Taking another’s property or money by a person to whom it has been entrusted.
When one obtains money or property by lying about a past or existing fact. False
Offering or giving anything of value to get or keep business or to influence performance of an official.
Obtaining money or other property by wrongful use of force or the power of office.
The duty of a business to contribute to the wellbeing of society. Social
An employee who speaks out about misconduct, malpractice, or corruption.
Set of standards or rules that guide business behavior in a positive direction. Code of
A person’s personal philosophies about what is right or wrong.
Use of confidential corporate information to buy or sell stocks. Insider
Deliberate deception to gain an unlawful advantage.
Crime against the environment. Green
Economic crimes committed by professionals in the course of their work. White Collar
Hiding money obtained illegally by putting it in legal businesses. Money
Negative or unfair treatment based on personal characteristics rather than job performance, skills, or merit.
Unwelcome conduct from another whose actions, communication, or behavior mocks, demeans, disparages, or ridicules an employee.
Sentenced to 150 years in prison for largest Ponzi scheme in history.
Its use poses a potential conflict between employees' rights to express themselves and an organization's need to preserve its reputation, intellectual property, and information its legally obligated to protect. Social
Responsible for making ethical choices to maintain our company's reputation for fair, honest business practices.
The set of measures taken to ensure that networks, systems, & data breaches are avoided.
A lifestyle influencer who served 5 months in federal prison and paid fines of treble damages in connection to allegations of insider trading. Martha
An unauthorized person viewing confidential data is an example of a reportable _______ incident.
encryption that has two key differences
key to secure messaging
communication between two parties has been overheard by someone
services or data become unavailable, unusable or destroyed
unauthorized changing of data or tampering with a service
additional data or activities are generated
transform data to maintain confidentiality and integrity
verify the claimed identity of a user, client or server
verify the requested action is permitted
useful for analysis of a breach and tracking attackers
requiring correct permission to perform an action
list of those with access (acronym)
a collection of permissions assigned to one type of user
the right to perform one action
one of several security mechanisms working together
TLS spelled out
remote procedure call in short
one easy way to design better security
when security features should be addressed in development lifecycle
how to read encrypted messages
sharing one key
how you get a ticket
common network protection at the edge
allows code from known source to be trusted
most widely used system to get the secrets
how an authority takes away past trust
way to check to see if only one bit is set
temporararily loan your access rights
sent as part of a challenge, prevents replay attacks
feature that allows access without logging in repeatedly
last but perhaps most important system concern
gateway that filters traffic and executable code
key to getting a response
ensuring the message was not modified
Something that shows up in a email
Hard to detect both by Users
Identity and Privacy Protection
Someone attempting to create Identity fraud
A security mechanism prohibiting the execution of those programs on a known malicious or undesired list of software
The occurrence of disclosure of confidential information, access to confidential information, destruction of data assets or abusive use of a private IT environment. Generally, a data breach results in internal data being made accessible to external entities without authorization.
A security tool, which may be a hardware or software solution that is used to filter network traffic.
A form of identity theft in which a transaction, typically financial, is performed using the stolen identity of another individual. The fraud is due to the attacker impersonating someone else.
he likelihood or potential that an employee or another form of internal personnel may pose a risk to the stability or security of an organization
Any code written for the specific purpose of causing harm, disclosing information or otherwise violating the security or stability of a system. Malware includes a wide range of types of malicious programs including: virus, worm, Trojan horse, logic bomb, backdoor, Remote Access Trojan (RAT), rootkit, ransomware and spyware/adware.
The likelihood or potential that an outside entity, such as an ex-employee, competitor or even an unhappy customer, may pose a risk to the stability or security of an organization. An outsider must often gain logical or physical access to the target before launching malicious attacks.
A form of unwanted or unsolicited messages or communications typically received via e-mail but also occurring through text messaging, social networks or VoIP. Most SPAM is advertising, but some may include malicious code, malicious hyperlinks or malicious attachments.
A form of malware that often attaches itself to a host file or the MBR (Master Boot Record) as a parasite. When the host file or MBR is accessed, it activates the virus enabling it to infect other objects. Most viruses spread through human activity within and between computers
a dishonest scheme; a fraud.
The act of falsifying the identity of the source of a communication or interaction. It is possible to spoof IP address, MAC address and email address.
A form of malware that monitors user activities and reports them to an external their party. Spyware can be legitimate in that it is operated by an advertising and marketing agency for the purpose of gathering customer demographics. However, spyware can also be operated by attackers using the data gathering tool to steal an identity or learn enough about a victim to harm them in other ways.
An attack focusing on people rather than technology
Alerts used as a warning of danger.
an attempt by hackers to damage or destroy a computer network or system.
a specific aspect of broader concepts such as cybersecurity and computer security, being focused on the specific threats and .
the ultimate call control center that gives customers full control of all T-Mobile's scam protection options.
Malware is defined as any device software that aims to cause damage and steal data. Malware is an abbreviation for malicious software. Ransomware and trojan, for example, are types of malware widely used in email attacks
The correct disinfectant for Clostridium Dificile is a sporicidal, bactericidal, or viricidal disinfectant.
Equipment being brought into the OR should be damp dusted with a regulatory agency-approved hospital-grade disinfectant: prior (to) or after being brought into the OR
Start at the cleanest or the dirtiest area when cleaning?
Before opening the first case of the day damp dust all horizontal, vertical, or necessary surfaces using a regulatory agency approved hospital-grade disinfectant.
When mopping the OR, use a clean mop head for: every-room, second-room, third-room.
Some equipment, such as computer monitors, can be damaged and must be cleaned and disinfected per manufacturer’s instructions and recommended detergent/disinfectant. TRUTH/FALSE?
Rooms should be terminally cleaned every 24 hours even if they have not been ____________.
When cleaning cabinets, it is correct to clean from: top-to-bottom, or bottom-to-top?
Ceilings in the OR are cleaned every24hrs or onschedule
A terminal cleaning of the OR involves cleaning all surfaces of the OR using mechanical friction, a clean lint free cloth, and a regulatory agency approved hospital-grade _______________.
When using the zone cleaning method for terminal cleaning: Divide up the room into zones. Assign __________ staff members to clean and disinfect each zone.
Casters of mobile furniture are cleaned at: starts of day or ending of day