Health Careers - Chapter 12 Terms.

Card Set Information

Health Careers - Chapter 12 Terms.
2012-01-23 22:24:13
Chapter 12 Terms Health Careers

Health Careers - Chapter 12 Terms.
Show Answers:

  1. adware
    may display unwanted pop-up advertisements on your monitor; it may be related to the sites you search on the web or even the content of your email
  2. biometric keyboards
    a keyboard that can identify a typist by fingerprints
  3. biometric methods
    ways of identifying a user by some physical characteristic; include fingerprints, hand prints, retina or iris scans, lip prints, facial termography, and body odor sensors.
  4. body odor sensors
    a biometric device enabling the identification os user by odor
  5. codes of conduct
  6. data accuracy
    correstness and currency of information
  7. database
    a large organized collection of information that is easy to maintain, search, and sort
  8. DNA (deoxyribonucleic acid)
    a nucleic acid molecule containing genetic instrctions for living things
  9. Electronic communications Privacy Act of 1986
    prohibits government agencies from intercepting electronic communctions without a search warrant. It also prohibits indiviuals from intercepting email. However, there are n umerous expetions, and the courts have interpreted this to allow employers to access employees email. This law does not apply to communications within an organization.
  10. encryption
    used to protect information from unauthorized users; involves encoding of messages.
  11. facial structure scans
    a biometric method that identifies users by facial structure
  12. facial thermography
    a biometric method that identifies users by the heat generated by their faces
  13. Fair Credit Reporting Act of 1970
    a federal low that regulates credit agencies; it allows you to see your credit reports to check the accuracy of information and to challenge inaccuracies
  14. fingerprints
    biometric method of identification
  15. firewalls
    software used to protect LANs from unathorized access through the Internet
  16. fraud
    includes such crimes as using a computer program to illegally transfer money from one bank account to another or printing payroll checks to oneself.
  17. fraudulent dialer
    can connect the user with numbers without the users knowlege; the dialer may connect the users computer to an expensive 900 number. The user will be toally unaware until he or she recives the telephone bill
  18. hackers
    a proficient computer user without authorized access to systems
  19. Health Insurance Portability and Accountabllity Act (HIPAA)
    In 1996 Congress passed the Health Insurance Porablitity and Accountablity Act (HIPAA). Guidelines to protect electronic medical records were developed by the department of health and human services. by encouraging the use of the electronic medical record and facilitating the shsaring of medical records among health care providers, it can assure continuity of care and thus save lives.
  20. Homeland Security Act
    expands and centralizes the data gathering allowed under the patriot act
  21. identity theft
    involves someone using your private information to assume your identity
  22. iris scans
    a biometric method of identification used to restrict access to computers.
  23. keylogging
    can be used by anyone to track anyones else's keystokes
  24. lip prints
    biometric method of identification used to restrict access to computers
  25. malware
    includes different forms of malicious hardware, software and firmware
  26. medical information bureau
    composed of 650 insurance companies. Its database contains health histories of 15 million people; used by medical insuraers to help determine insurance rates and where to grant or deny someone medical coverage; not protected by doctor-patient privilege and, at present, not protect by any federal law; may be available to your employer without your consent.
  27. passwords
    a secret code assigned to (or chosen by) an authorized user
  28. personal identification numbers (PINs)
    a secret code assigned to (or chosen by) an authorized user
  29. privacy
    the ability to control personal information and the right to keep it from misuse
  30. Real ID act of 2005
    directly imposes prescriptive federl drivers license standards by the federal government on the states. This low requires every American to have an electronic identification card
  31. retina scans
    a biometric method of identifying users
  32. security
    measures attempting to protect computer systerms (including hardware, software and information) from harm and abuse; the threarts may stem from many sources including natural disaster, human error or crime
  33. software piracy
    unauthorized copying of copyrighted software
  34. spybot search and destroy software
    can remove malware, adware, spyware, fraudulent dialers, and keyloggers from your computer
  35. spyware
    software that can be installed without the users knowledge to track their actions on a computer
  36. theft of information
    unauthorized access to use of informaition
  37. theft of services
    unauthorized use of services such as cable TV
  38. USA patriot act (2001)
    gives laow enforcement agencies greater power to monitor electronic and ot her communications, with fewere checks.
  39. verichips
    radio transmitters that give off a unique signal, which can be read by a receiver
  40. viruses
    a program, attached to another file, which replicates itself and may do damage to your computer system
  41. voice recognition