Quiz-summary
0 of 10 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
Information
Premium Practice Questions
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 10 questions answered correctly
Your time:
Time has elapsed
Categories
- Not categorized 0%
Unlock Your Full Report
You missed {missed_count} questions. Enter your email to see exactly which ones you got wrong and read the detailed explanations.
Submit to instantly unlock detailed explanations for every question.
Success! Your results are now unlocked. You can see the correct answers and detailed explanations below.
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- Answered
- Review
-
Question 1 of 10
1. Question
Which description best captures the essence of Process Improvement Methodologies (Lean, Six Sigma) for Registered Health Information Administrator (RHIA) when addressing a high rate of duplicate records in the Master Patient Index (MPI)?
Correct
Correct: Six Sigma is a data-driven methodology focused on reducing variation and defects, which in this scenario refers to the creation of duplicate records. Lean focuses on efficiency and the elimination of waste (Muda), such as unnecessary or redundant steps in the registration process that lead to errors. By combining these, an RHIA can streamline the workflow and ensure data integrity through standardized, low-variance processes.
Incorrect: Increasing complexity and requiring manual audits for every record contradicts Lean’s goal of eliminating waste and Six Sigma’s goal of building quality into the process itself. Prioritizing speed over accuracy is a violation of fundamental health information management principles regarding data integrity. Eliminating all human intervention is not a realistic or primary goal of these methodologies in a clinical data context, and focusing exclusively on reimbursement ignores the broader scope of information governance.
Takeaway: Lean and Six Sigma work together to improve health information quality by removing process waste and reducing the statistical variation that leads to data errors.
Incorrect
Correct: Six Sigma is a data-driven methodology focused on reducing variation and defects, which in this scenario refers to the creation of duplicate records. Lean focuses on efficiency and the elimination of waste (Muda), such as unnecessary or redundant steps in the registration process that lead to errors. By combining these, an RHIA can streamline the workflow and ensure data integrity through standardized, low-variance processes.
Incorrect: Increasing complexity and requiring manual audits for every record contradicts Lean’s goal of eliminating waste and Six Sigma’s goal of building quality into the process itself. Prioritizing speed over accuracy is a violation of fundamental health information management principles regarding data integrity. Eliminating all human intervention is not a realistic or primary goal of these methodologies in a clinical data context, and focusing exclusively on reimbursement ignores the broader scope of information governance.
Takeaway: Lean and Six Sigma work together to improve health information quality by removing process waste and reducing the statistical variation that leads to data errors.
-
Question 2 of 10
2. Question
Which preventive measure is most critical when handling CPT and HCPCS Coding? In a facility where outpatient surgical claims are frequently flagged for potential unbundling, the Health Information Management (HIM) department must evaluate its data integrity protocols. To ensure that the facility remains compliant with the National Correct Coding Initiative (NCCI) while maintaining accurate data for health information exchange, which strategy should be prioritized?
Correct
Correct: Implementing a robust internal auditing program that utilizes NCCI edits is the most critical preventive measure because it proactively identifies procedure-to-procedure (PTP) code pairs that should not be reported together. This ensures data integrity and compliance with CMS regulations by preventing unbundling—the practice of using multiple codes for components of a procedure that are covered by a single comprehensive code.
Incorrect: Relying solely on automated encoder software for modifier application is insufficient because modifiers often require clinical judgment and specific documentation support that software may misinterpret. Selecting comprehensive CPT codes while ignoring specific HCPCS Level II codes can lead to inaccurate data reporting and loss of reimbursement for specific supplies. Retrospective reviews of only high-dollar claims is a reactive rather than preventive strategy and fails to address systemic coding errors across all claim types, leaving the facility vulnerable to compliance audits.
Takeaway: Proactive internal auditing using NCCI edits is essential for maintaining data integrity and preventing compliance risks such as unbundling in outpatient coding.
Incorrect
Correct: Implementing a robust internal auditing program that utilizes NCCI edits is the most critical preventive measure because it proactively identifies procedure-to-procedure (PTP) code pairs that should not be reported together. This ensures data integrity and compliance with CMS regulations by preventing unbundling—the practice of using multiple codes for components of a procedure that are covered by a single comprehensive code.
Incorrect: Relying solely on automated encoder software for modifier application is insufficient because modifiers often require clinical judgment and specific documentation support that software may misinterpret. Selecting comprehensive CPT codes while ignoring specific HCPCS Level II codes can lead to inaccurate data reporting and loss of reimbursement for specific supplies. Retrospective reviews of only high-dollar claims is a reactive rather than preventive strategy and fails to address systemic coding errors across all claim types, leaving the facility vulnerable to compliance audits.
Takeaway: Proactive internal auditing using NCCI edits is essential for maintaining data integrity and preventing compliance risks such as unbundling in outpatient coding.
-
Question 3 of 10
3. Question
The risk manager at an investment firm is tasked with addressing Mobile Health (mHealth) Applications during control testing. After reviewing a transaction monitoring alert, the key concern is that a health-tech subsidiary’s mobile platform allows for the ingestion of patient-generated health data (PGHD) into a centralized Health Information Exchange (HIE) without a validated identity proofing process for the mobile users. This lack of verification occurs during the initial account setup on the mobile device. The firm must determine how this vulnerability impacts the long-term reliability of the patient data stored within the integrated health system. Which of the following represents the most critical risk to the integrity of the health record and the Master Patient Index (MPI)?
Correct
Correct: In health information management, identity proofing is a foundational control for data integrity. Without it, there is a high risk of identity overlay, where data from one individual is incorrectly attached to another patient’s record. This directly undermines the Master Patient Index (MPI), which is the primary tool for ensuring that each patient is uniquely identified and linked to their correct health information across the enterprise.
Incorrect: The failure to encrypt data at rest is a concern under the HIPAA Security Rule, not the Privacy Rule, and encryption is distinct from anonymization. HL7 FHIR standards focus on the technical and structural framework for exchanging data but do not mandate a specific clinical review process for the ingestion of patient-generated data. While digital signatures can support non-repudiation, the HIPAA Security Rule does not specifically mandate a digital signature for every individual data packet transmitted from a mobile device.
Takeaway: Robust identity proofing at the point of data entry is essential in mHealth to prevent identity overlays and maintain the integrity of the Master Patient Index.
Incorrect
Correct: In health information management, identity proofing is a foundational control for data integrity. Without it, there is a high risk of identity overlay, where data from one individual is incorrectly attached to another patient’s record. This directly undermines the Master Patient Index (MPI), which is the primary tool for ensuring that each patient is uniquely identified and linked to their correct health information across the enterprise.
Incorrect: The failure to encrypt data at rest is a concern under the HIPAA Security Rule, not the Privacy Rule, and encryption is distinct from anonymization. HL7 FHIR standards focus on the technical and structural framework for exchanging data but do not mandate a specific clinical review process for the ingestion of patient-generated data. While digital signatures can support non-repudiation, the HIPAA Security Rule does not specifically mandate a digital signature for every individual data packet transmitted from a mobile device.
Takeaway: Robust identity proofing at the point of data entry is essential in mHealth to prevent identity overlays and maintain the integrity of the Master Patient Index.
-
Question 4 of 10
4. Question
The monitoring system at a listed company has flagged an anomaly related to Healthcare Compliance and Regulatory Environment during gifts and entertainment. Investigation reveals that a vendor representative provided several high-value educational dinners to a group of physicians who serve on the hospital’s Pharmacy and Therapeutics (P&T) Committee. These events occurred within a six-month window while the committee was reviewing the vendor’s new cardiovascular drug for inclusion in the hospital’s formulary, and internal records show the physician attendees did not provide any documented consulting services in exchange for the meals. Which federal regulation is most directly implicated by this scenario, requiring the compliance officer to assess if the meals constitute an illegal inducement?
Correct
Correct: The Anti-Kickback Statute (AKS) is a criminal law that prohibits the knowing and willful payment of remuneration to induce or reward patient referrals or the generation of business involving any item or service payable by the Federal healthcare programs (e.g., Medicare, Medicaid). Remuneration includes anything of value, such as high-value meals or entertainment. In this scenario, providing meals to committee members who influence the hospital’s drug formulary can be interpreted as an illegal inducement to ensure the vendor’s product is selected for use.
Incorrect: The HIPAA Privacy Rule is incorrect because it focuses on the protection and privacy of patient health information, which is not the issue in a vendor-physician gift scenario. The Stark Law is incorrect because it specifically prohibits physicians from referring patients for designated health services to an entity with which the physician (or an immediate family member) has a financial relationship; while related, the AKS is the broader and more direct statute governing inducements for purchasing decisions like formulary inclusion. The HITECH Act is incorrect as it primarily addresses the promotion and meaningful use of health information technology and strengthens HIPAA enforcement, rather than regulating corporate kickbacks.
Takeaway: The Anti-Kickback Statute prohibits providing any form of remuneration intended to induce the purchase, recommendation, or referral of items or services covered by federal healthcare programs.
Incorrect
Correct: The Anti-Kickback Statute (AKS) is a criminal law that prohibits the knowing and willful payment of remuneration to induce or reward patient referrals or the generation of business involving any item or service payable by the Federal healthcare programs (e.g., Medicare, Medicaid). Remuneration includes anything of value, such as high-value meals or entertainment. In this scenario, providing meals to committee members who influence the hospital’s drug formulary can be interpreted as an illegal inducement to ensure the vendor’s product is selected for use.
Incorrect: The HIPAA Privacy Rule is incorrect because it focuses on the protection and privacy of patient health information, which is not the issue in a vendor-physician gift scenario. The Stark Law is incorrect because it specifically prohibits physicians from referring patients for designated health services to an entity with which the physician (or an immediate family member) has a financial relationship; while related, the AKS is the broader and more direct statute governing inducements for purchasing decisions like formulary inclusion. The HITECH Act is incorrect as it primarily addresses the promotion and meaningful use of health information technology and strengthens HIPAA enforcement, rather than regulating corporate kickbacks.
Takeaway: The Anti-Kickback Statute prohibits providing any form of remuneration intended to induce the purchase, recommendation, or referral of items or services covered by federal healthcare programs.
-
Question 5 of 10
5. Question
In your capacity as privacy officer at an insurer, you are handling HIPAA and HITECH Act during complaints handling. A colleague forwards you a whistleblower report showing that a senior claims adjuster has been systematically accessing the electronic health records of several high-profile public figures over the last 18 months without a valid business reason. An internal audit log confirms that the records of 600 individuals residing in a single metropolitan area were accessed. You must now determine the organization’s legal obligations regarding the timing and scope of the required notifications. Which of the following actions is required to maintain compliance with the HITECH Act Breach Notification Rule?
Correct
Correct: Under the HITECH Act and the HIPAA Breach Notification Rule, if a breach affects 500 or more individuals in a single state or jurisdiction, the covered entity must notify the affected individuals, the Secretary of Health and Human Services (HHS), and prominent media outlets. These notifications must be made without unreasonable delay and no later than 60 calendar days after the discovery of the breach. A risk assessment is typically performed to determine if there is a low probability that the PHI has been compromised, but in cases of clear unauthorized access, the notification clock begins upon discovery.
Incorrect: Waiting until the end of the calendar year to notify the Secretary of HHS is only permissible for breaches involving fewer than 500 individuals. Media notification is mandatory for breaches affecting more than 500 individuals in a jurisdiction, not 1,000. While the Office for Civil Rights (OCR) is the enforcement arm of HHS, the 60-day deadline is the maximum allowable time for all required notifications, and individual notifications cannot be indefinitely deferred for a forensic audit if the breach has already been confirmed.
Takeaway: Breaches affecting 500 or more individuals require notification to the individuals, the Secretary of HHS, and the media within 60 days of discovery.
Incorrect
Correct: Under the HITECH Act and the HIPAA Breach Notification Rule, if a breach affects 500 or more individuals in a single state or jurisdiction, the covered entity must notify the affected individuals, the Secretary of Health and Human Services (HHS), and prominent media outlets. These notifications must be made without unreasonable delay and no later than 60 calendar days after the discovery of the breach. A risk assessment is typically performed to determine if there is a low probability that the PHI has been compromised, but in cases of clear unauthorized access, the notification clock begins upon discovery.
Incorrect: Waiting until the end of the calendar year to notify the Secretary of HHS is only permissible for breaches involving fewer than 500 individuals. Media notification is mandatory for breaches affecting more than 500 individuals in a jurisdiction, not 1,000. While the Office for Civil Rights (OCR) is the enforcement arm of HHS, the 60-day deadline is the maximum allowable time for all required notifications, and individual notifications cannot be indefinitely deferred for a forensic audit if the breach has already been confirmed.
Takeaway: Breaches affecting 500 or more individuals require notification to the individuals, the Secretary of HHS, and the media within 60 days of discovery.
-
Question 6 of 10
6. Question
A gap analysis conducted at an investment firm regarding Electronic Medical Record (EMR) Systems as part of data protection concluded that the healthcare subsidiary’s current documentation practices failed to maintain a permanent record of clinical amendments. During a review of records from the last 12-month period, it was noted that the system’s default configuration allowed clinicians to overwrite original observations without preserving the initial entry. To align with Information Governance (IG) principles and HIPAA requirements for data integrity, the Health Information Management (HIM) professional must address this deficiency. Which action is most appropriate to ensure the legal health record remains defensible?
Correct
Correct: Maintaining data integrity requires that the original entry, any subsequent amendments, the identity of the individual making the change, and the timestamp are all preserved. Under HIPAA and Information Governance frameworks, the legal health record must be able to show the evolution of clinical decision-making. Versioning and metadata tracking ensure that the audit trail is complete and that the record is legally defensible in the event of litigation or an audit.
Incorrect: Printing hard copies is an inefficient manual workaround that does not address the underlying technical failure of the EMR’s data integrity controls. Data masking in a non-indexed database makes the information nearly impossible to retrieve for legal or clinical purposes, failing the availability and integrity requirements. Locking records immediately upon the first save prevents legitimate clinical corrections and amendments, which are necessary for accurate patient care and clinical documentation improvement.
Takeaway: A legally defensible EMR must utilize version control and metadata to preserve a complete, time-stamped audit trail of all clinical documentation amendments.
Incorrect
Correct: Maintaining data integrity requires that the original entry, any subsequent amendments, the identity of the individual making the change, and the timestamp are all preserved. Under HIPAA and Information Governance frameworks, the legal health record must be able to show the evolution of clinical decision-making. Versioning and metadata tracking ensure that the audit trail is complete and that the record is legally defensible in the event of litigation or an audit.
Incorrect: Printing hard copies is an inefficient manual workaround that does not address the underlying technical failure of the EMR’s data integrity controls. Data masking in a non-indexed database makes the information nearly impossible to retrieve for legal or clinical purposes, failing the availability and integrity requirements. Locking records immediately upon the first save prevents legitimate clinical corrections and amendments, which are necessary for accurate patient care and clinical documentation improvement.
Takeaway: A legally defensible EMR must utilize version control and metadata to preserve a complete, time-stamped audit trail of all clinical documentation amendments.
-
Question 7 of 10
7. Question
A transaction monitoring alert at a broker-dealer has triggered regarding Radiology Information Systems (RIS) during sanctions screening. The alert details show that a significant discrepancy exists between the patient demographic data stored in the RIS and the organization’s Master Patient Index (MPI) following a recent system upgrade. This mismatch has affected approximately 15% of the records processed over the last 48 hours, leading to concerns regarding data integrity and the accuracy of health information exchange. As the Health Information Administrator, which of the following actions should be prioritized to resolve the data synchronization issue and ensure long-term interoperability?
Correct
Correct: The most effective way to address systemic data discrepancies between two healthcare IT systems like a Radiology Information System (RIS) and a Master Patient Index (MPI) is to examine the interface that connects them. HL7 (Health Level Seven) is the standard protocol for exchanging information between such systems. If the data is inconsistent following an upgrade, the mapping logic within the interface engine is the most likely point of failure. Correcting the mapping ensures that data flows accurately and maintains integrity across the enterprise without manual intervention.
Incorrect: Manual reconciliation is a reactive measure that addresses the symptoms rather than the cause, leading to high labor costs and the potential for further human error. Data warehousing is a tool for analysis and reporting but does not solve real-time interoperability or data integrity issues between operational systems. Requiring double-entry of data is inefficient, increases the risk of typographical errors, and contradicts the principles of data standardization and the ‘collect once, use many’ philosophy of information governance.
Takeaway: Ensuring data integrity between disparate systems like the RIS and MPI requires technical validation of HL7 interface mappings to maintain automated and accurate health information exchange.
Incorrect
Correct: The most effective way to address systemic data discrepancies between two healthcare IT systems like a Radiology Information System (RIS) and a Master Patient Index (MPI) is to examine the interface that connects them. HL7 (Health Level Seven) is the standard protocol for exchanging information between such systems. If the data is inconsistent following an upgrade, the mapping logic within the interface engine is the most likely point of failure. Correcting the mapping ensures that data flows accurately and maintains integrity across the enterprise without manual intervention.
Incorrect: Manual reconciliation is a reactive measure that addresses the symptoms rather than the cause, leading to high labor costs and the potential for further human error. Data warehousing is a tool for analysis and reporting but does not solve real-time interoperability or data integrity issues between operational systems. Requiring double-entry of data is inefficient, increases the risk of typographical errors, and contradicts the principles of data standardization and the ‘collect once, use many’ philosophy of information governance.
Takeaway: Ensuring data integrity between disparate systems like the RIS and MPI requires technical validation of HL7 interface mappings to maintain automated and accurate health information exchange.
-
Question 8 of 10
8. Question
The risk committee at a credit union is debating standards for Auditing and Monitoring for Compliance as part of outsourcing. The central issue is that the credit union manages Health Savings Accounts (HSAs) that involve the storage and transmission of protected health information (PHI). To meet regulatory requirements, the committee must implement a monitoring strategy for their new third-party data processor within a 90-day implementation window. Which approach should the Registered Health Information Administrator (RHIA) propose to ensure the vendor maintains data integrity and HIPAA compliance?
Correct
Correct: Implementing a routine monitoring program that includes both automated validation and manual log audits is the most robust approach. It aligns with HIPAA’s Administrative Safeguards, which require regular review of information system activity, such as audit logs and access reports, to ensure that data integrity is maintained and unauthorized access is detected promptly. This proactive approach allows the RHIA to verify that the vendor is actually following the required security protocols rather than just promising to do so.
Incorrect: Relying on a SOC 2 Type II report provides a high-level overview of controls but often lacks the specific, granular health data validation and real-time monitoring required for HIPAA compliance. Quarterly self-assessments are subjective and lack independent verification of the vendor’s actual practices, making them insufficient for high-risk data. Focusing solely on physical security and server room logs ignores the significant risks associated with logical access, data transmission, and software-level data integrity which are critical in a cloud-based or outsourced environment.
Takeaway: Effective compliance monitoring for outsourced health data requires a proactive combination of technical data validation and regular reviews of information system activity logs.
Incorrect
Correct: Implementing a routine monitoring program that includes both automated validation and manual log audits is the most robust approach. It aligns with HIPAA’s Administrative Safeguards, which require regular review of information system activity, such as audit logs and access reports, to ensure that data integrity is maintained and unauthorized access is detected promptly. This proactive approach allows the RHIA to verify that the vendor is actually following the required security protocols rather than just promising to do so.
Incorrect: Relying on a SOC 2 Type II report provides a high-level overview of controls but often lacks the specific, granular health data validation and real-time monitoring required for HIPAA compliance. Quarterly self-assessments are subjective and lack independent verification of the vendor’s actual practices, making them insufficient for high-risk data. Focusing solely on physical security and server room logs ignores the significant risks associated with logical access, data transmission, and software-level data integrity which are critical in a cloud-based or outsourced environment.
Takeaway: Effective compliance monitoring for outsourced health data requires a proactive combination of technical data validation and regular reviews of information system activity logs.
-
Question 9 of 10
9. Question
What is the most precise interpretation of Fraud, Waste, and Abuse Detection for Registered Health Information Administrator (RHIA) when distinguishing between these categories during a retrospective clinical documentation improvement (CDI) audit? A large healthcare system is implementing a new data auditing program to address potential billing irregularities. The RHIA is tasked with defining the scope of ‘Abuse’ within the context of their internal monitoring policies to distinguish it from ‘Fraud’ and ‘Waste’.
Correct
Correct: Abuse describes practices that, either directly or indirectly, result in unnecessary costs to the Medicare program (or other payers). It includes any practice that is not consistent with the goals of providing patients with services that are medically necessary, meet professionally recognized standards for healthcare, and are fairly priced. Unlike fraud, abuse does not require proof of intent to misrepresent or deceive.
Incorrect: The definition involving intentional submission of false information describes fraud, which is distinguished from abuse by the presence of ‘knowing’ or ‘willful’ intent. The definition focusing on inefficient use of resources and administrative redundancies describes waste, which is the overutilization of services not caused by criminal negligence or intent. The definition regarding HIPAA Privacy Rule violations describes a security or privacy breach, which is a separate compliance domain from financial fraud, waste, and abuse.
Takeaway: The primary differentiator between fraud and abuse is the element of intent, while waste focuses on the inefficient use of resources rather than specific billing or medical necessity violations.
Incorrect
Correct: Abuse describes practices that, either directly or indirectly, result in unnecessary costs to the Medicare program (or other payers). It includes any practice that is not consistent with the goals of providing patients with services that are medically necessary, meet professionally recognized standards for healthcare, and are fairly priced. Unlike fraud, abuse does not require proof of intent to misrepresent or deceive.
Incorrect: The definition involving intentional submission of false information describes fraud, which is distinguished from abuse by the presence of ‘knowing’ or ‘willful’ intent. The definition focusing on inefficient use of resources and administrative redundancies describes waste, which is the overutilization of services not caused by criminal negligence or intent. The definition regarding HIPAA Privacy Rule violations describes a security or privacy breach, which is a separate compliance domain from financial fraud, waste, and abuse.
Takeaway: The primary differentiator between fraud and abuse is the element of intent, while waste focuses on the inefficient use of resources rather than specific billing or medical necessity violations.
-
Question 10 of 10
10. Question
A whistleblower report received by a fintech lender alleges issues with Telehealth and Remote Monitoring Technologies during record-keeping. The allegation claims that the organization’s remote patient monitoring (RPM) platform, which integrates with their health-focused lending arm, has been failing to maintain a consistent audit trail for data transmitted from wearable devices. Specifically, over the last 18 months, data packets containing vital signs were being merged into the Electronic Health Record (EHR) without unique device identifiers or timestamps that reflect the actual time of capture versus the time of upload. As the Registered Health Information Administrator (RHIA) tasked with investigating this, which of the following represents the primary risk to data integrity and information governance?
Correct
Correct: In health information management, data integrity relies heavily on data provenance—the ability to trace the origin, changes, and timeline of data. Without unique device identifiers and accurate timestamps (distinguishing between capture and upload), the reliability of the health record is undermined. This metadata is essential for ensuring that clinical decisions are based on accurate chronological data and that the record can withstand legal scrutiny during discovery.
Incorrect: The failure to encrypt data in motion is a concern, but the scenario specifically describes an audit trail and metadata issue, not an encryption failure; furthermore, transmission involves data in motion rather than data at rest. The Minimum Necessary standard refers to the amount of protected health information (PHI) disclosed to a third party, not the technical accuracy or metadata of the internal record. While MPI and FHIR standards are important for interoperability, they do not address the fundamental data integrity risk posed by the loss of temporal accuracy and device-specific provenance described in the report.
Takeaway: Maintaining data provenance through metadata and unique identifiers is critical for the integrity, reliability, and legal defensibility of remote monitoring data within a health information system.
Incorrect
Correct: In health information management, data integrity relies heavily on data provenance—the ability to trace the origin, changes, and timeline of data. Without unique device identifiers and accurate timestamps (distinguishing between capture and upload), the reliability of the health record is undermined. This metadata is essential for ensuring that clinical decisions are based on accurate chronological data and that the record can withstand legal scrutiny during discovery.
Incorrect: The failure to encrypt data in motion is a concern, but the scenario specifically describes an audit trail and metadata issue, not an encryption failure; furthermore, transmission involves data in motion rather than data at rest. The Minimum Necessary standard refers to the amount of protected health information (PHI) disclosed to a third party, not the technical accuracy or metadata of the internal record. While MPI and FHIR standards are important for interoperability, they do not address the fundamental data integrity risk posed by the loss of temporal accuracy and device-specific provenance described in the report.
Takeaway: Maintaining data provenance through metadata and unique identifiers is critical for the integrity, reliability, and legal defensibility of remote monitoring data within a health information system.