Filters
Question type

Study Flashcards

Identify the choice that best completes the statement or answers the question. -Keeping e-PHI secure includes which of the following?


A) The HIPAA Security Officer places limits on what information is viewed by Business Associates determined by their job description.
B) Policies and procedures are written to protect against unlawful access by administration.
C) Changing the passwords for computer access every 30 days.
D) Safeguards are in place to protect e-PHI against unauthorized access or loss.

Correct Answer

verifed

verified

Requirements that are identified as "addressable" under the Security Rule may be omitted by the Security Officer.

Correct Answer

verifed

verified

Identify the choice that best completes the statement or answers the question. -HIPAA Security Rule applies to data contained in


A) unrecorded video teleconferencing.
B) any computer storage media.
C) voicemail messages.
D) paper-to-paper faxes.

Correct Answer

verifed

verified

Identify the choice that best completes the statement or answers the question. -Investigation of complaints of violations to the Security Rule are under the direction of the


A) Department of Justice.
B) Department of Health and Human Services.
C) Office of HIPAA Standards.
D) Office of Inspector General.

Correct Answer

verifed

verified

Identify the choice that best completes the statement or answers the question. -Responsibilities of the HIPAA Security Officer include


A) making recommendations for new computers and seeing that they are configured to ensure secure e-PHI.
B) developing and implementing policies and procedures for the facility.
C) overseeing the training of new doctors and the retraining of all doctors on a regular basis.
D) reviewing the Notice of Privacy Practices for the facility and keeping them up to date.

Correct Answer

verifed

verified

Identify the choice that best completes the statement or answers the question. -The Administrative Safeguards mandated by HIPAA include which of the following?


A) Unique health plan identifiers
B) Workforce security training
C) Evaluation of computer security effectiveness
D) Sanctions for unauthorized disclosures

Correct Answer

verifed

verified

Match the HIPAA term with the correct definition. -An ongoing process that considers the risk to electronic information and the data itself to determine if there is adequate security for the system to keep exposure to loss or alteration of PHI to a minimum.


A) Risk management
B) Gap analysis
C) Risk analysis
D) Security management

Correct Answer

verifed

verified

The Office of HIPAA Standards may not initiate an investigation without receiving a formal complaint.

Correct Answer

verifed

verified

Identify the choice that best completes the statement or answers the question. -Telemedicine videoconference tapes are


A) never covered by HIPAA Security Rule.
B) covered by HIPAA Security Rule if they are not erased after the physician's report is signed.
C) covered by HIPAA Security Rule only if the patient has not signed a consent form.
D) not covered by HIPAA Security Rule if used to train medical students.

Correct Answer

verifed

verified

Match the item that is addressed under the Security Rule with the correct area of safeguards. -contingency plan or business continuity plan


A) Administrative safeguards
B) Physical safeguards
C) Technical safeguards

Correct Answer

verifed

verified

Closed circuit cameras are mandated by HIPAA Security Rule.

Correct Answer

verifed

verified

Identify the choice that best completes the statement or answers the question. -Record of HIPAA training is to be maintained by a health care provider for


A) 4 years.
B) 6 years.
C) 7 years.
D) an indefinite time.

Correct Answer

verifed

verified

Identify the choice that best completes the statement or answers the question. -The act of changing readable text into a vast series of "garbled" characters using complex mathematical algorithms is called


A) decoded messages.
B) transmission architecture.
C) HIPAA protocol.
D) encryption.

Correct Answer

verifed

verified

Showing 41 - 53 of 53

Related Exams

Show Answer