HIPAA Training

25 July 2022
4.7 (114 reviews)
43 test answers

Unlock all answers in this set

Unlock answers (39)
question
The Administrative Simplification section of HIPAA consists of standards for the following areas: a. Transactions, Code sets, Unique identifiers. b. Privacy. c. security. d. All of the above
answer
d. All of the above
question
Who enforces HIPAA?
answer
Department of Health and Human Services
question
Which one of the following is a Business Associate? a. Medical billing and collections company. b. Medical transcriptions company. c. IT Consultant d. all of the above
answer
d. all of the above
question
What does HIPAA stand for?
answer
Health Insurance Portability and Accountability Act.
question
As part of insurance reform individuals can?
answer
Transfer jobs and not be denied health insurance because of pre-exiting conditions
question
Match the following two types of entities that must comply under HIPAA: 1. Covered Entities: 2. Business Associates:
answer
1. Covered Entities: Healthcare Providers, Health Plans, Healthcare Cleringhouses. 2. Business Associates: Third parties that perform services for or exchange data with Covered.
question
Penalties for non-compliance can be which of the following types?
answer
Civil and Criminal
question
Which one of the following is Not a Covered entity?
answer
Employer
question
The five titles under HIPPA fall logically into which two major categories:
answer
Administrative Simplification and Insurance reform
question
The use of which of the following unique identifiers is controversial?
answer
Patient ID (SSN)
question
Match the following components of the HIPAA transaction standards with description: 1. HIPAA Standardized Transactions: 2. Code Sets: 3. Unique Identifiers:
answer
1. HIPAA Standardized Transactions: Standard transactions to streamline major health insurance processes. 2. Code Sets: Standard for describing diseases. 3. Unique Identifiers: Standard for identification of all providers, payers, employers and...
question
What is the main purpose for standardized transactions and code sets under HIPAA?
answer
To provide a common standard for the transfer of healthcare information
question
All of the below are benefit of Electronic Transaction Standards Except:
answer
Transaction rebates back to submitters
question
The HIPPA Privacy standards provide a federal floor for healthcare privacy and security standards and do NOT override more strict laws which potentially requires providers to support two systems and follow the more stringent laws. True or False
answer
True
question
Which of the follow is true regarding a Business Associate Contract? a. Is required between a covered entity and business associate if Protected Health Information (PHI) will be shared between the two. b. Is written assurance that a Business Associate will appropriately safeguard PHI that they use or have disclosed to them from a covered entity. c. Defines the obligations of a Business Associate. d. All of the above.
answer
all of the above
question
A Business Associate Contract is required between a covered entity and business associate if Protected Health Information (PHI) will be shared between the two.
answer
True
question
Match the two HIPPA standards 1. Privacy Standards: 2. Security Standards:
answer
1. Privacy Standards: Standards for controlling and safeguarding PHI in all forms. 2. Security Standards: Standards for safeguarding of PHI specifically in electronic form
question
Under HIPPA, an individual has the right to request: a. Access to their PHI. b. A copy of their PHI. c. A correction to their PHI. d. An accounting of where their PHI has been disclosed. E. All of the Above.
answer
All of the Above
question
A Business Associate Contract must specify the following?
answer
The permissible uses and disclosures that may be made of PHI by business associate
question
In which of the following situations is a Business Associate Contract NOT required: a. With persons or organizations whose functions or services do note involve the use or disclosure. b. With a person or organizations that acts merely as a conduit for protected health information. c. With a financial institution that processes payments. d. All of the above
answer
all of the above
question
The administrative requirements of HIPAA include all of the following EXCEPT:
answer
Using a firewall to protect against hackers.
question
What does PHI stand for?
answer
Protected Health Information
question
Which of the following is NOT a covered entity?
answer
Employer
question
Minimum Necessary Disclosure means using the minimum amount of PHI necessary to accomplish the intended purpose of the use or disclosure.
answer
True
question
Which of the following is NOT a requirement of the HIPAA Privacy standards?
answer
Contracts with covered entities and subcontractors
question
The Security Rule's requirements are organized into which of the following three categories:
answer
Administrative, Security, and Technical safeguards
question
All of the following can be considered ePHI EXCEPT:
answer
Paper claims records
question
The HIPAA Security Rule was specifically designed to: a. Protect the integrity, confidentiality, and availability of health information. b. Protect against unauthorized uses or disclosures. c. Protect against of the workforce and business associates comply with such safeguards d. All of the above.
answer
All of the above.
question
Which of the following are EXEMPT from the HIPAA Security Rule?
answer
Covered entities or business associates that do not create, receive, maintain or transmit ePHI
question
Who must comply with the Security Rule?
answer
Any person or organization that stores or transmits individually identifiable health information electronically
question
The HIPAA Security Rule is a technology neutral, federally mandated "floor" of protection whose primary objective is to protect the confidentiality, integrity and availability of individually identifiable health information in electronic form when it is stored, maintained, or transmitted
answer
True
question
Match the categories of the HIPAA Security standards with their examples: 1. Administrative: 2. Physical: 3. Technical safeguard:
answer
1. Administrative: policies, procedures and internal audits. 2. Physical: doors locked, screen saves/lock, fire prof of records locked. 3. Technical safeguard: passwords, security logs, firewalls, data encryption.
question
The Security Rule allows covered entities and business associates to take into account: a. Their size, complexity, and capabilities. b. Their technical infrastructure, hardware, and software security capabilities. c. The costs of security of potential risks to ePHI. d. Their access to and use of ePHI. e. All of the above
answer
All of the above
question
HITECH stands for which of the following?
answer
Health Information Technology for Economic and Clinical Health
question
All of the following are parts of the HITECH and Omnibus updates EXCEPT?
answer
Ability to sell PHI without an individual's approval
question
All of the following are true regarding the Omnibus Rule EXCEPT:
answer
The Omnibus Rule nullifies the previous HITECH regulations and introduces many new provisions into the HIPAA regulations
question
ARRA stands for which of the following?
answer
American Recovery and Responsibility Act
question
All of the following are true about Business Associate Contracts EXCEPT?
answer
Business Associate are NOT required to obtain "satisfactory assurances" (i.e., that their PHI will be protected as required by HIPAA law) form their subcontractors.
question
All of the following are true regarding the HITECH and Omnibus updates EXCEPT
answer
It guarantees portabil
question
What is the key to HIPAA compliance?
answer
Education
question
All of the following are implications of non-compliance with HIPAA EXCEPT:
answer
public exposure that could lead to loss of market share
question
When should you promote HIPAA awareness?
answer
At the very beginning the compliance process
question
The Privacy and Security rules specified by HIPAA are reasonable and scalable to account for the nature of each organization's culture, size, and resources. Each organization will determine its own privacy policies and security practices within the context of the HIPPA requirements and its own capabilities needs.
answer
true