Domain 2 - Compliance with Use and Disclosures of PHI Flashcards

26% of exam

1
Q

Documentation including the date of action, method of action, description of the disposed record series of numbers or items, service date, a statement that the records were eliminated in the normal course of business, and the signatures of the individuals supervising and witnessing the process must be included in this:

A - Authorization
B - Certificate of destruction
C - Informed consent
D - Continuity of care record

A

B - Certificate of destruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When defining the legal health record in a healthcare entity, it is best practice to establish a policy statement of the legal health record as well as a:

A - Case-mix index
B - Master patient index
C - Health record matrix
D - Retention schedule

A

C - Health record matrix

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A subpoena duces tecum compels the recipient to:

A - Serve on a jury
B - Answer a complaint
C - Testify at a trial
D - Bring records to a legal proceeding

A

D - Bring records to a legal proceeding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A researcher’s informed consent form stated that the patients’ information would be anonymous. Later, in the application form for Institutional Review Board (IRB) approval, the researcher described a coding system to track respondents and non-respondents. The IRB returned the application to the researcher with the stipulation that the informed consent must be changed. What raised the red flag?

A - The description of the use of a coding system to track respondents and non-respondents
B - The application form for the IRB approval
C - The researcher’s informed consent form
D - The description of the use of a coding system to track respondents

A

A - The description of the use of a coding system to track respondents and non-respondents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Sally is the HIM director at Memorial Hospital and has been asked to compose a record retention policy for the hospital. What should be her first consideration in determining how long paper and electronic records must be retained?

A - The amount of space allocated for record filing and server set up
B - The number of paper records currently filed and the number of electronic files added on a daily basis
C - the most stringent law or regulation in the state, CMS, and accrediting body guidelines and standards
D - The cost of filing space and equipment

A

C - the most stringent law or regulation in the state, CMS, and accrediting body guidelines and standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Dr. Hansen saw a patient in his office with measles. He directed his office staff to call the local department of health to report this case of measles. The office manager called right away and completed the report as instructed. Which of the following provides the correct analysis of the actions taken by Dr. Hansen’s office?

A - Dr. Hansen’s office followed protocol and reported this care of measles correctly.
B - Dr. Hansen’s office did not need to report this case to the local health department
C - Dr. Hansen’s office should have mailed a letter to the local health department to report this case
D - Dr. Hansen’s office should have reported the case to the local hospital and not the health department

A

A - Dr. Hansen’s office followed protocol and reported this care of measles correctly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the implication regarding the confidentiality of incident reports in a legal proceeding when a staff member documents in the health record that an incident report was completed about a specific incident?

A - There is no impact
B - The person making the entry in the health record may not be called as a witness in trial
C - The incident report likely becomes discoverable because it is mentioned in a discoverable document
D - The incident report cannot be discovered even though it is mentioned in a discoverable document

A

C - The incident report likely becomes discoverable because it is mentioned in a discoverable document

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The legal health record for disclosure consists of:

A - Any any all protected health information data collected or used by a healthcare entity when delivering care
B - Only the protected health information collected by an attorney for a legal proceeding
C - The data, documents, reports, and information that comprise the formal business records of any healthcare entity that are to be utilized during legal proceedings
D - All of the data and information included in the HIPAA Designated Record Set

A

C - The data, documents, reports, and information that comprise the formal business records of any healthcare entity that are to be utilized during legal proceedings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

John is the privacy officer at General Hospital and conducts audit log checks as part of his job duties. What does an audit log check for?

A - Loss of data
B - Presence of a virus
C - Successful completion of a backup
D - Unauthorized access to a system

A

D - Unauthorized access to a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A professional basketball player from the local team was admitted to your facility for a procedure. During this patient’s hospital stay, access logs may need to be checked daily in order to determine:

A - Whether access by employees is appropriate
B - If the patient is satisfied with their stay
C - If it is necessary to order prescriptions for the patient
D - Whether the care to the patient meets quality standards

A

A - Whether access by employees is appropriate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An outpatient laboratory routinely mails the results of health screening exams to its patients. The lab has received numerous complaints from patient who have received another patient’s health information. Even though multiple complaints have been received, no change in process has occurred because the error rate is low in comparison to the volume of mail that is processed daily for the lab. How should the Privacy Officer for this healthcare entity respond to the situation?

A - Determine why the lab results are being sent to incorrect patients and train the laboratory staff on the HIPAA Privacy Rule
B - Fire the responsible employees
C - Do nothing, as these types of errors occur in every healthcare entity
D - Retrain the entire hospital entity because these types of errors could result in a huge fine from the Office of Inspector General

A

A - Determine why the lab results are being sent to incorrect patients and train the laboratory staff on the HIPAA Privacy Rule

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Anywhere Hospital’s coding staff will be working remotely. The entity wants to ensure that they are complying with the HIPAA Security Rule. What types of network uses a private tunnel through the Internet as a transport medium that will allow the transmission of ePHI to occur between the coder and the facility securely?

A - Intranet
B - Local area network
C - Virtual private network
D - Wide area network

A

C - Virtual private network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Mary Smith has gone to her doctor to discuss her current medical condition. What is the legal term that best describes the type of communication that has occurred between Mary and her physician?

A - Closed communication
B - Open communication
C - Private communication
D - Privileged communication

A

D - Privileged communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

An individual designated as an inpatient coder may have access to an electronic medical record in order to code the record. Under what access security mechanism is the coder allowed access to the system?

A - Context-based
B - Role-based
C - Situation-based
D - User-based

A

B - Role-based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A healthcare organization must have a firewall in place to protect their health information system. Which of the following statement about a firewall is false?

A - It is a system or combination of systems that supports an access control policy between two networks.
B - The most common place to find a firewall is between the healthcare entity’s internal network and the Internet.
C - Firewalls are effective for preventing all types of attacks on a healthcare system.
D - A firewall can limit internal users from accessing various portions of the Internet.

A

C - Firewalls are effective for preventing all types of attacks on a healthcare system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A dietary department donated its old microcomputer to a school. Some old patient data were still on the microcomputer. What controls would have minimized this security breach?

A - Access controls
B - Device and media controls
C - Facility access controls
D - Workstation controls

A

B - Device and media controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The Privacy Rule generally required documentation related to its requirements to be retained:

A - 3 years
B - 5 years
C - 6 years
D - 10 years

A

C - 6 years

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Mrs. Davis is preparing to undergo hernia repair surgery at Deaconess Hospital. Select the best statement of the following options.

A - An employee from the hospital’s surgery department should obtain Mrs. Davis’ informed consent.
B - The surgeon should obtain Mrs. Davis’ informed consent.
C - It does not matter who obtains Mrs. Davis’ informed consent as long as it is documented in her medical record.
D - Informed consent is not necessary because this is not major surgery.

A

B - The surgeon should obtain Mrs. Davis’ informed consent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which legal doctrine was established by the Darling v. Charleston Community Hospital case of 1965?

A - Hospital-physician negligence
B - Clinical negligence
C - Physician-patient negligence
D - Corporate negligence

A

D - Corporate negligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which national database was created to collect information on the legal actions (both civil and criminal) taken against licensed healthcare providers?

A - Healthcare Insurance Data Bank
B - Medicare Protection Database
C - National Practitioner Data Bank
D - Healthcare Safety Database

A

D - Healthcare Safety Database

21
Q

Sally Mitchell was treated for kidney stones at Graham Hospital last year. She now wants to review her medical record in person. She has requested to review it by herself in a closed room.

A - Failure to accommodate her wishes will be a violation under the HIPAA Privacy Rule
B - Sally owns the information in her record, so she may be granted her request
C - Sally’s request does not have to be granted because the hospital is responsible for the integrity of the medical record
D - Patients should never be given access to their actual medical record

A

C - Sally’s request does not have to be granted because the hospital is responsible for the integrity of the medical record

22
Q

Conducting an inventory of the facility’s records, determining the format and location of record storage, assigning each record a time period for preservation, and destroying records that are no longer needed are all components of a:

A - Case-mix index
B - Master patient index
C - Health record matrix
D - Retention program

A

D - Retention program

23
Q

Linda Wallace is being admitted to the hospital. She is presented with a Notice of Privacy Practices. In the Notice, it is explained to her that her PHI will be used and disclosed for treatment, payment, and operations (TPO) purposes. Linda states that she does not want her PHI used for those purposes. Of the options listed here, what is the best course of action?

A - The hospital must honor her wishes and not use her PHI for TPO
B - The hospital may decline to treat Linda because of her refusal
C - The hospital is not required to honor her wishes in this situation, as the Notice of Privacy Practices is information only
D - The hospital is not required to honor her wishes for treatment purposes but must honor them for payment and operations purposes.

A

C - The hospital is not required to honor her wishes in this situation, as the Notice of Privacy Practices is information only

24
Q

When a patient collapses upon arrival at the entrance to an emergency department, what type of treatment authorization is in effect?

A - Emergency consent
B - Expressed consent
C - Informed consent
D - Implied consent

A

D - Implied consent

25
Q

Jack Mitchell, a patient in Ross Hospital, is being treated for gallstones. He has not opted out of the facility directory. Callers who request information about him may be given:

A - No information due to the highly sensitive nature of his illness.
B - Admission date and location in the facility.
C - General condition and acknowledgement of admission.
D - Location in the facility and diagnosis.

A

C - General condition and acknowledgement of admission.

26
Q

Training of staff on security practices at a healthcare organization is an example of this type of access safeguard, which is people-focused in nature:

A - Technical
B - Administrative
C - Physical
D - Addressable

A

B - Administrative

27
Q

The federal law that directed the Secretary of Health and Human Services (HHS) to develop healthcare standards governing electronic claims, national identifiers, the protection of privacy, and the assurance of the security of health information is the:

A - Medicare Act
B - Prospective Payment Act
C - Health Insurance Portability and Accountability Act
D - Social Security Act

A

C - Health Insurance Portability and Accountability Act

28
Q

Which of the following conditions would most likely fall into the category of notifiable diseases as defined by the National Notifiable Diseases Surveillance System?

A - Diabetes mellitus
B - Coronary artery disease
C - Fracture of major bones
D - HIV infection

A

D - HIV infection

29
Q

The “custodian of health records” refers to the individual within a healthcare entity who is responsible for which of the following actions?

A - Determining alternative treatment for the patient
B - Preparing physicians to testify
C - Testifying to the authenticity of records
D - Testifying regarding the care of the patient

A

C - Testifying to the authenticity of records

30
Q

Dr. Smith, a member of the medical staff, asks to see the medical records of his adult daughter who was hospitalized in your institution for a tonsillectomy at age 16. The daughter is now 25. Dr. Jones was the patient’s physician. Of the options listed here, what is the best course of action?

A - Allow Dr. Smith to see the records because he was the daughter’s guardian at the time of the tonsillectomy
B - Call the hospital administrator for authorization to release the record to Dr. Smith since he is on the medical staff
C - Inform Dr. Smith that he cannot see his daughter’s health record without her signed authorization allowing him to access the record
D - Refer Dr. Smith to Dr. Jones and release the record if Dr. Jones agrees

A

C - Inform Dr. Smith that he cannot see his daughter’s health record without her signed authorization allowing him to access the record

31
Q

St. Joseph’s Hospital has a psychiatric service on the sixth floor. A 31-year-old male came to the HIM department and requested to see a copy of his health record. He told the clerk he was a patient of Dr. Schmidt, a psychiatrist, and had been on the sixth floor of St. Joseph’s for the last two months. These records are not psychotherapy notes. The best course of action for you to take as the HIM director is:

A - Prohibit the patient from accessing his record as it contains psychiatric diagnoses that may greatly upset him.
B - Allow the patient to access his record.
C - Allow the patient to access his record if, after contacting his physician, his physician does not feel it would be harmful to the patient.
D - Deny access because HIPAA prevents patients from reviewing their psychiatric records.

A

C - Allow the patient to access his record if, after contacting his physician, his physician does not feel it would be harmful to the patient.

32
Q

You are a member of the hospital’s Health Information Management Committee. The committee has created a HIPAA-compliant authorization form. Which of the following items does the Privacy Rule require for the form?

A - Signature of the patient’s attending physician
B - Identification of the patient’s next of kin
C - Identification of the person or entity authorized to receive PHI
D - Patient’s insurance information

A

C - Identification of the person or entity authorized to receive PHI

33
Q

Which of the following would be considered an identifier under the Privacy Rule?

A - Gender
B - Vehicle license plate
C - Blood pressure reading
D - Temperature

A

B - Vehicle license plate

34
Q

A hospital’s health information department receives a subpoena duces tecum for records of a former patient. When the health record professional goes to retrieve the patient’s medical record, it is discovered that the records being subpoenaed have been purged in accordance with the state retention laws. In this situation, how should the HIM department respond to the subpoena?

A - Inform defense and plaintiff lawyers that the records no longer exist
B - Submit a certification of destruction in response to the subpoena
C - Refuse the subpoena since no records exist
D - Contact the clerk of the court and explain the situation

A

B - Submit a certification of destruction in response to the subpoena

35
Q

An HIM professional violates privacy protection under the HIPAA Privacy Rule when he or she releases ____ without specific authorization from the patient(s) or patient representative(s).

A - A list of newborns to the local newspaper for publication in the birth announcements section
B - Data about cancer patients to the state health department cancer surveillance program
C - Birth information to the country registrar
D - Information about patients with sexually transmitted infections to the country health department

A

A - A list of newborns to the local newspaper for publication in the birth announcements section

36
Q

What is the implication regarding the confidentiality of incident reports in a legal proceeding when a staff member documents in the health record that an incident report was completed about a specific incident?

A - There is no impact.
B - The person making entry in the health record may not be called as a witness in trial.
C - The incident report likely becomes discoverable because it is mentioned in the discoverable document.
D - The incident report cannot be discovered even though it is mentioned in a discoverable document.

A

C - The incident report likely becomes discoverable because it is mentioned in the discoverable document.

37
Q

A hospital receives a valid request from a patient for copies of her medical records. The HIM clerk who is preparing the records removes copies of the patient’s records from another hospital where the patient was previously treated. According to HIPAA regulations, was this action correct?

A - Yes, HIPAA only requires that current records be produced from the patient.
B - Yes, this is hospital policy over which HIPAA has no control.
C - No, the records from the previous hospital are considered to be included in the designated record set and should be given to the patient.
D - No, the records from the previous hospital are not included in the designated record set but should be released anyway.

A

C - No, the records from the previous hospital are considered to be included in the designated record set and should be given to the patient.

38
Q

The Kids’ Foundation, a foundation related to Children’s Hospital, is mailing fundraising information to the families of all patients who have been treated at Children’s in the past three years. Based on facts given:

A - Children’s Hospital violated the Privacy Rule by giving information to the foundation.
B - Children’s Hospital must have notified the patients or patients’ guardians of this disclosure in the Notice of Privacy Practices.
C - The Kids’ Foundation cannot solicit donations from patients’ families under any circumstances.
D - The Kid’s Foundation must request authorization from each patient or patient guardian to mail the fundraising information out to their families.

A

B - Children’s Hospital must have notified the patients or patients’ guardians of this disclosure in the Notice of Privacy Practices.

39
Q

For which of the following situations would an audit log be useful?

A - Holding an individual patient accountable for actions
B - Reconstructing electronic events
C - Defending the corporation against an IRS audit.
D - Stopping attacks from the intranet to the Internet

A

B - Reconstructing electronic events

40
Q

A patient has the right to request a(n) ____, which describes where the covered entity has disclosed patient information for the past six years outside of treatment, payment, and healthcare operations.

A - Disclosure list
B - Designated record set
C - Amendment of medical record
D - Accounting of disclosures

A

D - Accounting of disclosures

41
Q

A hospital employee destroyed a health record so that its contents–which would be damaging to the employee–could not be used at trial. In legal terms, the employee’s action constitutes:

A - Mutilation
B - Destruction
C - Spoliation
D - Spoilage

A

C - Spoliation

42
Q

A breach occurs when unsecured protected health information is accessed or released. The Secretary of HHA and local media must be notified if this threshold of patient records breached has been met or exceeded.

A - 1,000
B - 500
C - 100
D - 10,000

A

B - 500

43
Q

The Security rule leaves the methods of conducting the security risk analysis to the discretion of the healthcare entity. The first consideration for a healthcare facility should be:

A - Its own characteristics and environment
B - The potential threats and vulnerabilities
C - The level of risk
D - An assessment of current security measures

A

A - Its own characteristics and environment

44
Q

Addressable Security Rule implementation specifications:

A - Should be implemented unless a healthcare entity determines that the specification is not reasonable and appropriate and documents their reasoning
B - Are not optional; the healthcare entity must implement them as stated in the regulation
C - Are required if legal counsel determines this to be true and they do not conflict with state law
D - Are only required to be read by healthcare entities; they do not have to be implemented

A

A - Should be implemented unless a healthcare entity determines that the specification is not reasonable and appropriate and documents their reasoning

45
Q

Protected health information this is maintained in a designated record set can be accessed by the patient or other authorized part upon request. Covered entities must respond to requests within what timeframe after receipt of the request?

A - 15 days
B - 30 days
C - 60 days
D - 90 days

A

B - 30 days

46
Q

A data breach occurred in your organization, and after the investigation it was determined that a total of 785 individuals were impacted by the data breach. What must be completed within 60 days of learning about the data breach?

A - Update the notice of privacy practices and send to all patients
B - Report the incident to the individuals impacted, local media, and the Department of Health and Human Services
C - Conduct privacy training for members of the organization
D - Document a note mentioning the data breach in each of the patients’ charts and tell the local media

A

B - Report the incident to the individuals impacted, local media, and the Department of Health and Human Services

47
Q

The HIM director has been asked to secure the record of patient John Smith due to impending litigation in a legal hold. The concept of legal hold requires:

A - Special, tracked handing of patient records involved in litigation to ensure no changes can be made
B - Attorneys for healthcare entities to stop all activity with records involved in litigation
C - All records involved in litigation to be printed and help in a locked cabinet
D - To allow further documentation to occur in any record involved in litigation

A

A - Special, tracked handing of patient records involved in litigation to ensure no changes can be made

48
Q

The Breach Notification Rule requires covered entities to establish a process for investigating whether a breach has occurred and which of the following?

A - Establish a new position for a Privacy Officer
B - Notify affected individuals when a breach occurs
C - Establish a policy on minimum necessary
D - Notify the primacy care physicians of all patients of the breach

A

B - Notify affected individuals when a breach occurs