Final Part 15 Flashcards
Identify the true statement about integrity.
1) The CE only has to address data integrity for data stored in the database
2) The CE only has to address data integrity for data transmitted across a network
3) The CE has to address data integrity for data stored and in transmission
4) HIPAA does not require CEs to address data integrity
The CE has to address data integrity for data stored and in transmission
To ensure minimum opportunity to access date, passwords
A. Need to be changed once a year
B. Can be any four letters in a person’s name for ease of remembering
C. Should be lengthened when staff changes position
D. Should be changed every ninety days or sooner
Should be changed every ninety days or sooner
The HIPAA security rule defines facility as:
A. None of these
B. The interior and exterior of buildings and physical premises
C. Only areas secured by a fence
D. The interior of buildings only
The interior and exterior of buildings and physical premises
Regarding PHI, which of the following is NOT one of the reasons that some requirements are relaxed or removed?
A. Treatment
B. Adjudication
C. Operations
D, Payment
Adjudication
The CE has a policy that only authorized individuals will be allowed in the data center. This is known as _______.
A. Audit trail
B. Security management plan
C. Risk analysis
D. Facility access control
Facility access control
HIPAA security standards whereby the CEcan determine if the standard is reasonable and appropriate is known as _______.
A. Noncompulsory
B. Optional
C. Addressable
D. Voluntary
Addressable
If there has been a breach in the security of medical information systems, what are the steps a covered entity must take?
A. The local police are called into investigate the crime
B. A written report is created and all parties involved must be notified in writing of the event
C. All employees must follow a policy to not speak about the incident to anyone
D. The HIPAA officer must write an apology to the patients who have been affected
A written report is created and all parties involved must be notified in writing of the event
A user had trouble remembering his password so he decided to write it down. No one obtained access to it and used it, so this is a _____.
A. Information system activity review
B. Security incident
C. Audit control
D. Security event
Security event
Which of the following is NOT a part of HIPAA Title II, Administrative Simplification?
A. Transaction and code set rule
B. Privacy rule
C. Security rule
D. Medical Savings Rule
Medical Savings Rule
One of the nurses in the quality management department has decided to work a few shifts on the nursing units in order to earn some extra money. When she logs in with her normal sign-in, she has certain functionality; when she logs in differently to work on the nursing unit, she has different functionality. This is known as _____.
A. Context-based authentication
B. Role-based authentication
C. Emergency access procedure
D. User-based authentication
Context-based authentication