HIPAA Awareness Training Flashcards

1
Q

HIPAA

A

Health Insurance Portability and Accountability Act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

United States legislation that provides data privacy and security provisions
for safeguarding medical information.

A

HIPAA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

HIPAA’s main objective

A

To protect the privacy and security of our
health information and to provide us certain rights on our health information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

WHAT IS PROTECTED BY HIPAA?

A

Protected Health Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

HIPAA is meant to protect your sensitive health
information in this ecosystem, regulate how it can be used or disclosed, and also give you certain rights to your information.

A

The Healthcare Ecosystem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Two types of organizations that are regulated
under HIPAA:

A
  1. Covered Entities
  2. Business Associates
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Cover Entities composed of:

A
  1. Healthcare providers
  2. Health Plans
  3. Healthcare clearing houses
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

All third party vendors and business partners that create, receive, maintain or transmit PHI on behalf of a covered entity

A

Business Associates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A term used in the HIPAA Security NPRM for a pattern of agreements that extend protection of health care data by requiring that each covered entity that shares health care data with another entity require that that entity
provide protections comparable to those provided by the covered entity, and that that entity, in turn, require that
any other entities with which it shares the data satisfy the same requirements.

A

Chain of Trust

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Structure of the HIPAA Regulations has two major categories:

A

1, Insurance Reform (Portability)
2. Administrative Simplification (Accountability)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The Administrative Simplification section of HIPAA consists of standards for the following areas:

A
  1. Transactions, Code Sets, and Identifiers
  2. Privacy
  3. Security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Standardization of electronic transactions and data required for healthcare exhanges between employers, health insurance payers, and healthcare providers.

A

Transactions, Code Sets, and Identifiers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Safeguards for Protected Health Information in all forms

A

Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Safeguards for protected health information in electronic form (ePHI)

A

Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

USING AND DISCLOSING PHI

A
  1. Permissible Uses and Disclosure of PHI
  2. Disclosure Exceptions
  3. Authorizations
    3, Sensitive Health Information
    4, Sharing or Disclosing PHI with third parties
  4. Minimum Necessary Standard
  5. Incidental uses and disclosures
  6. De-identification
  7. Improper Uses and Disclosures- Breaches
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Examples of uses and disclosures for TPO for which an authorization is NOT required are:

A
  1. Medical Tx
  2. Determination of eligibility or coverage
  3. Billing
  4. Claims Management
  5. Healthcare data processing
  6. Conducting Quality Assessment
  7. Evaluation of healthcare provider performance
  8. Business planning and certain administrative activities
  9. Medical Referrals
17
Q

Disclosure Exceptions

A
  1. Emergencies involving imminentn threat to health or safety
  2. Where required by law
  3. Law enforcement
  4. Judicial Proceedings
  5. Health oversight activities
  6. Public Health Activities
  7. Research purpose under limited circumstance
  8. Specialized government functions
  9. Organ transplant
  10. Worker’s Compensation
  11. Coreners, medical examiners, and funeral directors
  12. Incidental Disclosures
18
Q

Healthcare providers must obtain a __________ for uses or disclosure other than TPO (treatment, payment or operations).

A

Patient’s Authorization

19
Q

Sensitive Health Information comprises of:

A
  1. Substance Abuse
  2. Mental Health
  3. Sexually Transmitted Disease
20
Q

The incidentsal disclosures include things such as:

A
  1. waiting room sign-in sheets
  2. patient charts at bedside
  3. doctors talking with patients in semi-private rooms
  4. doctors conferring at nurses stations with the potential of being heard by a passerby
21
Q

Healthcare providers have two options in using and or discloscing PHI outsiside of TPO (treatment, payment, and options)

A
  1. Authorization
  2. De-identification
22
Q

The loss of control, compromise, unauthorized disclosure, unauthorized acquisition, unauthorized access, or any similar terms referring to situations where persons other than authorized users and for an other than authorizd purpose have access or potential access to personallly identifiable information, whether physical or electronic.

A

Breach

23
Q

HIPPA Privacy document is called ____.

A

Notice of Privacy Practices

24
Q

To comply with HIPAA Privacy. an organization must implement the following 3 components.

A
  1. Compliance Officer
  2. Employee Training
  3. Formal Documents and Controls
25
Q

The security rule’s requirements are organized into three categories:

A
  1. Administrative safeguards
  2. Physical safeguards
  3. Technical safeguards
26
Q

Policies and procedures designed to show how the entity will comply with the security role.

A

Administrative Safeguards

27
Q

The controlling of physical access to protect against inappropriate acces to protected data.

A

Physical Safguards

28
Q

The controlling of access to computer systems and the protection of communication containing PHI transmitted electronically over open networks.

A

Technical Safeguards