HIPAA Lesson 9 Flashcards

1
Q

List the Security Rule three types of safeguards:

A

Administrative, physical, and technical.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Administrative actions, policies, and procedures to manage a covered entity’s security choices and the conduct of its workforce in relation to electronic protected health information.

A

Administrative Safeguards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

List the nine administrative safeguard standards of the Security Rule:

A
  1. Security management process
  2. Assigned security responsibility
  3. Workforce security
  4. Information access management
  5. Security awareness and training
  6. Security incident procedures
  7. Contingency plan
  8. Evaluation
  9. Business associate contracts and other arrangements
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Implement policies and procedures to prevent, detect, contain, and correct security violations.

A

Security management process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality, integrity, and availability of electronic protected health information held by the covered entity.

A

Risk analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Implement security measures sufficient to reduce risks and vulnerabilities to a reasonable and appropriate level to comply with the Security Rule.

A

Risk management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Apply appropriate penalties against workforce members who fail to comply with the entity’s security policies and procedures.

A

Sanction policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Implement procedures to regularly review records of information system activity, such as audit logs, access reports, and security incident tracking reports.

A

Information system activity review

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Identify the security official who is responsible for the development and implementation of the policies and procedures required by this Rule for the entity.

A

Assigned security responsibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Implement policies and procedures to ensure that all members of [the] workforce have appropriate access to electronic protected health information, as provided under the Information Access Management standard, and to prevent those workforce members who do not have access from obtaining access.

A

Workforce security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Implement procedures for the authorization and/or supervision of workforce members who work with electronic protected health information or in locations where it might be accessed.

A

Authorization and/or supervision

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Implement procedures to determine that the access of a workforce member to electronic protected health information is appropriate.

A

Workforce clearance procedure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Implement procedures for terminating access to electronic protected health information when the employment of a workforce member ends or as required by determinations made as specified in the Workforce Clearance Procedure of this Rule.

A

Termination procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Implement policies and procedures for authorizing access to electronic protected health information that are consistent with the applicable requirements of subpart E of this part [the Privacy Rule].

A

Information access management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

If a healthcare clearinghouse is part of a larger organization, the clearinghouse operation must implement policies and procedures that protect the EPHI of the clearinghouse from unauthorized access by the larger organization.

A

Isolating healthcare clearinghouse function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Implement policies and procedures for granting access to electronic protected health information—for example, through access to a workstation, transaction, program, process, or other mechanism.

A

Access authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Implement policies and procedures that, based upon the entity’s access authorization policies, establish, document, review, and modify a user’s right of access to a workstation, transaction, program, or process.

A

Access establishment and modification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Implement a security awareness and training program for all members of [the] workforce (including management).

A

Security awareness and training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Provide periodic security updates to members of the workforce.

A

Security reminders

20
Q

Implement procedures for guarding against, detecting, and reporting malicious software.

A

Protection from malicious software

21
Q

Implement procedures for monitoring login attempts and reporting discrepancies.

A

Login monitoring

22
Q

Implement procedures for creating, changing, and safeguarding passwords.

A

Password management

23
Q

Implement policies and procedures to address security incidents.

A

Security incident procedures

24
Q

Identify and respond to suspected or known security incidents; mitigate, to the extent practicable, harmful effects of security incidents known to the covered entity; and document security incidents and their outcomes.

A

Response and reporting

25
Q

Establish (and implement as needed) policies and procedures for responding to emergencies and other occurrences that can damage data and systems containing EPHI.

A

Contingency plan

26
Q

Establish and implement procedures to create and maintain retrievable exact copies of EPHI.

A

Data backup and recovery plan

27
Q

Establish (and implement as needed) procedures to restore any loss of data.

A

Disaster recovery plan

28
Q

The emergency mode operation plan requires covered entities to establish (and implement as needed) procedures to enable continuation of critical business processes, while maintaining the security of EPHI while operating in emergency mode.

A

Emergency mode operation plan

29
Q

Implement procedures for periodic testing and revision of contingency plans.

A

Testing and revision procedures

30
Q

Assess the relative criticality of specific applications and data in support of other contingency plan components.

A

Applications and data criticality analysis

31
Q

Perform a periodic technical and nontechnical evaluation, based initially upon the standards implemented under this rule and subsequently, in response to environmental or operations changes affecting the security of electronic protected health information that establishes the extent to which an entity’s security policies and procedures meet the requirements of this subpart [the Security Rule].

A

Evaluation

32
Q

A business associate [may] create, receive, maintain, or transmit EPHI on the covered entity’s behalf only if the covered entity obtains satisfactory assurances that the business associate will appropriately safeguard the information.

A

Business associate contracts and other arrangements

33
Q

List the Security Management Process Implementation Specifications;

A
Risk analysis (R)
Risk management (R)
Sanction policy (R)
Information system activity review (R)
34
Q

List the Workforce Security Implementation Specifications:

A

Authorization and/or supervision (A)
Workforce clearance procedure (A)
Termination procedures (A)

35
Q

List the Information Access Management Implementation Specifications:

A
Isolating healthcare clearinghouse function (R)
Access authorization (A)
Access establishment and modification (A)
36
Q

List the Security Awareness and Training Implementation Specifications:

A
Security reminders (A) 
Protection from malicious software (A) 
Login monitoring (A) 
Password management (A)
37
Q

List the Security Incident Procedures Implementation Specifications:

A

Response and reporting (R)

38
Q

List the Contingency Plan Implementation Specifications:

A
Data backup plan (R)
Disaster recovery plan (R)
Emergency mode operation plan (R)
Testing and revision procedure (A)
Applications and data criticality analysis (A)
39
Q

List the Business Associate Contracts and Other Arrangements Implementation Specifications:

A

Written contract or other arrangements (R)

40
Q
Which of these implementation specifications is part of the security management process standard? 
o Risk management. 
o Password management. 
o Disaster recovery plan. 
o Access authorization.
A

Risk management.

41
Q

What is a sanction policy?
o Penalties for failing to comply with security policies.
o A procedure to regularly review access reports.
o An assessment of potential risks and vulnerabilities.
o Security measures that reduce risks and vulnerabilities.

A

Penalties for failing to comply with security policies.

42
Q
Which administrative safeguard standard encompasses the concept of "minimum necessary"? 
o Contingency plans. 
o Assigned security responsibility. 
o Evaluation. 
o Workforce security.
A

Workforce security.

43
Q

What is the purpose of the security and awareness training standard?
o To establish policies and procedures for granting access to electronic protected health information.
o To isolate healthcare clearinghouse functions.
o To establish a contingency plan in case of an emergency.
o To train everyone in your workforce about good security practices.

A

To train everyone in your workforce about good security practices.

44
Q
"An attempted or successful unauthorized use of system operations" is the definition of which of the following? 
o Evaluation. 
o Security reminder. 
o Security incident. 
o Assigned security responsibility.
A

Security incident.

45
Q

These requirements seem vague to me. I work for a small provider, and we don’t have a lot of money to spend on lawyers and IT staff. How do I know if my organization is compliant?

A

HIPAA compliance is an ongoing activity. You’re never going to say, “Okay, I’m done with HIPAA now!” You’ll continually need to evaluate your organization and make common-sense decisions about what you can do better.

46
Q

Some of these requirements seem like they’re the same. Why are there six implementation specifications all about appropriate access?

A

Keep in mind that the Security Rule supports the Privacy Rule. “Minimum necessary” is a big part of the Privacy Rule, and that’s reflected in the Security Rule. Workforce security and information access management are similar standards, but they cover different aspects of ensuring overall appropriate access. By the way, appropriate access is just another phrase that means minimum necessary.