IS3350 CHAPTER 6 Flashcards
A written consent that allows protected health information (PHI) to be shared is called ___?
Patients sign consents. These documents are required for many purposes. This term is defined by the Health Insurance Portability and Accountability Act.
AUTHORIZATION
An organization that performs a health care activity on behalf of a covered entity is called ___?
This term is defined by the Health Insurance Portability and Accountability Act.
BUSINESS ASSOCIATES
Health plans, health care clearinghouses, any health care provider that transmits certain types of health information in electronic form is called ___?
These entities must follow the HIPAA Security and Privacy rules. This term is defined by HIPAA.
COVERED ENTITY
Refers to how a covered entity shares PHI with other organizations that may not be affiliated with it. This term is defined by the HIPAA and is called ___?
DISCLOSURE
The legal process used to gather evidence in a lawsuit is called ___?
DISCOVERY
Patient health information that is computer based is called ___?
It is PHI stored electronically. This term is defined by the HIPAA.
ELECTRONIC PROTECTED HEALTH INFORMATION (EPHI)
A crime that takes place when a person’s personally identifiable health information is used without permission in order to receive medical services or goods is called ___?
A specialized type of identity theft.
MEDICAL IDENTITY THEFT
A rule that covered entities may only disclose the amount of PHI absolutely necessary to carry out a particular function is called ___?
This term is defined by the HIPAA.
MINIMUM NECESSARY RULE
A legal concept that describes a person’s right to sue another for harm that the latter caused is called ___?
PRIVATE CAUSE OF ACTION
Any individually identifiable information about the past, present, or future health of a person is called ___?
It includes mental and physical health data.
This term is defined by the HIPAA .
PROTECTED HEALTH INFORMATION (PHI)
How a covered entity shares or handles PHI within its organization is called ___?
This term is defined by HIPAA.
USE
- An addressable implementation specification must be used if it is ____?
Reasonable and appropriate
- What is the maximum fine for a single violation of the HIPAA Privacy or Security Rule?
- $100
- $1500
- $1 million
- $1.5Million
- It is unlimited
$1.5Million
- Covered entities must notify affected individuals of a breach within ___ days.
60
- HIPAA limits the pre-existing condition waiting period to ___ months.
12
- What conditions must be met to be considered a health care provider under HIPAA?
- Provide health care services to a person
- Conduct standard transactions electronically
- Handle electronic transactions on a clearinghouses behalf
- 1 & 2 only
- None of the above
Provide health care services to a person
Conduct standard transactions electronically
- A business associate is ___.
An organization that performs a health care activity on behalf of a covered entity.
- What term refers to how a covered entity shares PHI within the organization?
- Disclosure
- Discuss
- Use
- Handle
- None of the above
Use
- A covered entity must disclose PHI to a person’s family and friends in an emergency.
TRUE OR FALSE
FALSE
- A covered entity must respond to a person’s request to access PHI within ___ days.
30
- Which uses and disclosures of PHI are allowed without a person’s consent?
- Made to a person about their own PHI
- Made for treatment, payment, and health care operations
- Made for public safety and health activities
- All the above
- None of the above
Made to a person about their own PHI
Made for treatment, payment, and health care operations
Made for public safety and health activities
All the above
- What term refers to how a covered entity shares PHI with other organizations?
- Disclosure
- Discuss
- Use
- Handle
- None of the above
Disclosure
12.What is the legal process used to gather evidence in a lawsuit?
- Disclosure
- Discovery
- Forensics
- Trial
- None of the above
Discovery
- Which entity enforces the HIPAA Privacy Rule?
- FDIC
- FTC
- OCR
- CDC
- None of the above
OCR
- Which rule is similar to the information security concept of need to know?
- Use rule
- Clearinghouse rule
- Operations rule
- Absolute rule
- Minimum necessary rule
Minimum necessary rule
- A HIPAA breach is a breach of ___PHI.
Unsecured