Module 10 Test 1: Health Information Privacy and Security (RHIA version) Flashcards
The patient has the right to agree or object to disclosure of protected health information when
disclosing information to a family member who is directly involved in the patient’s care.
disclosing information to patient’s or covered entities’ minister.
disclosing information to patient’s attorney.
disclosing information to a family member who is not directly involved in the care.
disclosing information to a family member who is directly involved in the patient’s care
You are a nurse who works on 3West during the day shift. One day, you had to work the night shift because they were shorthanded. However, you were unable to access the EHR. Identify the type of access control being used.
user-based
either user- or role-based
context-based
role-based
context-based
The breach was identified on October 10, 20XX. The investigation was completed on October 15, 20XX. The patient must be notified within
60 days from October 15.
30 days from October 15.
60 days from October 10.
30 days from October 10.
60 days from October 10.
A record destruction program should include
the method of destruction.
requirement of daily destruction.
the name of the supervisor of the person destroying the records.
citing the laws followed.
the method of destruction.
Before we can go any further with our risk analysis, we need to determine what systems/information need to be protected. This step is known as
control analysis.
system characterization.
vulnerability.
risk determination.
system characterization.
The admissions clerk asks why he has to check the patient’s driver’s license to ensure that this is the correct patient. Educate the admissions clerk.
The is meeting the HIPAA requirement of access control.
This meets the HIPAA requirement of authorization.
This meets the HIPAA requirement of authentication.
This meets the HIPAA requirement of verification.
This meets the HIPAA requirement of verification.
You are defining the designated record set for South Beach Healthcare Center. Identify the information that will be included in the designated record set.
information compiled for use in civil hearing
psychotherapy notes
discharge summary
quality reports
discharge summary
Regulation controlling the use of information blocking refers to
electronic health information.
electronic financial information.
third-party claim forms.
paper patient records.
electronic health information.
IoMT include
malicious software.
ransomware.
firewall.
wearable devices.
wearable devices.
According to the HIPAA privacy rule, protected health information includes
only electronic individually identifiable health information.
individually identifiable health information in any format stored by a health care provider or business associate.
non-individually identifiable health information in any format stored by a health care provider.
only paper individually identifiable health information.
individually identifiable health information in any format stored by a health care provider or business associate.
The administrator states that he should not have to participate in privacy and security training as he does not use PHI. Determine the appropriate response.
“Did you read the privacy rules?”
“All employees are required to participate in the training, including top administration.”
“I will record that in my files so that we will not bother you again on this issue.”
“You are correct. There is no reason for you to participate in the training.”
“All employees are required to participate in the training, including top administration.”
The Covered Entity hired a company to test the informaton system’s security. This is known as
penetration testing.
data loss prevention.
intrusion detection systems.
intrusion prevention systems.
penetration testing.
Identify the type of health records that the patient cannot have access to.
A mental health assessment
Psychotherapy notes
Alcohol and drug records
AIDS records
Psychotherapy notes
Identify the true statement regarding healthcare provider’s use of mobile devices.
A specific procedure must be followed for reporting and addressing a lost device.
ePHI should always be stored on mobile devices.
Mobile devices are exempt from encryption.
Devices should only be owned by the covered entity.
A specific procedure must be followed for reporting and addressing a lost device.
The data center containing the computer upon which the electronic health record is located was flooded. As a result, the EHR is inoperable. Identify the type of security that failed.
administrative
network
physical
transmission
physical
HIPAA Privacy Rule provides patients with the ability to request an amendment to their health record, to access their health record and other
required standards.
patient rights.
preemptions.
addressable requirements.
patient rights.
You have been given the responsibility of destroying the PHI contained in the information system’s old server before it is trashed. Recommend an appropriate destruction method.
crushing
degaussing
incineration
overwriting data
degaussing
The Fair and Accurate Credit Transactions Act works to reduce
privacy breaches.
identity theft.
the number of invalid authorizations.
security breaches.
identity theft.
Differentiate between identity matching and identity management.
Identity matching is identifying who has chosen to participate in an HIE. Identity management is identifying the correct person in the MPI.
Identity management is proving that the user is who they say they are. Identity matching is identifying the correct person in the MPI.
Identity matching is proving that the patient is who they say they are. Identity matching is identifying who has chosen to participate in an HIE.
Identity matching is proving that the patient is who they say they are. Identity management is identifying the correct person in the MPI.
Identity management is proving that the user is who they say they are. Identity matching is identifying the correct person in the MPI.
You have been asked if digital signatures utilize encryption. Your response should be
No, but electronic signatures utilize encryption.
No, encryption is not a part of digital signatures.
Yes, digital signature utilizes encryption.
No, but digitized signatures utilize encryption.
Yes, digital signature utilizes encryption.