RHIA Domain 2 Flashcards
You are reviewing your privacy and security policies, procedures, training program, and so on, and comparing them to the HIPAA and ARRA regulations. You are conducting a
- policy assessment
- risk assessment
- compliance audit.
- risk management
risk assessment
Which of the following can be released without consent or authorization?
- summary of patient care
- de-identified health information
- personal health information
- protected health information
de-identified health information
Kyle, the HIM Director, has received a request to amend a patient’s medical record. The appropriate action for him to take is
- make the modification because you have received the request.
- file the request in the chart to document the disagreement with the information contained in the medical record
- route the request to the physician who wrote the note in question to determine the appropriateness of the amendment.
- return the notice to the patient because amendments are not allowed.
route the request to the physician who wrote the note in question to determine the appropriateness of the amendment.
An employee in the admission department took the patient’s name, social security number, and other information and used it to get a charge card in the patient’s name. This is an example of
- identity theft
- mitigation
- disclosure
- release of information
identity theft
Patient has submitted an authorization to release information to a physician office for continued care. The release of information clerk wants to limit the information provided because of the minimum necessary rule. What should the supervisor tell the clerk?
- Good call
- The patient is an exception to the minimum necessary rule, so proves the request as written
- The minimum necessary rule was eliminated with ARRA
- The minimum necessary rule only applies to attorneys.
The patient is an exception to the minimum necessary rule, so proves the request as written
Patricia is processing a request for medical records. The record contains an operative note and a discharge summary from another hospital. The records are going to another physician for patient care. What should Patricia do?
- Notify the requestor that redisclosure is illegal and so he must get the operative and discharge summary records from the original source hospital.
- Include the documents from the other hospital
- Redisclose when necessary for patient care
- Redisclose when allowed by law
Include the documents from the other hospital
Before a user is allowed to access protected health information, the system confirm that the patient is who he or she says they are. This is known as
- access control
- notification
- authorization
- authentication
authentication
Contingency planning includes which of the following processes?
- data quality
- system analysis
- disaster planning
- hiring practices
disaster planning
Which of the following disclosures would require patient authorization?
- law enforcement activities
- workers’ compensation
- release to patient’s family
- public health activities
release to patient’s family
I have been asked if I want to be in the directory. The admission clerk explains that if I am in the directory,
- my friends and family can find out my room number
- my condition can be discussed with any caller in detail.
- my condition can be released to the news media
- my condition can be released to hospital staff only.
my friends and family can find out my room number
Which of the following techniques would a facility employ for access control?
- automatic logoff
- authentication
- integrity controls
- unique user identification
- 1 and 4 only
- 1 and 2 only
- 2 and 4 only
- 3 and 4 only
1 and 4 only
Which of the following statement is true about the Privacy Act of 1974?
- It applies to all organizations that maintain health care data in any form.
- It applies to all health care organizations.
- It applies to the federal government.
- It applies to federal government except for the Veterans Health Administration
It applies to the federal government.
Which of the following statements is true about a requested restriction?
• ARRA mandates that a CE must comply with a requested restriction.
• ARRA states that a CE does not have to agree to a request restriction
• ARRA mandates that a CE must comply with a requested restriction unless it meets one of the exceptions
• ARRA does not address restrictions to PHI
ARRA mandates that a CE must comply with a requested restriction unless it meets one of the exceptions
Which of the following is an example of administrative safeguards under the security rule?
- encryption
- monitoring the computer access activity of the user
- assigning unique identifiers
- monitoring traffic on the network
monitoring the computer access activity of the user
Someone accessed the covered entity’s electronic health record and sold the information that was accessed. This person is knows as which of the following?
- malware
- a virus
- a hacker
- a cracker
a cracker
Intentional threats to security could include
- a natural disaster (flood).
- equipment failure (software failure).
- human error (data entry error).
- data theft (unauthorized downloading of files).
data theft (unauthorized downloading of files).
Which of the following would be a business associate?
- release of information company
- bulk food service provider
- childbirth class instructor
- security guards
release of information company
Which of the following statements demonstrates a violation of protected health information?
- “Can you help me find Mary Smith’s record?”
- A member of the physician’s office staff calls centralized scheduling and says, “Dr. Smith wants to perform a bunionectomy on Mary Jones next Tuesday.”
- “Mary, at work yesterday I saw that Susan had a hysterectomy.”
- Dr. Jones tells a nurse on the floor to give Ms. Brown Demerol for her pain.
“Mary, at work yesterday I saw that Susan had a hysterectomy.”
You are a nurse who works on 3West during the day shift. One day, you had to work the night shift because they were shorthanded. However, you were unable to access the EHR. What type of access control (s) are being used?
- user-based
- context-based
- role-based
- either user- or role-based
context-based