Test 4 Flashcards

1
Q

The HIPAA privacy rule __________.

a. Protects only medical information that is not already specifically protected by state law
b. Supersedes all state laws that conflict with it
c. Is federal common law
d. Sets a minimum (floor) of privacy requirements

A

Sets a minimum (floor) of privacy requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Phi refers to __________ health information

a. Private
b. Protected
c. Previous
d. Preliminary

A

Protected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Debbie, an HIM professional, was recently hired as the privacy officer at a large physician practice. She observes the following practices. Which is a violation of the HIPAA privacy rule?

A) Dr. Graham recommends a medication to a patient with asthma.
B) Dr. Herman gives a patient a pen with the name of a pharmaceutical company on it.
C) Dr. Martin recommends acupuncture to a patient.

D) Dr. Lawson gives names of asthma patients to a pharmaceutical company.

A

Dr. Lawson gives names of asthma patients to a pharmaceutical company.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Although HIPAA is not the first piece of federal privacy legislation, it is more expansive than the Federal Privacy Act of 1974, which applied privacy rules to __________.

a. Veterans’ records
b. Medicare and Medicaid records
c. Federal agencies
d. Non-profit hospitals

A

Federal agencies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Mercy Hospital personnel need to review the medical records of Katie Grace for utilization review purposes (#1). They will also be sending her records to her physician for continuity of care (#2). As they pertain to Mercy Hospital, these two functions are:

a. Use (#1) and disclosure (#2)
b. Request (#1) and disclosure (#2)
c. Disclosure (#1) and use (#2)
d. None of the above

A

Use (#1) and disclosure (#2)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The privacy rule resides in:

A) Title I of HIPAA.
B) Title I of the Federal Privacy Act.

C) Title II of HIPAA.

D) Title II of the Federal Privacy Act.

A

Title II of HIPAA.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Medical information loses PHI status and is no longer protected by the HIPAA privacy rule when it:

A) becomes an oral communication.

B) is de-identified.

C) is used for TPO.

D) is individually identifiable.

A

is de-identified.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Champion Hospital retains Hall, Hall and Hall, a law firm, to perform all of its legal work, including representation during medical malpractice lawsuits. Which of the following statement(s) is/are correct?

A) The law firm is not a business associate because it is a legal, not a medical, organization.

B) The law firm is a business associate because it performs activities on behalf of the hospital.

C) The law firm is a business associate because it uses or discloses individually identifiable health information on behalf of the hospital.

D) The law firm is not a business associate because the privacy rule prohibits it from using individually identifiable information.

E) a and d

A

The law firm is a business associate because it uses or discloses individually identifiable health information on behalf of the hospital.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following statements is true? A HIPAA authorization __________.

a. May never be revoked.
b. May be revoked as long as it is in writing.
c. May be revoked verbally or in writing.
d. May be revoked, but the revocation doesn’t take effect for 60 days.

A

May be revoked as long as it is in writing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following is a public interest and benefit exception to the authorization requirement?

A) payment

B) PHI regarding victims of domestic violence

C) information requested by a patient s attorney

D) treatment

A

PHI regarding victims of domestic violence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following disclosures provides an individual with the opportunity to agree?

A) facility directory

B) treatment, payment and operations

C) regarding Workers Compensation

D) information regarding decedents

A

facility directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The Health Information Technology for Economic and Clinical Health (HITECH) Act has affected HIPAA in which of the following ways?

a. Definition of PHI has changed
b. Consequences to business associate have become greater
c. Number of covered entity categories has increased
d. HITECH did not make any changes to HIPAA

A

Consequences to business associate have become greater

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Per the HIPAA privacy rule, a hybrid entity is defined as one that

a. serves both self-pay patients and insured patients
b. performs both covered and non-covered functions under the privacy rule
c. educates students and provides medical services to those students as well
d. Is both a healthcare provider and healthcare insurer

A

performs both covered and non-covered functions under the privacy rule

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Dr. Blake is selling his practice to Dr. Walton. If he sells patient information as part of the sale of the practice, he is __________.

a. Violating HIPAA
b. Not violating HIPAA.
c. Not violating HIPAA as long as he sells only patient demographic information
d. Violating HIPAA unless he obtains authorization from each patient

A

Not violating HIPAA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Of the following options, a sign-in sheet at a physician’s office is best described as __________.

a. Authorization
b. Treatment
c. Incidental disclosure
d. Marketing

A

Incidental disclosure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Shirley Denton has written to request an amendment to her PHI from Bon Voyage Hospital, stating that incorrect information is present on the document in question. The document is an incident report from Bon Voyage Hospital, which was erroneously placed in Ms. Denton s health record. The covered entity declines to grant her request based on which privacy rule provision?

A) It was not created by the covered entity.

B) It is not part of the designated record set.

C) Both a and b.

D) None. The covered entity must grant her request.

A

It is not part of the designated record set.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Jack Mitchell, a patient in Ross Hospital, is being treated for gallstones. He has not opted out of the facility directory. Callers who request information about him may be given:

A) no information due to the highly sensitive nature of his illness.

B) admission date and location in the facility.

C) general condition and acknowledgement of admission.

D) location in the facility and diagnosis.

A

General condition and acknowledgement of admission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The privacy rule generally requires documentation related to its requirements to be retained for _______.

A) 3 years.

B) 5 years.

C) 6 years.

D) 10 years.

A

6 years

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Breach notification requirements apply to _______.

A) HIPAA covered entities.

B) HIPAA covered entities and their BAs.

C) non-HIPAA covered entities and BA.

D) all of the above

A

all of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A physician practice was warned last year by auditors that its disposal of paper records (dumping them in bins without shredding or deidentifying them) violated HIPAA, but it did nothing to correct the problem. When the records were found in a city dumpster, an anonymous caller notified the Office for Civil Rights (OCR). An investigation by OCR confirmed that the practice had been warned about the violations. What level of violation is OCR likely to assess in this situation?

a. Unknowing
b. Reasonable cause
c. Willful neglect, corrected within 30 days of discovery
d. Willful negclect, uncorrected

A

Willful negclect, uncorrected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A waived authorization for a research study may be granted by ________.

a. A researcher in the research study
b. An Institutional Review Board
c. The CEO of a covered entity that is providing PHI
d. The office of civil rights

A

An Institutional Review Board

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which of the following is an example of mitigation?

a. Breach notification
b. Apology
c. Payment of a bill for financial loss resulting from an infraction
d. All of these are examples of mitigation

A

All of these are examples of mitigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The May 31, 2011 proposed rule introduced the concept of a(n) _________.

a. Access report
b. Accounting of disclosures
c. Penalty of HIPAA violations resulting from malicious behavior
d. Limitation on records of the deceased as PHI

A

Access report

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which of the following can the HIM department require of a patient who is requesting an amendment to her PHI?

a. Submit the request in writing
b. Attend a meeting
c. Payment of nominal fee to address the cost of reviewing the request
d. There is no requirements

A

Submit the request in writing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Where can patients find complete descriptions of how the PHI is used in a healthcare facility?

a. Notice of privacy practices
b. Medical staff rules and regulations
c. Governing board bylaws
d. HIM policies and procedures

A

Notice of privacy practices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

With proper written authorization from a patient, Houston Hospital obtains a copy of the patient’s health record from Austin Hospital. Houston Hospital then releases the information from Austin Hospital to Dallas Hospital. What is this practice called?

a. Redisclosure
b. Release of information
c. Voir dire
d. Ad testificandum

A

Redisclosure

27
Q

Sally Mitchell was treated for kidney stones at Graham Hospital last year. She now wishes to review her medical record in person. She has requested to review them by herself in a closed room. Which of the following is true?

a. Failure to accommodate her wishes will be a violation of the HIPAA privacy rule.
b. Sally owns the information in her record, so she must be granted her request.
c. Sally’s request does not have to be granted because the hospital is responsible for the integrity of the medical record.
d. Patients should never be given access to their actual medical records.

A

Sally’s request does not have to be granted because the hospital is responsible for the integrity of the medical record.

28
Q

Kyle likes to request frequent accounting of disclosure reports from all of his providers so he knows where his PHI is being disseminated.

a. Each covered entity must provide the first accounting within a 12-month period at no cost
b. Each covered entity must provide the first accounting within a 12-month period for no greater than $10
c. Only one provider must provide the first accounting within a 12-month period at no cost; the others may charge a cost-based fee
d. Every covered entity must provide all accounting of disclosure reports at no cost

A

Each covered entity must provide the first accounting within a 12-month period at no cost

29
Q

Terry has requested that all written communications from his cardiologist’s office be sent to his work address instead of his home address. The cardiology practice__________.

a. Must honor this confidential communication request if it is deemed reasonable
b. Is not required to honor any confidential communication requests of this nature
c. Is not required to honor this restriction request
d. Must honor this restriction request as long as it is submitted in writing

A

Must honor this confidential communication request if it is deemed reasonable

30
Q

Restriction requests__________.

a. Must always be honored
b. Can always be refused
c. Must be followed if disclosure would be to a health plan for payment and the PHI pertains to a service or item paid for in full by someone other than the health plan
d. Must be followed if an individual wants only certain persons to be given information about the individual that is contained in the facility directory

A

Must be followed if disclosure would be to a health plan for payment and the PHI pertains to a service or item paid for in full by someone other than the health plan

31
Q

HealthPartners has been the target of a network server hacking incident. 300 patients were affected. HealthPartners__________.

a. Is not required to report this to the affected patients because there were fewer than 500
b. Must inform the patients of what occurred; the type of PHI involved; and what steps HealthPartners is taking to prevent future hacking incidents
c. Is required to publish a list of the 300 patients who were affected
d. Must inform the patients of what occurred; the type of PHI involved; what steps HealthPartners is taking to prevent future hacking incidents; and the names of the other affected patients

A

Must inform the patients of what occurred; the type of PHI involved; and what steps HealthPartners is taking to prevent future hacking incidents

32
Q

If federal and state law conflict, federal law will generally supersede state law under the legal doctrine of__________.

a. Negligence
b. Restrictions
c. Preemption
d. Stare decisis

A

Preemption

33
Q

In the event of a HIPAA breach, how long does the facility have to notify each individual of the breach?

a. 30 days
b. 60 days
c. 90 days
d. 120 days

A

60 days

34
Q

The notice of privacy practices must inform individuals of their right to complain to whom?

A. The covered entity
B. The department of health and human services
C. Any employee of the facility
D. All of the above

A

All of the above

35
Q

Which rule requires covered entities to assign a unique name and/or number for identifying and tracking user identity?

a. Privacy rule
b. Security Rule
c. Administration rule
d. None of the above

A

Security Rule

36
Q

Nipa was admitted to a Houston Community Hospital for gallbladder removal. Which of the following information about her is considered confidential?

A: Previous history and treatment of a concussion
B: All information is considered confidential
C: Address upon admission
D: Date of birth

A

All information is considered confidential

37
Q

Steve has submitted a written authorization to request a copy of his medical chart. However, Steve’s psychiatrist has determined that access to his PHI might endanger his life or safety. What should the covered entity do concerning the request?

A: Release requested information to Steve
B: Release requested information to Steve’s legal guardian
C: Provide an appeals process to Steve for the denial
D: Confirm the psychiatrist decision and deny the request

A

Provide an appeals process to Steve for the denial

38
Q

In regard to a patient’s request for his PHI, which of the following statements is true?

A: A cost-based fee may be charged for making a copy of the PHI.
B: A cost-based fee may be charged for personnel expenses.
C: A cost-based fee may be charged for making a copy of the PHI.
D: No fee may be charged for PHI.

A

A cost-based fee may be charged for making a copy of the PHI.

39
Q

Jennifer submits a written request to Houston Hospital for a copy of her PHI on August 19. The information is stored offsite. By what date must the covered entity comply?

A: September 30
B: August 29
C: September 19
D: October 18

A

October 18

40
Q

Steve submits a written request to Houston Hospital for a copy of his PHI on August 19. By what date must the covered entity comply?

a. August 29
b. September 3
c. September 8
d. September 18

A

September 18

41
Q

The minimum necessary standard refers to the healthcare provider’s effort to _____.​

a. Invoice third-party payers for the least reasonable amount associated with care provided to the patient
b. Limit patient-specific health information released to that which is needed to accomplish the intended purpose only
c. Mimimalize the risk of negligence that would result in becoming involved in a malpractice lawsuit
d. Provide the patient with the minimum amount of procedures and medications to maintain reasonable insurance costs

A

Limit patient-specific health information released to that which is needed to accomplish the intended purpose only

42
Q

An authorization for use or disclosure of patient-specific health information that has been combined with any other document is called a(n) _____ authorization.

a. Admissibility
c. Certiorari
b. Beneficence
d. Compound

A

Compound

43
Q

The HIPAA security rule requires that the covered entity ________.

a. Eliminate all threats to ePHI
b. Hire a security consultant
c. Protect ePHI from reasonably anticipated threats
d. Protect ePHI at all costs

A

Protect ePHI from reasonably anticipated threats

44
Q

The HIPAA Security Rule allows flexibility in implementation based on reasonableness and appropriateness. What does the covered entity use to make these determinations?

a. Size of the covered entity
b. Security capabilities of the covered entity’s system
c. Costs of security measures
d. All of the above

A

All of the above

45
Q

The HIPAA security rule allows flexibility in implementation based on reasonableness and appropriateness. This means that covered entities can:

A) ignore addressable standards.

B) implement only required standards.

C) implement based on organizational assessment.

D) mitigate standards with a clearinghouse.

A

implement based on organizational assessment

46
Q

Which of the term does the security rule use to define data or information that has not been altered or destroyed in an unauthorized manner?

A) applicability

B) security

C) integrity

D) confidentiality

A

integrity

47
Q

The security rule s five sections includes all of the following except:

A) administrative safeguards.

B) physical safeguards.

C) organizational requirements.

D) encryption requirements.

A

encryption requirements

48
Q

Security awareness training programs requires the implementation of awareness and training of all workforce members and should include________.

A) periodic security reminders.

B) malicious software.

C) contingency plans.

D) response reporting.

A

periodic security reminders

49
Q

All of the following are security rule physical safeguards standards except:

A) facility access controls.

B) contingency planning.

C) workstation security.

D) device and media controls.

A

contingency planning

50
Q

Fred resigned from his position at University Hospital. According to the HIPAA security rule, his access to the electronic health record system should be terminated:

A) one week after resignation date.

B) 30 days after resignation date.

C) promptly upon resignation.

D) never; because he resigned and was not terminated, continued access presents little risk to the hospital.

A

promptly upon resignation.

51
Q

A subcontractor of a business associate may:

A) always transmit ePHI on the business associate s behalf.

B) transmit ePHI on the business associate s behalf if it provides satisfactory assurances that the information will be appropriately safeguarded.

C) never transmit ePHI on the business associate s behalf.

D) transmit ePHI on the business associate s behalf as long as it has an operational need to do so.

A

transmit ePHI on the business associate s behalf if it provides satisfactory assurances that the information will be appropriately safeguarded.

52
Q

The best source for obtaining primary information on addressing the HIPAA security rule would be which of the following sources?

A) Journal of AHIMA

B) security consultants

C) AHIMA annual meeting

D) Department of HHS

A

Department of HHS

53
Q

The workforce security administrative safeguard requires policies and procedures that:

A) ensure appropriate ePHI access by workforce members.

B) prevent access to ePHI by workforce members who should not have access.

C) both a and b.

D) neither a nor b.

A

both a and b.

54
Q

A security procedure that causes a computer session to end after a predetermined period of inactivity is an

a. Audit trial
b. Termination of access
c. Automatic log-off
d. Acess control

A

Automatic log-off

55
Q

The purpose of the implementation specifications of the HIPAA Security Rule is to provide _______.

A. protection of patient information
B. instruction for implementation of standards
C. guidance for security training and education
D. sample policies and procedures for compliance

A

instruction for implementation of standards

56
Q

One of the four general requirements a covered entity must adhere to for compliance with the HIPAA Security Rule is to ensure the confidentiality, integrity and _______ of ePHI.

A. addressability
B. accuracy
C. availability
D. accountability

A

availability

57
Q

The HIPAA Security Rule applies to which of the following covered entities?

A. Hospital that bills Medicare
B. Physician electronic billing company
C. BlueCross health insurance plan
D. All of the above

A

All of the above

58
Q

Non-compliance with the HIPAA Security Rule can lead to _______.

A. Civil penalties
B. Criminal penalties
C. Both a and b
D. A maximum annual penalty of $1 million

A

Both a and b

59
Q

Copying data onto tapes and storing the tapes at a distant location is an example of ______.

a. Data Backup
b. Data Mapping
c. Data Recovery
d. Data Storage for Recovery

A

Data Backup

60
Q

The capture of data by a hospital’s data security system that shows multiple invalid attempts to access the patients’ database is an example of what type of security control?

a. Audit trail
b. Access Control
c. Auto-Authentication
d. Override function

A

Audit trail

61
Q

The HIPAA Security Rule contains the following safeguards except ______.

a. technical
b. administrative
c. physical
d. reliability

A

Reliability

62
Q

The enforcement agency for the security rule is _________.

a. Office of the Inspector General
b. Centers for Medicare and Medicaid Services
c. Office of Civil Rights
d. Office of Management and Budget

A

Office of Civil Rights

63
Q

With addressable standards, the covered entity may do all but which of the following?

a. implement the standard as written
b. implement an alternative standard
c. ignore the standard since it is addressable
d. determine the risk of not implementing is negligible

A

ignore the standard since it is addressable

64
Q

A nurse administrator who does not typically take call gets called in over the weekend to staff the emergency department. She does not have access to enter notes since this is not a part of her typical role. In order to meet the intent of the HIPAA Security Rule, the hospital policy should include _______.

a. a requirement for her to attend training before accessing ePHI.
b. a provision to allow her to share a password with another nurse.
c. a provision to allow her emergency access to the system.
d. a restriction on her ability to access ePHI.

A

A provision to allow her emergency access to the system.