SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
HIPAA
Start Test
Study First
Subjects
:
certifications
,
hipaa
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Verify the identification of anyone requesting patient information.
Electronic transmission
Verification
a contract that comes about from the actions of the parties rather than words
Portability
2. Emancipated minors
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
3. Statue of limitations
a service company that recieves electronic or paper claims from the provider - checks and prepares them for processing - and transmits them in HIPAA-complaint format to the correct carriers
state laws setting time limit for bringing a lawsuit
addresses portability of insurance coverage when employees change or lose their jobs
substance abuse treatment
4. Medical records used for health care research
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
5. Slander
false charges and malicious oral statements about someone
only those who meed to know should have access to patient information
Malfeasance
State preemption
6. Transmission of information between two parties fro financial or administrative activities.
the philosophical study of moral values and rules - conducts
Security
Transaction
h/c workers --qualified people of organizations(perf. data processinf or transcript) -certain gov. auth. (pub health activities) -appropriate auth(protect vic. of abuse) -law enforcement officials or judicial orders
7. The ability to control access and protect information from accidental or intentional disclosure to unauthorized persons and from altercation - destruction - or loss
Invasion of Privacy Publishing
security rule
the philosophical study of moral values and rules - conducts
h/c workers --qualified people of organizations(perf. data processinf or transcript) -certain gov. auth. (pub health activities) -appropriate auth(protect vic. of abuse) -law enforcement officials or judicial orders
8. Common law
De-Identified Information
Individually Identifiable Health Information
generally only patient can auth release of own medical record - there are a few exceptions
judge made law from decisions of a court - interpretation of constitution and statuatory law - often known as precedents
9. OIG - Office of the Inspector General
safeguards health & wealthfare of Medicare/Medicaid beneficiaries & protect program integrity
Health Insurance Portability and Accountability Act of 1996 (passed by congress because of portability problems - also to protect PHI)
only those who meed to know should have access to patient information
security rule
10. EPHI
concerns noncriminal disputes between private parties
Electronic Protected Health Information
patient discharges doctor with letter - doctor formally withdraws from patient with a certified letter or patient no longer needs treatment
Limited data set
11. A general HIPAA requirement
in order to maintain patient confidentiality - fax machines must be kept in areas not accessible to patients.
false and malicious writing about another
Covered transactions
Standard
12. interrogatory
safeguards health & wealthfare of Medicare/Medicaid beneficiaries & protect program integrity
concerned with mostly with h/c providers. It addresses fraud and abuse - administrative simplification and medical liability
A written set of questions requiring written answers from a plaintiff or defendant under oath
Patient
13. Under some circumstances ...
Examples of PHI
illegal touching of another person
a minor - rather than the parent - must sign the release of patient information
human immunodeficiency virus/acquired immune deficiency syndrome (HIV/AIDS)
14. Federal law protects patient records dealing with...
What types of disclosures do not require patient permission?
judge made law from decisions of a court - interpretation of constitution and statuatory law - often known as precedents
substance abuse treatment
Malfeasance
15. Titile II of HIPAA
Standard
concerned with mostly with h/c providers. It addresses fraud and abuse - administrative simplification and medical liability
Tort
U.S. Department of Health and Human Services (HHS; established national standards for HIPAA) - Centers for Medicare and Medicaid Services (CMS; enforce insurance portability and transaction/code set requirements) - Office for Civil Rights (OCR; enfor
16. Name - address - date of birth - phone/fax numbers - social security number - medical record number - and photographs - nursing and physician notes - billing and other treatment records used during a patient's visit in a hospital or office.
purpose - pride - patience - persistence - perspective
Malfeasance
Encryption
Examples of PHI
17. HI
improper performance of an otherwise lawful act. civil
Tort
Health Information
parent of a minor - legal guardian - Agent (patient selected on behalf in h/c power of attorney)
18. De-Identified Information
Medical data from which individual identifiers have been removed; also known as a redacted or blinded record.
Individually Identifiable Health Information
Electronic data interchange
individuals such as cleaning staff and consultants who work in the office. These individuals do not need access to patient info but may come in contact while completing their duties
19. Any set of codes use to encode health care data elements.
Notice of Privacy Practices (NPP)
Code sets
may be disclosed to public health agencies - patient identifiers are removed so it's covered by HIPAA
testimony under oath
20. Policies and procedures use to protect electronic information from unauthorized access
Security
Any information that would identify a patient (name - add - tele - DOB - SSN - email - med. rec. number - etc)
comes on after a few idle seconds and the use of a privacy screen should be mandatory
Duty; duty of care - Derelict; breach of the duty of care - Direct cause; legally recognizable injury occurs as a result of breach of care - Damage; wrongful activity must have been the cause
21. Good samaritan law
Psychotherapy notes - information for legal proceedings - information exempted from disclosure under CLIA
Permission
Privacy
state law that protects healthcare professionals from liability when they provide emergency assistance/services within their scope of training
22. Treatment means that a health care provider can provide care; payment means that a provider can disclose PHI to be reimbursed; health care operations refers to HIPAA approved activities and transactions.
Treatment - payment and health care operations (TPO)
Psychotherapy notes - information for legal proceedings - information exempted from disclosure under CLIA
Permission
Covered entities
23. Freedom from unauthorized intrusion
Privacy
substance abuse treatment
Firewalls
regular - in a secure location
24. Implied consent
parent of a minor - legal guardian - Agent (patient selected on behalf in h/c power of attorney)
Every office should have one! - responsible for making surethat thise office is HIPAA compliant - privacy officer should be.. an effective communicator with ability to answer questions about sespected HIPPA violations and complaints
Security
Type of consent in which a patient who is unable to give consent is given treatment under the legal assumption that he or she would want treatment.
25. Reportable diseases...
must be reported to authorities by law
comes on after a few idle seconds and the use of a privacy screen should be mandatory
Duty; duty of care - Derelict; breach of the duty of care - Direct cause; legally recognizable injury occurs as a result of breach of care - Damage; wrongful activity must have been the cause
Ethical
26. Conforming to proper professional behavior
Ethical
Prohibits discrimination preventing indiviualds with physical or mental disabilities or chronic illness - from accessing public services & accomodations. Employers requires 'reasonable accommodation' be provided so they can perform duties.
Tort
U.S. goverment
27. TPO
state laws setting time limit for bringing a lawsuit
treatment - payment - & healthcare operations
De-Identified Information
Malfeasance
28. PII
concerns noncriminal disputes between private parties
Patient Identifiable Information
Limited data set
Patient
29. HIPAA compliance mandates that computer systems must be...
improper performance of an otherwise lawful act. civil
located in a secured and private space
Firewalls
Regulations
30. Protected Health Information (PHI)
State preemption
Any information that would identify a patient (name - add - tele - DOB - SSN - email - med. rec. number - etc)
Notice of Privacy Practices (NPP)
only those who meed to know should have access to patient information
31. Business Associate Agreements applies to...
Code sets
Duty; duty of care - Derelict; breach of the duty of care - Direct cause; legally recognizable injury occurs as a result of breach of care - Damage; wrongful activity must have been the cause
individuals such as cleaning staff and consultants who work in the office. These individuals do not need access to patient info but may come in contact while completing their duties
Designated record set
32. Criminal law
Security
Regulations
law concerned with public wrongs against society
Covered entities
33. Statutory
purpose - pride - patience - persistence - perspective
Insurance portability - administrative simplification - privacy and security
Ethical
The body of laws made by states is their own statutory laws
34. Implied contract
Notice of Privacy Practices (NPP)
a contract that comes about from the actions of the parties rather than words
regular - in a secure location
Privacy
35. Libel
although medical records are confidential - there are times when they can be released w/o a patient consent.
false and malicious writing about another
Invasion of Privacy Publishing
Encryption
36. Disclosure without Consent
although medical records are confidential - there are times when they can be released w/o a patient consent.
it must have an accompanying disclaimer stating the fax information cannot be shared with any other party w/o patient's written consent
Regulations
only those who meed to know should have access to patient information
37. Advanced directives
allows patients to give directions to health care providers about treatment choices in circumstances in which the patient may no longer be able to provide that direction. There are two types: Living Will and Durable Power of Attorney
law that permits a person w/ a legal age and sound mind to give their body to donation
Regulations
a minor - rather than the parent - must sign the release of patient information
38. See & Copy their health records - update health records - obtain a list of the institution's disclosures - other than for payment & healthcare operations - request a restriction on a certain uses or disclosures - choose how to receive their health in
substance abuse treatment
De-Identified Information
state laws setting time limit for bringing a lawsuit
Patient rights under HIPAA
39. DII
Notice of Privacy Practices (NPP)
Tort
although medical records are confidential - there are times when they can be released w/o a patient consent.
De-Identified Information
40. Negligence
U.S. goverment
failure to act with the standard of care that a reasonable person would exercise under the same circumstances
Patient
Malfeasance
41. Some state laws specifically protect __________. A patient would need to sign a specific request.
state laws setting time limit for bringing a lawsuit
Any information that would identify a patient (name - add - tele - DOB - SSN - email - med. rec. number - etc)
State preemption
human immunodeficiency virus/acquired immune deficiency syndrome (HIV/AIDS)
42. What information do patients NOT have access to?
malpractice
Psychotherapy notes - information for legal proceedings - information exempted from disclosure under CLIA
may be disclosed to public health agencies - patient identifiers are removed so it's covered by HIPAA
Code sets
43. Coded information that can't be read until is decoded.
Patient
substance abuse treatment
human immunodeficiency virus/acquired immune deficiency syndrome (HIV/AIDS)
Encryption
44. Ethics
Electronic data interchange
human immunodeficiency virus/acquired immune deficiency syndrome (HIV/AIDS)
addresses portability of insurance coverage when employees change or lose their jobs
the philosophical study of moral values and rules - conducts
45. Unlawful act done without permission.
Malfeasance
Permission
only those who meed to know should have access to patient information
a contract that comes about from the actions of the parties rather than words
46. Clearinghouse
only those who meed to know should have access to patient information
Limited data set
Regulations
a service company that recieves electronic or paper claims from the provider - checks and prepares them for processing - and transmits them in HIPAA-complaint format to the correct carriers
47. HIPAA
Ethical
Health Insurance Portability and Accountability Act of 1996 (passed by congress because of portability problems - also to protect PHI)
need to know
same legal standards apply to all patient records whether on paper or computer
48. The computer screen should have a screensaver that...
although medical records are confidential - there are times when they can be released w/o a patient consent.
U.S. goverment
concerned with mostly with h/c providers. It addresses fraud and abuse - administrative simplification and medical liability
comes on after a few idle seconds and the use of a privacy screen should be mandatory
49. HIPAA states...
Encryption
only those who meed to know should have access to patient information
h/c workers --qualified people of organizations(perf. data processinf or transcript) -certain gov. auth. (pub health activities) -appropriate auth(protect vic. of abuse) -law enforcement officials or judicial orders
Invasion of Privacy Publishing
50. 5P's of ethical power
addresses portability of insurance coverage when employees change or lose their jobs
it must have an accompanying disclaimer stating the fax information cannot be shared with any other party w/o patient's written consent
purpose - pride - patience - persistence - perspective
Privacy