SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
HIPAA
Start Test
Study First
Subjects
:
certifications
,
hipaa
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What are the 3 purposes of HIPAA?
Firewalls
Insurance portability - administrative simplification - privacy and security
state law that protects healthcare professionals from liability when they provide emergency assistance/services within their scope of training
although medical records are confidential - there are times when they can be released w/o a patient consent.
2. Coded information that can't be read until is decoded.
should never be released w/o a patient's signed consent or court order
Encryption
false and malicious writing about another
human immunodeficiency virus/acquired immune deficiency syndrome (HIV/AIDS)
3. Treatment means that a health care provider can provide care; payment means that a provider can disclose PHI to be reimbursed; health care operations refers to HIPAA approved activities and transactions.
Regulations
Treatment - payment and health care operations (TPO)
Malfeasance
Notice of Privacy Practices
4. Gunshot wound - child abuse - infectious diseases - required by law - law enforcement purposes.
the philosophical study of moral values and rules - conducts
Electronic transmission
it must have an accompanying disclaimer stating the fax information cannot be shared with any other party w/o patient's written consent
What types of disclosures do not require patient permission?
5. If a states privacy laws are stricter than HIPAA privacy standards - the state laws take precedence.
state laws setting time limit for bringing a lawsuit
human immunodeficiency virus/acquired immune deficiency syndrome (HIV/AIDS)
Notice of Privacy Practices (NPP)
State preemption
6. Good samaritan law
state law that protects healthcare professionals from liability when they provide emergency assistance/services within their scope of training
concerned with mostly with h/c providers. It addresses fraud and abuse - administrative simplification and medical liability
addresses portability of insurance coverage when employees change or lose their jobs
Electronic data interchange
7. OIG - Office of the Inspector General
De-Identified Information
have a unique password and it should be changed frequently
Minimum necessary
safeguards health & wealthfare of Medicare/Medicaid beneficiaries & protect program integrity
8. Some state laws specifically protect __________. A patient would need to sign a specific request.
human immunodeficiency virus/acquired immune deficiency syndrome (HIV/AIDS)
law concerned with public wrongs against society
should never be released w/o a patient's signed consent or court order
The body of laws made by states is their own statutory laws
9. Policies and procedures use to protect electronic information from unauthorized access
may be disclosed to public health agencies - patient identifiers are removed so it's covered by HIPAA
Encryption
Security
Limited data set
10. Business Associate Agreements applies to...
security rule
Minimum necessary
individuals such as cleaning staff and consultants who work in the office. These individuals do not need access to patient info but may come in contact while completing their duties
should never be released w/o a patient's signed consent or court order
11. Includes records maintained by or for a covered entity.
Electronic Protected Health Information
Designated record set
The body of laws made by states is their own statutory laws
should only be used when no other - more secure mode of transmission is available
12. Unlawful act done without permission.
h/c workers --qualified people of organizations(perf. data processinf or transcript) -certain gov. auth. (pub health activities) -appropriate auth(protect vic. of abuse) -law enforcement officials or judicial orders
Malfeasance
What types of disclosures do not require patient permission?
Firewalls
13. Conforming to proper professional behavior
A written set of questions requiring written answers from a plaintiff or defendant under oath
generally only patient can auth release of own medical record - there are a few exceptions
Ethical
Regulations
14. Releasing patient information
individuals in their mid- to late teens who legally live outside of parents' or guardians' control
U.S. goverment
A court order requiring someone to appear in court on a certain date time and reason. A medical record could be subpoenaed.
generally only patient can auth release of own medical record - there are a few exceptions
15. IIHI
need to know
Individually Identifiable Health Information
safeguards health & wealthfare of Medicare/Medicaid beneficiaries & protect program integrity
Invasion of Privacy Publishing
16. Statutory
Code sets
state law that protects healthcare professionals from liability when they provide emergency assistance/services within their scope of training
The body of laws made by states is their own statutory laws
Treatment - payment and health care operations (TPO)
17. Medical records used for health care research
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
18. Common law
false charges and malicious oral statements about someone
U.S. Department of Health and Human Services (HHS; established national standards for HIPAA) - Centers for Medicare and Medicaid Services (CMS; enforce insurance portability and transaction/code set requirements) - Office for Civil Rights (OCR; enfor
Patient Identifiable Information
judge made law from decisions of a court - interpretation of constitution and statuatory law - often known as precedents
19. Sending information over electronic networks.
the philosophical study of moral values and rules - conducts
Electronic transmission
Limited data set
Examples of PHI
20. Libel
false and malicious writing about another
Limited data set
A written set of questions requiring written answers from a plaintiff or defendant under oath
Standard
21. Name - address - date of birth - phone/fax numbers - social security number - medical record number - and photographs - nursing and physician notes - billing and other treatment records used during a patient's visit in a hospital or office.
Psychotherapy notes - information for legal proceedings - information exempted from disclosure under CLIA
Tort
Minimum necessary
Examples of PHI
22. Data must be backed up at ___________ and those back-up files should be stored ________.
concerned with mostly with h/c providers. It addresses fraud and abuse - administrative simplification and medical liability
Privacy
regular - in a secure location
a minor - rather than the parent - must sign the release of patient information
23. 5P's of ethical power
need to know
law concerned with public wrongs against society
failure to act with the standard of care that a reasonable person would exercise under the same circumstances
purpose - pride - patience - persistence - perspective
24. Fax machines
Portability
should only be used when no other - more secure mode of transmission is available
Minimum necessary
Medical data from which individual identifiers have been removed; also known as a redacted or blinded record.
25. The limited amount of patient information to be disclosed - depending on circumstances.
Health Information
have a unique password and it should be changed frequently
Minimum necessary
Medical data from which individual identifiers have been removed; also known as a redacted or blinded record.
26. Implied consent
Type of consent in which a patient who is unable to give consent is given treatment under the legal assumption that he or she would want treatment.
Health Information
state laws setting time limit for bringing a lawsuit
Notice of Privacy Practices (NPP)
27. Document that includes the standards
the philosophical study of moral values and rules - conducts
treatment - payment - & healthcare operations
Rule
purpose - pride - patience - persistence - perspective
28. The use of uniform electronic network protocols to transfer business information between organizations.
h/c workers --qualified people of organizations(perf. data processinf or transcript) -certain gov. auth. (pub health activities) -appropriate auth(protect vic. of abuse) -law enforcement officials or judicial orders
regular - in a secure location
Designated record set
Electronic data interchange
29. Advanced directives
improper performance of an otherwise lawful act. civil
allows patients to give directions to health care providers about treatment choices in circumstances in which the patient may no longer be able to provide that direction. There are two types: Living Will and Durable Power of Attorney
judge made law from decisions of a court - interpretation of constitution and statuatory law - often known as precedents
Any information that would identify a patient (name - add - tele - DOB - SSN - email - med. rec. number - etc)
30. Deposition
Examples of PHI
Tort
Security
testimony under oath
31. All persons who will have access are required to...
human immunodeficiency virus/acquired immune deficiency syndrome (HIV/AIDS)
have a unique password and it should be changed frequently
in order to maintain patient confidentiality - fax machines must be kept in areas not accessible to patients.
Firewalls
32. The ability to control access and protect information from accidental or intentional disclosure to unauthorized persons and from altercation - destruction - or loss
A written set of questions requiring written answers from a plaintiff or defendant under oath
generally only patient can auth release of own medical record - there are a few exceptions
security rule
Portability
33. DII
Individually Identifiable Health Information
in order to maintain patient confidentiality - fax machines must be kept in areas not accessible to patients.
Code sets
De-Identified Information
34. Confidentiality
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
35. Disabilities act
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
36. Electronic exchanges of information between two covered-entity business partners using HIPAA mandated transaction standards.
located in a secured and private space
also called biomedical ethics - the moral dilemmas and issues of advanced medicine and medical research
Covered transactions
only those who meed to know should have access to patient information
37. Any wrongdoing for which an action for damages may be brought
The body of laws made by states is their own statutory laws
addresses portability of insurance coverage when employees change or lose their jobs
Tort
Standard
38. Protecting healthcare coverage for employees who change jobs - allowing them to continue existing plans with a new employer.
also called biomedical ethics - the moral dilemmas and issues of advanced medicine and medical research
Invasion of Privacy Publishing
Portability
it must have an accompanying disclaimer stating the fax information cannot be shared with any other party w/o patient's written consent
39. The person recieving treatment
Patient
Verification
Transaction
Treatment - payment and health care operations (TPO)
40. De-Identified Information
Verification
Medical data from which individual identifiers have been removed; also known as a redacted or blinded record.
law that permits a person w/ a legal age and sound mind to give their body to donation
Encryption
41. Title I of HIPAA
state law that protects healthcare professionals from liability when they provide emergency assistance/services within their scope of training
addresses portability of insurance coverage when employees change or lose their jobs
Verification
Security
42. Guidelines and standards made by government agencies and licensing boards that have the authority to enforce compliance
Security
Regulations
Electronic Protected Health Information
addresses portability of insurance coverage when employees change or lose their jobs
43. Subpoenas
What types of disclosures do not require patient permission?
A court order requiring someone to appear in court on a certain date time and reason. A medical record could be subpoenaed.
a minor - rather than the parent - must sign the release of patient information
A written set of questions requiring written answers from a plaintiff or defendant under oath
44. EPHI
Standard
Ethical
Electronic Protected Health Information
although medical records are confidential - there are times when they can be released w/o a patient consent.
45. Freedom from unauthorized intrusion
Limited data set
Privacy
Portability
illegal touching of another person
46. General exceptions for releasing patient information
The body of laws made by states is their own statutory laws
testimony under oath
Covered entities
parent of a minor - legal guardian - Agent (patient selected on behalf in h/c power of attorney)
47. A general HIPAA requirement
Standard
safeguards health & wealthfare of Medicare/Medicaid beneficiaries & protect program integrity
Verification
Designated record set
48. In order for a fax document to be HIPAA compliant...
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
49. Civil law
state laws setting time limit for bringing a lawsuit
have a unique password and it should be changed frequently
Firewalls
concerns noncriminal disputes between private parties
50. Medical records can be released w/o consent to...
in order to maintain patient confidentiality - fax machines must be kept in areas not accessible to patients.
h/c workers --qualified people of organizations(perf. data processinf or transcript) -certain gov. auth. (pub health activities) -appropriate auth(protect vic. of abuse) -law enforcement officials or judicial orders
Verification
Electronic transmission