SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
HIPAA
Start Test
Study First
Subjects
:
certifications
,
hipaa
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Document that includes the standards
Rule
State preemption
Patient Identifiable Information
The body of laws made by states is their own statutory laws
2. Slander
Prohibits discrimination preventing indiviualds with physical or mental disabilities or chronic illness - from accessing public services & accomodations. Employers requires 'reasonable accommodation' be provided so they can perform duties.
security rule
false charges and malicious oral statements about someone
Every office should have one! - responsible for making surethat thise office is HIPAA compliant - privacy officer should be.. an effective communicator with ability to answer questions about sespected HIPPA violations and complaints
3. Data must be backed up at ___________ and those back-up files should be stored ________.
regular - in a secure location
must be reported to authorities by law
Medical data from which individual identifiers have been removed; also known as a redacted or blinded record.
Portability
4. Advanced directives
Electronic Protected Health Information
Patient
allows patients to give directions to health care providers about treatment choices in circumstances in which the patient may no longer be able to provide that direction. There are two types: Living Will and Durable Power of Attorney
Examples of PHI
5. A written document detailing a health care provider's privacy practices.
the philosophical study of moral values and rules - conducts
a contract that comes about from the actions of the parties rather than words
Code sets
Notice of Privacy Practices (NPP)
6. Misfeasance
Any information that would identify a patient (name - add - tele - DOB - SSN - email - med. rec. number - etc)
should only be used when no other - more secure mode of transmission is available
patient discharges doctor with letter - doctor formally withdraws from patient with a certified letter or patient no longer needs treatment
improper performance of an otherwise lawful act. civil
7. Deposition
Ethical
Privacy
testimony under oath
state laws setting time limit for bringing a lawsuit
8. 4d's of negligence
Duty; duty of care - Derelict; breach of the duty of care - Direct cause; legally recognizable injury occurs as a result of breach of care - Damage; wrongful activity must have been the cause
have a unique password and it should be changed frequently
Insurance portability - administrative simplification - privacy and security
concerned with mostly with h/c providers. It addresses fraud and abuse - administrative simplification and medical liability
9. If a states privacy laws are stricter than HIPAA privacy standards - the state laws take precedence.
Covered entities
Rule
Permission
State preemption
10. EPHI
law that permits a person w/ a legal age and sound mind to give their body to donation
it must have an accompanying disclaimer stating the fax information cannot be shared with any other party w/o patient's written consent
Electronic Protected Health Information
De-Identified Information
11. Privacy Officer
Every office should have one! - responsible for making surethat thise office is HIPAA compliant - privacy officer should be.. an effective communicator with ability to answer questions about sespected HIPPA violations and complaints
in order to maintain patient confidentiality - fax machines must be kept in areas not accessible to patients.
Invasion of Privacy Publishing
Patient Identifiable Information
12. What information do patients NOT have access to?
human immunodeficiency virus/acquired immune deficiency syndrome (HIV/AIDS)
State preemption
Psychotherapy notes - information for legal proceedings - information exempted from disclosure under CLIA
a contract that comes about from the actions of the parties rather than words
13. Coded information that can't be read until is decoded.
Patient Identifiable Information
Encryption
also called biomedical ethics - the moral dilemmas and issues of advanced medicine and medical research
Invasion of Privacy Publishing
14. Reportable diseases...
must be reported to authorities by law
De-Identified Information
Notice of Privacy Practices (NPP)
Covered transactions
15. Unlawful act done without permission.
Tort
Health Insurance Portability and Accountability Act of 1996 (passed by congress because of portability problems - also to protect PHI)
Malfeasance
Minimum necessary
16. Treatment means that a health care provider can provide care; payment means that a provider can disclose PHI to be reimbursed; health care operations refers to HIPAA approved activities and transactions.
Treatment - payment and health care operations (TPO)
Individually Identifiable Health Information
state law that protects healthcare professionals from liability when they provide emergency assistance/services within their scope of training
Type of consent in which a patient who is unable to give consent is given treatment under the legal assumption that he or she would want treatment.
17. Bioethics
in order to maintain patient confidentiality - fax machines must be kept in areas not accessible to patients.
Transaction
also called biomedical ethics - the moral dilemmas and issues of advanced medicine and medical research
Encryption
18. See & Copy their health records - update health records - obtain a list of the institution's disclosures - other than for payment & healthcare operations - request a restriction on a certain uses or disclosures - choose how to receive their health in
testimony under oath
same legal standards apply to all patient records whether on paper or computer
individuals such as cleaning staff and consultants who work in the office. These individuals do not need access to patient info but may come in contact while completing their duties
Patient rights under HIPAA
19. The use of uniform electronic network protocols to transfer business information between organizations.
Electronic Protected Health Information
Electronic data interchange
need to know
illegal touching of another person
20. The person recieving treatment
only those who meed to know should have access to patient information
Patient rights under HIPAA
Medical data from which individual identifiers have been removed; also known as a redacted or blinded record.
Patient
21. Disclosure without Consent
although medical records are confidential - there are times when they can be released w/o a patient consent.
concerned with mostly with h/c providers. It addresses fraud and abuse - administrative simplification and medical liability
Rule
must be reported to authorities by law
22. Protecting healthcare coverage for employees who change jobs - allowing them to continue existing plans with a new employer.
Portability
the philosophical study of moral values and rules - conducts
Prohibits discrimination preventing indiviualds with physical or mental disabilities or chronic illness - from accessing public services & accomodations. Employers requires 'reasonable accommodation' be provided so they can perform duties.
individuals in their mid- to late teens who legally live outside of parents' or guardians' control
23. Libel
failure to act with the standard of care that a reasonable person would exercise under the same circumstances
Type of consent in which a patient who is unable to give consent is given treatment under the legal assumption that he or she would want treatment.
false and malicious writing about another
state laws setting time limit for bringing a lawsuit
24. Electronic exchanges of information between two covered-entity business partners using HIPAA mandated transaction standards.
Covered transactions
individuals in their mid- to late teens who legally live outside of parents' or guardians' control
comes on after a few idle seconds and the use of a privacy screen should be mandatory
regular - in a secure location
25. IIHI
Type of consent in which a patient who is unable to give consent is given treatment under the legal assumption that he or she would want treatment.
Examples of PHI
generally only patient can auth release of own medical record - there are a few exceptions
Individually Identifiable Health Information
26. interrogatory
should never be released w/o a patient's signed consent or court order
A written set of questions requiring written answers from a plaintiff or defendant under oath
purpose - pride - patience - persistence - perspective
Patient rights under HIPAA
27. Guidelines and standards made by government agencies and licensing boards that have the authority to enforce compliance
Type of consent in which a patient who is unable to give consent is given treatment under the legal assumption that he or she would want treatment.
it must have an accompanying disclaimer stating the fax information cannot be shared with any other party w/o patient's written consent
Regulations
individuals in their mid- to late teens who legally live outside of parents' or guardians' control
28. Some state laws specifically protect __________. A patient would need to sign a specific request.
individuals in their mid- to late teens who legally live outside of parents' or guardians' control
Duty; duty of care - Derelict; breach of the duty of care - Direct cause; legally recognizable injury occurs as a result of breach of care - Damage; wrongful activity must have been the cause
Patient Identifiable Information
human immunodeficiency virus/acquired immune deficiency syndrome (HIV/AIDS)
29. Negligence
safeguards health & wealthfare of Medicare/Medicaid beneficiaries & protect program integrity
Duty; duty of care - Derelict; breach of the duty of care - Direct cause; legally recognizable injury occurs as a result of breach of care - Damage; wrongful activity must have been the cause
failure to act with the standard of care that a reasonable person would exercise under the same circumstances
Insurance portability - administrative simplification - privacy and security
30. Verify the identification of anyone requesting patient information.
Verification
Firewalls
treatment - payment - & healthcare operations
Minimum necessary
31. Ethics
the philosophical study of moral values and rules - conducts
Electronic Protected Health Information
Electronic data interchange
security rule
32. Policies and procedures use to protect electronic information from unauthorized access
should never be released w/o a patient's signed consent or court order
Invasion of Privacy Publishing
Electronic data interchange
Security
33. Releasing patient information
improper performance of an otherwise lawful act. civil
Limited data set
generally only patient can auth release of own medical record - there are a few exceptions
illegal touching of another person
34. Federal law protects patient records dealing with...
parent of a minor - legal guardian - Agent (patient selected on behalf in h/c power of attorney)
failure to act with the standard of care that a reasonable person would exercise under the same circumstances
Encryption
substance abuse treatment
35. Under some circumstances ...
security rule
What types of disclosures do not require patient permission?
located in a secured and private space
a minor - rather than the parent - must sign the release of patient information
36. Fax Machines and HIPAA
improper performance of an otherwise lawful act. civil
in order to maintain patient confidentiality - fax machines must be kept in areas not accessible to patients.
Covered entities
Firewalls
37. Includes records maintained by or for a covered entity.
Designated record set
Rule
Encryption
Any information that would identify a patient (name - add - tele - DOB - SSN - email - med. rec. number - etc)
38. Professional Negligence
Security
human immunodeficiency virus/acquired immune deficiency syndrome (HIV/AIDS)
judge made law from decisions of a court - interpretation of constitution and statuatory law - often known as precedents
malpractice
39. Hardware or software designed to prevent unauthorized access to electronic information.
although medical records are confidential - there are times when they can be released w/o a patient consent.
Firewalls
Patient rights under HIPAA
concerns noncriminal disputes between private parties
40. making known - or using information relating to the private life or affairs of a person without their approval or permission
A court order requiring someone to appear in court on a certain date time and reason. A medical record could be subpoenaed.
Insurance portability - administrative simplification - privacy and security
Invasion of Privacy Publishing
What types of disclosures do not require patient permission?
41. Emancipated minors
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
42. 5P's of ethical power
purpose - pride - patience - persistence - perspective
although medical records are confidential - there are times when they can be released w/o a patient consent.
same legal standards apply to all patient records whether on paper or computer
illegal touching of another person
43. Transmission of information between two parties fro financial or administrative activities.
Portability
patient discharges doctor with letter - doctor formally withdraws from patient with a certified letter or patient no longer needs treatment
Medical data from which individual identifiers have been removed; also known as a redacted or blinded record.
Transaction
44. Protected Health Information (PHI)
A court order requiring someone to appear in court on a certain date time and reason. A medical record could be subpoenaed.
Verification
Any information that would identify a patient (name - add - tele - DOB - SSN - email - med. rec. number - etc)
Notice of Privacy Practices
45. TPO
Designated record set
parent of a minor - legal guardian - Agent (patient selected on behalf in h/c power of attorney)
Every office should have one! - responsible for making surethat thise office is HIPAA compliant - privacy officer should be.. an effective communicator with ability to answer questions about sespected HIPPA violations and complaints
treatment - payment - & healthcare operations
46. Any wrongdoing for which an action for damages may be brought
State preemption
comes on after a few idle seconds and the use of a privacy screen should be mandatory
Tort
need to know
47. Good samaritan law
located in a secured and private space
Health Insurance Portability and Accountability Act of 1996 (passed by congress because of portability problems - also to protect PHI)
Type of consent in which a patient who is unable to give consent is given treatment under the legal assumption that he or she would want treatment.
state law that protects healthcare professionals from liability when they provide emergency assistance/services within their scope of training
48. Statue of limitations
state laws setting time limit for bringing a lawsuit
Electronic data interchange
Limited data set
a contract that comes about from the actions of the parties rather than words
49. Any set of codes use to encode health care data elements.
A written set of questions requiring written answers from a plaintiff or defendant under oath
Treatment - payment and health care operations (TPO)
concerned with mostly with h/c providers. It addresses fraud and abuse - administrative simplification and medical liability
Code sets
50. Common law
judge made law from decisions of a court - interpretation of constitution and statuatory law - often known as precedents
same legal standards apply to all patient records whether on paper or computer
should only be used when no other - more secure mode of transmission is available
Security