HIPAA Security and Privacy Training

HIPAA Security and Privacy Training

University - Professional Development

20 Qs

quiz-placeholder

Similar activities

JET Covid-19 Rules

JET Covid-19 Rules

Professional Development

15 Qs

REVISION 4 : TOPIC 9 [ACCOUNTING FOR NON-CURRENT ASSETS]

REVISION 4 : TOPIC 9 [ACCOUNTING FOR NON-CURRENT ASSETS]

1st Grade - University

20 Qs

Insulin Launch Quiz

Insulin Launch Quiz

Professional Development

18 Qs

GE102 - Midterm Quiz

GE102 - Midterm Quiz

Professional Development

16 Qs

Labor Relations and Negotations 1

Labor Relations and Negotations 1

University - Professional Development

15 Qs

QUIZ 4 : TOPIC 10 [STANDARD COSTING & VARIANCE ANALYSIS]

QUIZ 4 : TOPIC 10 [STANDARD COSTING & VARIANCE ANALYSIS]

1st Grade - University

20 Qs

02. Quiz Sosialisasi

02. Quiz Sosialisasi

Professional Development

15 Qs

Nurture Quiz 2

Nurture Quiz 2

Professional Development

15 Qs

HIPAA Security and Privacy Training

HIPAA Security and Privacy Training

Assessment

Quiz

Professional Development

University - Professional Development

Practice Problem

Hard

Created by

Tricia VanCleef

Used 110+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

15 mins • 1 pt

Media Image

The HIPAA Security Rule requires covered entities to: (Select all that apply.)4

maintain reasonable and appropriate administrative, technical, and physical safeguards for protecting electronic protected health information (e-PHI).

Ensure the confidentiality, integrity, and availability of all e-PHI they create, receive, maintain or transmit.

Identify and protect against reasonably anticipated threats to the security or integrity of the information.

Protect against reasonably anticipated, impermissible uses or disclosures.

Ensure compliance by their workforce.

2.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Media Image

A covered entity must designate a ___________________ who is responsible for developing and implementing its security policies and procedures.4

physician

security official

police officer

custodian

3.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Media Image

The HIPAA Security Rule requires a covered entity to implement policies and procedures for authorizing access to e-PHI only when such access is appropriate based on the user or recipient's role (role-based access).4

True

False

4.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Media Image

A covered entity may disclose protected health information (PHI) without a patient's written permission for:1

Treatment purposes

Payment

Health care operations activities

All of the above

5.

MULTIPLE SELECT QUESTION

15 mins • 1 pt

Media Image

A covered entity must obtain the patient's written authorization for any use or disclosure of protected health information (PHI) in which circumstances? (Select all that apply.)1

Marketing activities

Research

PHI sales and licensing

Information sharing needed for treatment

6.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Media Image

The Privacy Rule does not restrict the use or disclosure of ____________________________, which neither identifies nor provides a reasonable basis to identify an individual.1

non-protected health information (non-PHI)

reverse PHI

regulated PHI

de-identified health information

7.

MULTIPLE SELECT QUESTION

15 mins • 1 pt

Media Image

Protected health information (PHI) is considered de-identified by HIPAA Privacy Rule standards by: (Select all that apply.)1

absence of actual knowledge by the covered entity that the remaining information could be used alone or in combination with other information to identify the individual

removal of only patient name and date of birth

a formal determination by a qualified expert

the removal of 18 specified individual identifiers

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?