HIPAA Security and Privacy Training

HIPAA Security and Privacy Training

University - Professional Development

20 Qs

quiz-placeholder

Similar activities

LAHTM Tourism and Hospitality as a Trade

LAHTM Tourism and Hospitality as a Trade

University

20 Qs

BJT - BASICS

BJT - BASICS

Professional Development

15 Qs

Collocation

Collocation

Professional Development

18 Qs

contract law 3-elements

contract law 3-elements

Professional Development

20 Qs

Emerging Tech

Emerging Tech

Professional Development

15 Qs

Agenda and Minutes - Intra Office Communication

Agenda and Minutes - Intra Office Communication

8th Grade - University

18 Qs

Jolly Crispy Fries

Jolly Crispy Fries

Professional Development

15 Qs

Marketing Managemetn Minigame 2

Marketing Managemetn Minigame 2

University

20 Qs

HIPAA Security and Privacy Training

HIPAA Security and Privacy Training

Assessment

Quiz

Professional Development

University - Professional Development

Practice Problem

Hard

Created by

Tricia VanCleef

Used 109+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

15 mins • 1 pt

Media Image

The HIPAA Security Rule requires covered entities to: (Select all that apply.)4

maintain reasonable and appropriate administrative, technical, and physical safeguards for protecting electronic protected health information (e-PHI).

Ensure the confidentiality, integrity, and availability of all e-PHI they create, receive, maintain or transmit.

Identify and protect against reasonably anticipated threats to the security or integrity of the information.

Protect against reasonably anticipated, impermissible uses or disclosures.

Ensure compliance by their workforce.

2.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Media Image

A covered entity must designate a ___________________ who is responsible for developing and implementing its security policies and procedures.4

physician

security official

police officer

custodian

3.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Media Image

The HIPAA Security Rule requires a covered entity to implement policies and procedures for authorizing access to e-PHI only when such access is appropriate based on the user or recipient's role (role-based access).4

True

False

4.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Media Image

A covered entity may disclose protected health information (PHI) without a patient's written permission for:1

Treatment purposes

Payment

Health care operations activities

All of the above

5.

MULTIPLE SELECT QUESTION

15 mins • 1 pt

Media Image

A covered entity must obtain the patient's written authorization for any use or disclosure of protected health information (PHI) in which circumstances? (Select all that apply.)1

Marketing activities

Research

PHI sales and licensing

Information sharing needed for treatment

6.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Media Image

The Privacy Rule does not restrict the use or disclosure of ____________________________, which neither identifies nor provides a reasonable basis to identify an individual.1

non-protected health information (non-PHI)

reverse PHI

regulated PHI

de-identified health information

7.

MULTIPLE SELECT QUESTION

15 mins • 1 pt

Media Image

Protected health information (PHI) is considered de-identified by HIPAA Privacy Rule standards by: (Select all that apply.)1

absence of actual knowledge by the covered entity that the remaining information could be used alone or in combination with other information to identify the individual

removal of only patient name and date of birth

a formal determination by a qualified expert

the removal of 18 specified individual identifiers

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?