HIPAA Security and Privacy Training

HIPAA Security and Privacy Training

University - Professional Development

20 Qs

quiz-placeholder

Similar activities

Ritual Review

Ritual Review

University

17 Qs

HIPAA Quiz

HIPAA Quiz

Professional Development

20 Qs

Olympus ACA - Skippy's Story Tellers - Day 14

Olympus ACA - Skippy's Story Tellers - Day 14

Professional Development

15 Qs

Tier 1 Week 1 Olympus ACA Day 5

Tier 1 Week 1 Olympus ACA Day 5

Professional Development

20 Qs

PTCE (NETI)

PTCE (NETI)

Professional Development

25 Qs

1st Celebration of Knowledge Review

1st Celebration of Knowledge Review

Professional Development

17 Qs

PHI 101

PHI 101

Professional Development

15 Qs

CC105_Quiz2

CC105_Quiz2

Professional Development

18 Qs

HIPAA Security and Privacy Training

HIPAA Security and Privacy Training

Assessment

Quiz

Professional Development

University - Professional Development

Hard

Created by

Tricia VanCleef

Used 106+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

15 mins • 1 pt

Media Image

The HIPAA Security Rule requires covered entities to: (Select all that apply.)4

maintain reasonable and appropriate administrative, technical, and physical safeguards for protecting electronic protected health information (e-PHI).

Ensure the confidentiality, integrity, and availability of all e-PHI they create, receive, maintain or transmit.

Identify and protect against reasonably anticipated threats to the security or integrity of the information.

Protect against reasonably anticipated, impermissible uses or disclosures.

Ensure compliance by their workforce.

2.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Media Image

A covered entity must designate a ___________________ who is responsible for developing and implementing its security policies and procedures.4

physician

security official

police officer

custodian

3.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Media Image

The HIPAA Security Rule requires a covered entity to implement policies and procedures for authorizing access to e-PHI only when such access is appropriate based on the user or recipient's role (role-based access).4

True

False

4.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Media Image

A covered entity may disclose protected health information (PHI) without a patient's written permission for:1

Treatment purposes

Payment

Health care operations activities

All of the above

5.

MULTIPLE SELECT QUESTION

15 mins • 1 pt

Media Image

A covered entity must obtain the patient's written authorization for any use or disclosure of protected health information (PHI) in which circumstances? (Select all that apply.)1

Marketing activities

Research

PHI sales and licensing

Information sharing needed for treatment

6.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Media Image

The Privacy Rule does not restrict the use or disclosure of ____________________________, which neither identifies nor provides a reasonable basis to identify an individual.1

non-protected health information (non-PHI)

reverse PHI

regulated PHI

de-identified health information

7.

MULTIPLE SELECT QUESTION

15 mins • 1 pt

Media Image

Protected health information (PHI) is considered de-identified by HIPAA Privacy Rule standards by: (Select all that apply.)1

absence of actual knowledge by the covered entity that the remaining information could be used alone or in combination with other information to identify the individual

removal of only patient name and date of birth

a formal determination by a qualified expert

the removal of 18 specified individual identifiers

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?