Deck 1: Certified HIPAA Professional (CHP)

Full screen (f)
exit full mode
Question
A hospital is preparing a file of treatment information for the state of California. This file is to be sent to external medical researchers. The hospital has removed SSN, name, phone and other information that specifically identifies an individual. However, there may still be data in the file that potentially could identify the individual. Can the hospital claim 'safe harbor" and release the file to the researchers?

A) Yes the hospital's actions satisfy the "safe harbor" method of de-identification.
B) No - a person with appropriate knowledge and experience must determine that the information that remains can identify an individual.
C) No - authorization to release the information is still required by HIPAA.
D) No - to satisfy "safe harbor the hospital must also have no knowledge of a way to use the remaining data to identify an individual.
E) Yes - medical researchers are covered entities and "research" is considered a part of "treatment" by HIPAA.
Use Space or
up arrow
down arrow
to flip the card.
Question
The National Provider File (NPF) includes information such as:

A) Effective date
B) CPT-4
C) CDT
D) ICD-9-CM
E) Enrollment date
Question
Select the correct statement regarding code sets and identifiers.

A) A covered entity must use the applicable code set that is valid at the time the transaction is initiated.
B) April 14, 2003 is the compliance date for implementation of the National Provider Identifier.
C) CMS is responsible for updating the CPT-4 code sets.
D) An organization that assigns NPIs is referred to as National Provider for Identifiers.
E) HHS assigns the Employer Identification Number (EIN), which has been selected as the National Provider Identifier for Health Care.
Question
The Data Backup Plan is part of which Security Standard?

A) Contingency Plan
B) Evaluation
C) Security Management Procedures
D) Facility Access Control
E) Security Incident Procedures
Question
The objective of this HIPAA security standard is to implement policies and procedures to prevent, detect, contain, and correct security Violations.

A) Security Incident Procedures
B) Assigned Security Responsibility
C) Security Management Process
D) Access Control
E) Facility Access Control
Question
Select the FALSE statement regarding the administrative requirements of the HIPAA privacy rule.

A) A covered entity must mitigate, to the extent practicable, any harmful effect that it becomes aware of from the use or disclosure of PHI in violation of its policies and procedures or HIPAA regulations.
B) A covered must not in any way intimidate, retaliate, or discriminate against any individual or other entity, which tiles a compliant.
C) A covered entity may not require individuals to waive their rights as a condition for treatments payment, enrollment in a health plan, or eligibility for benefits.
D) A covered entity must retain the documents required by the regulations for a period of six years.
E) A covered entity must change its policies and procedures to comply with HIPAA regulations no later than three years after the change in law.
Question
This code set is used to describe or identity radiological procedures and clinical laboratory tests:

A) ICD-9-CM. Volumes 1 and 2
B) CPT-4
C) CDT
D) ICD-9-CM, Volume 3
E) HCPCS
Question
This security standard requires that the covered entity establishes agreements with each organization with which it exchanges data electronically, protecting the security of all such data:

A) Security incident Procedures
B) Integrity
C) Person or Entity Authentication
D) Assigned Security Responsibility
E) Business Associate Contracts and other Arrangements
Question
This rule covers the policies and procedures that must be in place to ensure that the patients' health information is respected and their rights upheld:

A) Security rule.
B) Privacy rule.
C) Covered entity rule.
D) Electronic Transactions and Code Sets rule.
E) Electronic Signature Rule
Question
The implementation specifications for this HIPAA security standard (within Technical Safeguards) must support emergency access and unique user identification.

A) Audit Control
B) integrity
C) Access Control
D) Person or Entity Authentication
E) Transmission Security
Question
The code set that must be used to describe or identify outpatient physician services and procedures is:

A) lCD-SCM, Volumes 1 and 2
B) CPT-4
C) CDT
D) lCD-SCM, Volume 3
E) NDC
Question
Select the FALSE statement regarding code sets and identifiers.

A) The CPT-4 code set is maintained by the American Medical Association (AMA).
B) A covered entity must use the applicable medical code set that is valid at the time the health care is delivered.
C) The National Provider Identifier (NPI) will be assigned by the National Provider System (NPS).
D) The Centers for Medicare and Medicaid Services is responsible for updating the HCPCS code set.
E) The National Provider Identifier (NPI) will be assigned to health plans.
Question
This transaction type is a "response" transaction that may include information such as accepted/rejected claim, approved claim(s) pre-payment, or approved claim(s) post-payment:

A) 270.
B) 820.
C) 837.
D) 277.
E) 278.
Question
This security rule standard requires policies and procedures for authorizing access to electronic protected health information that are consistent with its required implementation specifications- which are Isolating Health Care Clearinghouse Function, Access Authorization, and Access Establishment and Modification

A) Access Control
B) Security Incident Procedures
C) information Access Management
D) Workforce Security
E) Security Management Process
Question
Select the correct statement regarding the requirements for oral communication in the HIPAA regulations.

A) Covered entities must reasonably safeguard PHI, including oral communications, from any intentional or unintentional use or disclosure that is in violation of the Privacy Rule.
B) Covered entities must have in place appropriate administrative, technical, and physical safeguards to protect the privacy of de-Identified data.
C) Covered entities are prohibited from marketing through oral communications.
D) The Privacy Rule requires covered entities to document any information, including oral communications, which is used or disclosed for TPO purposes.
E) The Privacy Rule will often require major structural changes, such as soundproof rooms and encryption of telephone systems, to provide the "reasonable safeguards" of oral communications required by the regulations.
Question
In an emergency treatment situation, a health care provider:

A) Must obtain the signature of the patient before disclosing PHI to another provider.
B) Must contact a relative of the patient before disclosing PHI to another provider.
C) May use their best judgment in order to provide appropriate treatment.
D) May use PHI but may not disclose it to another provider
E) Must inform the patient about the Notice of Privacy Practices before delivering treatment.
Question
Which of the following is NOT a HIPAA national health care identifier?

A) National Provider Identifier (NPI)
B) Social Security Number (SSN)
C) National Health Plan Identifier (PlanID)
D) National Employer Identifier for Health Care (EIN)
E) National Health Identifier for Individuals (NI-UI)
Question
Patient identifiable information may include:

A) Country of birth
B) Telephone number
C) Information on past 3 employers
D) Patient credit reports
E) Smart card-based digital signatures
Question
The Security Incident Procedures standard requires just one implementation specification. That implementation specification is:

A) Termination Procedures
B) Automatic Logoff
C) Emergency Access Procedure
D) Contingency Operations
E) Response and Reporting
Question
HIPAA Security standards are designed to be:

A) Technology specific
B) State of the art
C) Non-Comprehensive
D) Revolutionary
E) Scalable
Question
A business associate must agree to:

A) Report to the covered entity any security incident of which it becomes aware.
B) Ensure the complete safety of all electronic protected health information.
C) Compensate the covered entity for penalties incurred because of the business associate's security incidents.
D) Register as a business associate with HHS.
E) Submit to periodic audits by HHS of critical systems containing electronic protected health information.
Question
Which of the following is example of "Payment" as defined in the HIPAA regulations?

A) Annual Audits
B) Claims Management
C) Salary disbursement to the workforce having direct treatment relationships.
D) Life Insurance underwriting
E) Cash given to the pharmacist for the purchase of an over-the-counter drug medicine
Question
Individually identifiable health information (IIHI) includes information that is:

A) Transmitted to a business associate for payment purposes only.
B) Stored on a smart card only by the patient.
C) Created or received by a credit company that provided a personal loan for surgical procedures.
D) Created or received by a health care clearinghouse for claim processing.
E) Requires the use of biometrics for access to records.
Question
Select the correct statement regarding the administrative requirements of the HIPAA privacy rule

A) A covered entity must apply disciplinary sanctions against members of its workforce who fail to comply with the privacy policies and procedures of the covered entity.
B) A covered entity need not train all members of its workforce whose functions are materially affected by a change in policy or procedure.
C) A covered entity must designate, and document, a contact person responsible for receiving acknowledgements of Notice of Privacy Practice.
D) A covered entity may require individuals to waive their rights.
E) A covered entity must provide maximum safeguards for PHI from any intentional or unintentional use or disclosure that is in violation of the regulations and to limit incidental uses and disclosures made pursuant to permitted or required use or disclosure.
Question
Which one of the following is a required implementation specification of the Security Management Process?

A) Risk Analysis
B) Access Control and Validation Procedures
C) Integrity Controls
D) Access Authorization
E) Termination Procedures
Question
The Security Rule requires that the covered entity identifies a security official who is responsible for the development and implementation of the policies and procedures. This is addressed under which security standard?

A) Security incident Procedures
B) Response and Reporting
C) Assigned Security Responsibility
D) Termination Procedures
E) Facility Access Controls
Question
The Health Care Claim Status Response (277) can be used in a number of ways. Select the correct usage.

A) As a response to a health care claim status request.
B) As a health care claim payment advice.
C) Electronic funds transfer.
D) As a request for health care claims status.
E) Request for the psychotherapy notes of a patient.
Question
A covered entity' that fails to implement the HIPAA Privacy Rule would risk:

A) $50O0 in fines.
B) $5000 in fines and six months in prison.
C) An annual cap of $5000 in fines.
D) A fine of up to $50000 if they wrongfully disclose PHI.
E) Six months in prison.
Question
Select the correct statement regarding the responsibilities of providers and payers under HIPAA's privacy rule.

A) Optionally, they might develop a mechanism of accounting for all disclosures of PHI for purposes other than TPO.
B) They must redesign their offices, workspaces, and storage systems to afford maximum protection to PHI from intentional and unintentional use and disclosure.
C) They must develop methods for disclosing only the minimum amount of protected information necessary to accomplish any intended purpose.
D) They must obtain a "top secret" security clearance for all member of their workforce.
E) They must identify business associates that need to use PHI to accomplish their function and develop authorization forms to allow PHI to be shared with these business associates.
Question
Within the context of a transaction set, the fields that comprise a hierarchical level are referred to as a(n):

A) Loop
B) Enumerator
C) Identifier
D) Data segment
E) Code set
Question
Information in this transaction is generated by the payer's adjudication system:

A) Eligibility (2701271)
B) Premium Payment (2O)
C) Unsolicited Claim Status (277)
D) Remittance Advice (35)
E) Functional Acknowledgment (997)
Question
This code set describes drugs:

A) ICD-9-CM, Volumes 1 and 2
B) CPT-4
C) CDT
D) ICD-9-CM, Volume 3
E) NDC
Question
The code set that must be used to describe or identify dentist's services and procedures is:

A) lcD-9-cM, Volumes 1 and 2
B) CPT-4
C) CDT
D) ICD-9-CM, Volume 3
E) HCPCS
Question
Select the FALSE statement regarding the responsibilities of providers with direct treatment relationships under HIPAA's privacy rule.

A) Provide the individual with a Notice of Privacy Practices that describes the use of PHI.
B) Obtain a written authorization for each and every TPO event.
C) Obtain a written authorization for any disclosure or use of PHI other than for the purposes of TPO.
D) Provide access to the PHI that it maintains to the individual and make reasonable efforts to correct possible errors when requested by the individual.
E) Establish procedures to receive complaints relating to the handling of PHI.
Question
Health information is protected by the Privacy Rule as long as:

A) The authorization has been revoked by the physician
B) The patient remains a citizen of the United States
C) The information is under the control of HHS
D) The information is in the possession of a covered entity
E) The information is not also available on paper forms
Question
Which one of the following security standards is part of Technical Safeguards?

A) Access control
B) Security Management Process
C) Facility Access Controls
D) Workstation Use
E) Device and Media Controls
Question
The key objective of a contingency plan is that the entity must establish and implement policies and procedures to ensure The:

A) Creation and modification of health information during and after an emergency.
B) Integrity of health information during and after an emergency.
C) Accountability of health information during and after an emergency.
D) Vulnerability of health information during and after an emergency.
E) Non-repudiation of the entity.
Question
A business associate:

A) Requires PKI for the provider and the patient.
B) Is electronically stored information about an individual's lifetime health status and health care.
C) Is another name for an HMO.
D) Identifies all non-profit organizations.
E) Is a person or an entity that on behalf of the covered entity performs or assists in the performance of a function or activity involving the use or disclosure of health-related information.
Question
A doctor sends patient records to another company for data entry services. A bonded delivery service is used for the transfer. The records are returned to the doctor after entry is complete, using the same delivery service. The entry facility and the network they use are secure. The doctor is named as his own Privacy Officer in written policies. The doctor has written procedures for this process and all involved parties are documented as having been trained in them The doctor does not have written authorizations to disclose Protected Health Information (PHI). Is the doctor in violation of the Privacy Rule?

A) No - This would be considered an allowed "routine disclosure between the doctor and his business partner.
B) Yes - There is no exception to the requirement for an authorization prior to disclosure, no matter how well intentioned or documented.
C) Yes - a delivery service is not considered a covered entity.
D) Yes - to be a "routine disclosure" all the parties must have their own Privacy Officer as mandated by l-IIPAA.
E) Yes - this is not considered a part of "treatment", which is one of the valid exceptions to the Privacy Rule.
Question
The office manager of a small doctor's office wants to donate several of their older workstations to the local elementary school. Which Security Rule Standard addresses this situation?

A) Security Management Process
B) Device and Media Controls
C) information Access Management
D) Facility Access Controls
E) Workstation Security
Question
In terms of Security, the best definition of "Access Control" is:

A) A list of authorized entities, together with their access rights.
B) Corroborating your identity
C) The prevention of an unauthorized use of a resource.
D) Proving that nothing regarding your identity has been altered.
E) Being unable to deny you took part in a transaction.
Question
A provider is in compliance with the Privacy Rule. She has a signed Notice of Privacy Practices from her patient. To provide treatment, the doctor needs to consult with an independent provider who has no relationship with the patient to comp with the Privacy Rule the doctor MUST:

A) Establish a business partner relationship with the other provider.
B) Obtain a signed authorization from the patient to cover the disclosure.
C) Make a copy of the signed Notice available to the other provider
D) Obtain the patients signature on the second providers Notice of Privacy Practices.
E) Do nothing more - the Notice of Privacy Practices covers treatment activities.
Question
This transaction, which is not a HIPAA standard, may be used as the first response when receiving a Health Care Claim (837):

A) Eligibility (270/271).
B) Premium Payment (820).
C) Unsolicited Claim Status (277).
D) Remittance Advice (835).
E) Functional Acknowledgment (997).
Question
As part of their HIPAA compliance process, a small doctor's office formally puts the office manager in charge of security related issues. This complies with which security rule standard?

A) Security Awareness and Training
B) Security Management Process
C) Access Control
D) Assigned Security Responsibility
E) Security incident Procedures
Question
The National Provider Identifier (NPI) will eventually replace the:

A) NPF
B) NPS
C) CDT
D) ICD-9-CM, Volume 3
E) UPIN
Question
Some of the information that an authorization must include is:

A) The date on which any automatic extension occurs.
B) Covered entity's signature.
C) A statement that federal privacy laws still protect the information after it is disclosed.
D) A statement that the individual has no right to revoke the authorization.
E) The date signed.
Question
A pharmacist is approached by an individual and asked a question about an over-the-counter medication. The pharmacist needs some protected health information (PHI) from the individual to response the question. The pharmacist will not be creating a record of this interaction. The Privacy Rule requires the pharmacist to:

A) Verbally request a consent and offer a copy of the Notice of Privacy Practices.
B) Verbally request specific authorization for the PHI.
C) Do nothing more.
D) Obtain the signature of the patient on their Notice of Privacy Practices.
E) Not respond to the request without an authorization from the primary physician.
Question
This transaction supports multiple functions. These functions include: telling a bank to move money OR telling a bank to move money while sending remittance information.

A) 277
B) 276
C) 271
D) 820
E) 270
Question
This transaction is typically used in two modes: update and full replacement:

A) Premium Payment.
B) Health Care Claim.
C) First Report of Injury.
D) Health Plan Enrollment and Dis-enrollment.
E) Coordination of Benefits.
Question
The objective of this document is to safeguard the premises and building from unauthorized physical access and to safeguard the equipment therein from unauthorized physical access, tampering and theft:

A) Contingency Plan
B) Facility Security Plan
C) Emergency Mode Operation Plan
D) Accountability
E) Device and Media Controls
Question
Title 1 of the HIPAA legislation in the United States is about:

A) P1<1 requirements for hospitals and health care providers.
B) Encryption algorithms that must be supported by hospitals and health care providers.
C) Fraud and abuse in the health care system and ways to eliminate the same.
D) Guaranteed health insurance coverage to workers and their families when they change employers.
E) The use of strong authentication technology that must be supported by hospitals and health care providers.
Question
This transaction is the response to a Health Care Claim (837):

A) Eligibility (270/271)
B) Premium Payment (B20)
C) Claim Status Notification (277)
D) Remittance Advice (35)
E) Functional Acknowledgment (997)
Question
To comply with the Final Privacy Rule, a valid Notice of Privacy Practices:

A) Is required for all Business Associate Contracts
B) Must always be associated with a valid authorization
C) Must be signed before providing treatment to a patient.
D) Must be associated with a valid Business Associate Contract
E) Must describe the individual's rights under the Privacy Rule.
Question
An Electronic Medical Record (EMR):

A) Is another name for the Security Ruling.
B) Requires the use of biometrics for access to records.
C) Is electronically stored information about an individual's health status and health care.
D) Identifies all hospitals and health care organizations.
E) Requires a PK1 for the provider and the patient.
Question
A doctor is sending a patient's lab work to a lab That is an external business partner. The lab and the doctor's staff are all trained on the doctor's Privacy Practices. The doctor has a signed Notice from the patient. In order to use or disclose PHI, the lab MUST:

A) Request that the patient sign the lab's Notice of Privacy Practices.
B) Do nothing more - the activity is covered by the doctor's Notice of Privacy Practices.
C) Obtain a specific authorization from the patient.
D) Obtain a specific authorization from the doctor.
E) Verify that the doctor's Notice of Privacy Practices has not expired.
Question
The Final Privacy Rule requires a covered entity to obtain an individual's prior written authorization to use his or her PHI for marketing purposes except for:

A) Situations where the marketing is for a drug or treatment could improve the health of that individual.
B) Situations where the patient has already signed the covered entity's Notice of Privacy Practices.
C) A face-to-face encounter with the sales person of a company that provides drug samples.
D) A communication involving a promotional gift of nominal value.
E) The situation where the patient has signed the Notice of Privacy Practices of the marketer.
Question
Security reminders, using an anti-virus program on workstations, keeping track of when users log-in and out, and password management are all part of:

A) Security incident Procedures
B) information Access Management
C) Security Awareness and Training
D) Workforce Security
E) Security Management Process
Question
When PHI is sent or received over an electronic network there must be measures to guard against unauthorized access. This is covered under which security rule standard?

A) Device and Media Controls
B) Access Controls
C) Transmission Security
D) Integrity
E) Audit Controls
Question
Signed authorization forms must be retained:

A) Indefinitely, because the life of a signed authorization is indefinite
B) Six (6) years from the time it expires.
C) For as long as the patient's records are kept.
D) Until it is specifically revoked by the individual.
E) Ten (10) years from the date it was signed.
Question
Use or disclosure of Protected Health Information (PHI) for Treatment, Payment, and Health care Operations (TPO) is:

A) Limited to the minimum necessary to accomplish the intended purpose.
B) Left to the professional judgment and discretion of the requestor.
C) Controlled totally by the requestor's pre-existing authorization document.
D) Governed by industry "best practices" regarding use.
E) Left in force for eighteen (18) years.
Question
Select the correct statement regarding the Notice of Privacy Practices.

A) The Notice must be signed before a State authorized notary.
B) Direct Treatment Providers must make a good faith effort to obtain patient's written acknowledgement of Notice of Privacy Practices.
C) Organizations may not have a "layered" Notice - a short, summary Notice preceding the more detailed Notice.
D) Authorization forms are mandatory for the Notice to be valid.
E) An individual must sign an authorization before a state authorized notary.
Question
Which of the following is NOT a correct statement regarding HIPAA requirements?

A) A covered entity must change its policies and procedures to comply with HIPAA regulations, standards, and implementation specifications.
B) A covered entity must reasonably safeguard PHI from any intentional or unintentional use or disclosure that is in violation of the regulations.
C) A covered entity must provide a process for individuals to make complaints concerning privacy issues.
D) A covered entity must document all complaints received regarding privacy issues.
E) The Privacy Rule requires that the covered entity has a documented security policy.
Question
HIPAA establishes a civil monetary penalty for violation of the Administrative Simplification provisions. The penalty may not be more than:

A) $1 000000 per person per violation of a single standard for a calendar year
B) $10 per person per violation of a single standard for a calendar year.
C) $25000 per person per violation of a single standard for a calendar year.
D) $2,500 per person per violation of a single standard for a calendar year.
E) $1000 per person per violation of a single standard for a calendar year.
Question
Physical access to workstations such as, whether or not patients can easily see a screen with PHI on it, is addressed by:

A) Workstation Use
B) Workstation Security
C) Sanction Policy
D) Termination Procedures
E) Facility Security Plan
Question
Which of the following is a required implementation specification associated with the Contingency Plan Standard?

A) Integrity Controls
B) Access Control and Validation Procedures
C) Emergency Mode Operation Plan
D) Response and Reporting
E) Risk Analysis
Question
Select the best example of a business associate (if they had access to PHI).

A) Accountants
B) Hospital employees
C) A covered entity's internal IT department
D) CEO of the covered entity
E) The covered entity's billing service department
Question
An Electronic Medical Record (EMR):

A) Is another name for the Security Ruling.
B) Requires the use of biometrics for access to records.
C) Is electronically stored information about an individual's health status and health care.
D) Identifies all hospitals and health care organizations.
E) Requires a P1<1 for the provider and the patient.
Question
Which HIPAA Title is fueling initiatives within organizations to address health care priorities in the areas of transactions, privacy, and security'?

A) Title I
B) Title II
C) Title Ill
D) Title W
E) Title V
Question
Select the best statement regarding the definition of a business associate of a covered entity. A business associate is:

A) A person who acts on behalf of a non-covered entity.
B) A person whose function may involve claims processing, administration, data analysis or practice management with access to PHI.
C) A person who is a member of the covered entity's workforce.
D) A clearinghouse.
E) A person that performs or assists in the performance of a function or activity that involves the use or disclosure of de-identified health information.
Question
Select the correct statement regarding the requirements of HIPAA regulations.

A) A covered entity must have and apply sanction against members of its workforce who fail to comply with the privacy policies and procedures of the covered entity.
B) A covered entity does not need to train all members of its workforce whose functions are affected by a change in policy or procedure.
C) A covered entity must designate, and document, a privacy officer, and a HIPAA compliance officer,
D) A covered entity may require individuals to waive their rights.
E) A covered entity must require the individual to sign the Notice of Privacy Practices prior to delivering any treatment related service.
Question
Formal, documented instructions for reporting security breaches are referred to as:

A) Business Associate Contract
B) Response and Reporting
C) Emergency Access Procedure
D) Sanction policy
E) Risk Management
Question
Workstation Use falls under which Security Rule area?

A) Person or Entity Authentication
B) Technical Safeguards
C) Administrative Safeguards
D) Physical Safeguards
E) Transmission Security
Question
Select the best statement regarding de-identified information (DII).

A) De-identified information is IIHI that has had all individually (patient) identifiable information removed.
B) DII may be used only with the authorization of the individual.
C) DII remains PHI.
D) The only approved method of de-identification is to have a person with "appropriate knowledge and experience" tie-identify the IIHI.
E) All PHI use and disclosure requirements do not apply to re-identified DII.
Question
The security standard that has the objective of implementing mechanisms to record and examine system activity is:

A) Access Control
B) Audit Controls
C) Authorization Controls
D) Data Authentication
E) Person or Entity Authentication
Question
Within the context of a transaction set, the fields that comprise a hierarchical level are referred to as a(n):

A) Loop
B) Enumerator
C) Identifier
D) Data segment
E) Code set
Question
A key date in the transaction rule timeline is:

A) October 16, 2003 - small health plans to begin testing without ASCA extension
B) October 16, 2004 - full compliance deadline for small health plans
C) April 16, 2004 - small health plans to begin testing with ASCA extension
D) April 16, 2003 - deadline to begin testing with ASCA extension
E) April 14, 2003; deadline to begin testing with ASCA extension.
Question
Select the FALSE statement regarding violations of the HIPAA Privacy rule.

A) Covered entities that violate the standards or implementation specifications will be subjected to civil penalties of up to $100 per violation except that the total amount imposed on any one person in each calendar year may not exceed $25,000 for violations of one requirement.
B) Criminal penalties for non-compliance are fines up to $65,000 and one year in prison for each requirement or prohibition violated.
C) Criminal penalties for willful violation are fines up to $60,000 and one year in prison for each requirement or prohibition violated.
D) Criminal penalties for violations committed under "false pretenses are fines up to $100,000 and five years in prison for each requirement or prohibition violated.
E) Criminal penalties for violations committed with the intent to sell, transfer, or use PHI for commercial advantage, personal gain or malicious harm are fines up to $250,000 and ten years in prison for each requirement or prohibition violated.
Question
One mandatory requirement for the Notice of Privacy Practices set by HIPAA regulations is:

A) If the notice must state that the covered entity reserves the right to disclose PHI without obtaining the individuals authorization.
B) The notice must prominently include an expiration date.
C) The notice must describe every potential use of PHI.
D) The notice must describe an individual's rights under the rule such as to inspect, copy and amend PHI and to obtain an accounting of disclosures of PHI.
E) The notice must clearly identify that the covered entity is in compliance with HIPAA regulations as of April 16, 2003.
Question
Select the best statement regarding the definition of the term "use" as used by the HIPAA regulations.

A) 'Use" refers to the release, transfer, or divulging of IIHI between various covered entities.
B) "Use" refers to adding, modifying and deleting the PHI by other covered entities.
C) "Use" refers to utilizing, examining, or analyzing IIHI within the covered entity
D) "Use" refers to the movement of de-identified information within an organization.
E) "Use" refers to the movement of information outside the entity holding the information.
Question
The transaction number assigned to the Payment Order/Remittance Advice transaction is:

A) 270
B) 836
C) 278
D) 820
E) 834
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/95
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 1: Certified HIPAA Professional (CHP)
1
A hospital is preparing a file of treatment information for the state of California. This file is to be sent to external medical researchers. The hospital has removed SSN, name, phone and other information that specifically identifies an individual. However, there may still be data in the file that potentially could identify the individual. Can the hospital claim 'safe harbor" and release the file to the researchers?

A) Yes the hospital's actions satisfy the "safe harbor" method of de-identification.
B) No - a person with appropriate knowledge and experience must determine that the information that remains can identify an individual.
C) No - authorization to release the information is still required by HIPAA.
D) No - to satisfy "safe harbor the hospital must also have no knowledge of a way to use the remaining data to identify an individual.
E) Yes - medical researchers are covered entities and "research" is considered a part of "treatment" by HIPAA.
No - to satisfy "safe harbor the hospital must also have no knowledge of a way to use the remaining data to identify an individual.
2
The National Provider File (NPF) includes information such as:

A) Effective date
B) CPT-4
C) CDT
D) ICD-9-CM
E) Enrollment date
Effective date
3
Select the correct statement regarding code sets and identifiers.

A) A covered entity must use the applicable code set that is valid at the time the transaction is initiated.
B) April 14, 2003 is the compliance date for implementation of the National Provider Identifier.
C) CMS is responsible for updating the CPT-4 code sets.
D) An organization that assigns NPIs is referred to as National Provider for Identifiers.
E) HHS assigns the Employer Identification Number (EIN), which has been selected as the National Provider Identifier for Health Care.
A covered entity must use the applicable code set that is valid at the time the transaction is initiated.
4
The Data Backup Plan is part of which Security Standard?

A) Contingency Plan
B) Evaluation
C) Security Management Procedures
D) Facility Access Control
E) Security Incident Procedures
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
5
The objective of this HIPAA security standard is to implement policies and procedures to prevent, detect, contain, and correct security Violations.

A) Security Incident Procedures
B) Assigned Security Responsibility
C) Security Management Process
D) Access Control
E) Facility Access Control
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
6
Select the FALSE statement regarding the administrative requirements of the HIPAA privacy rule.

A) A covered entity must mitigate, to the extent practicable, any harmful effect that it becomes aware of from the use or disclosure of PHI in violation of its policies and procedures or HIPAA regulations.
B) A covered must not in any way intimidate, retaliate, or discriminate against any individual or other entity, which tiles a compliant.
C) A covered entity may not require individuals to waive their rights as a condition for treatments payment, enrollment in a health plan, or eligibility for benefits.
D) A covered entity must retain the documents required by the regulations for a period of six years.
E) A covered entity must change its policies and procedures to comply with HIPAA regulations no later than three years after the change in law.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
7
This code set is used to describe or identity radiological procedures and clinical laboratory tests:

A) ICD-9-CM. Volumes 1 and 2
B) CPT-4
C) CDT
D) ICD-9-CM, Volume 3
E) HCPCS
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
8
This security standard requires that the covered entity establishes agreements with each organization with which it exchanges data electronically, protecting the security of all such data:

A) Security incident Procedures
B) Integrity
C) Person or Entity Authentication
D) Assigned Security Responsibility
E) Business Associate Contracts and other Arrangements
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
9
This rule covers the policies and procedures that must be in place to ensure that the patients' health information is respected and their rights upheld:

A) Security rule.
B) Privacy rule.
C) Covered entity rule.
D) Electronic Transactions and Code Sets rule.
E) Electronic Signature Rule
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
10
The implementation specifications for this HIPAA security standard (within Technical Safeguards) must support emergency access and unique user identification.

A) Audit Control
B) integrity
C) Access Control
D) Person or Entity Authentication
E) Transmission Security
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
11
The code set that must be used to describe or identify outpatient physician services and procedures is:

A) lCD-SCM, Volumes 1 and 2
B) CPT-4
C) CDT
D) lCD-SCM, Volume 3
E) NDC
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
12
Select the FALSE statement regarding code sets and identifiers.

A) The CPT-4 code set is maintained by the American Medical Association (AMA).
B) A covered entity must use the applicable medical code set that is valid at the time the health care is delivered.
C) The National Provider Identifier (NPI) will be assigned by the National Provider System (NPS).
D) The Centers for Medicare and Medicaid Services is responsible for updating the HCPCS code set.
E) The National Provider Identifier (NPI) will be assigned to health plans.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
13
This transaction type is a "response" transaction that may include information such as accepted/rejected claim, approved claim(s) pre-payment, or approved claim(s) post-payment:

A) 270.
B) 820.
C) 837.
D) 277.
E) 278.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
14
This security rule standard requires policies and procedures for authorizing access to electronic protected health information that are consistent with its required implementation specifications- which are Isolating Health Care Clearinghouse Function, Access Authorization, and Access Establishment and Modification

A) Access Control
B) Security Incident Procedures
C) information Access Management
D) Workforce Security
E) Security Management Process
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
15
Select the correct statement regarding the requirements for oral communication in the HIPAA regulations.

A) Covered entities must reasonably safeguard PHI, including oral communications, from any intentional or unintentional use or disclosure that is in violation of the Privacy Rule.
B) Covered entities must have in place appropriate administrative, technical, and physical safeguards to protect the privacy of de-Identified data.
C) Covered entities are prohibited from marketing through oral communications.
D) The Privacy Rule requires covered entities to document any information, including oral communications, which is used or disclosed for TPO purposes.
E) The Privacy Rule will often require major structural changes, such as soundproof rooms and encryption of telephone systems, to provide the "reasonable safeguards" of oral communications required by the regulations.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
16
In an emergency treatment situation, a health care provider:

A) Must obtain the signature of the patient before disclosing PHI to another provider.
B) Must contact a relative of the patient before disclosing PHI to another provider.
C) May use their best judgment in order to provide appropriate treatment.
D) May use PHI but may not disclose it to another provider
E) Must inform the patient about the Notice of Privacy Practices before delivering treatment.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
17
Which of the following is NOT a HIPAA national health care identifier?

A) National Provider Identifier (NPI)
B) Social Security Number (SSN)
C) National Health Plan Identifier (PlanID)
D) National Employer Identifier for Health Care (EIN)
E) National Health Identifier for Individuals (NI-UI)
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
18
Patient identifiable information may include:

A) Country of birth
B) Telephone number
C) Information on past 3 employers
D) Patient credit reports
E) Smart card-based digital signatures
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
19
The Security Incident Procedures standard requires just one implementation specification. That implementation specification is:

A) Termination Procedures
B) Automatic Logoff
C) Emergency Access Procedure
D) Contingency Operations
E) Response and Reporting
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
20
HIPAA Security standards are designed to be:

A) Technology specific
B) State of the art
C) Non-Comprehensive
D) Revolutionary
E) Scalable
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
21
A business associate must agree to:

A) Report to the covered entity any security incident of which it becomes aware.
B) Ensure the complete safety of all electronic protected health information.
C) Compensate the covered entity for penalties incurred because of the business associate's security incidents.
D) Register as a business associate with HHS.
E) Submit to periodic audits by HHS of critical systems containing electronic protected health information.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
22
Which of the following is example of "Payment" as defined in the HIPAA regulations?

A) Annual Audits
B) Claims Management
C) Salary disbursement to the workforce having direct treatment relationships.
D) Life Insurance underwriting
E) Cash given to the pharmacist for the purchase of an over-the-counter drug medicine
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
23
Individually identifiable health information (IIHI) includes information that is:

A) Transmitted to a business associate for payment purposes only.
B) Stored on a smart card only by the patient.
C) Created or received by a credit company that provided a personal loan for surgical procedures.
D) Created or received by a health care clearinghouse for claim processing.
E) Requires the use of biometrics for access to records.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
24
Select the correct statement regarding the administrative requirements of the HIPAA privacy rule

A) A covered entity must apply disciplinary sanctions against members of its workforce who fail to comply with the privacy policies and procedures of the covered entity.
B) A covered entity need not train all members of its workforce whose functions are materially affected by a change in policy or procedure.
C) A covered entity must designate, and document, a contact person responsible for receiving acknowledgements of Notice of Privacy Practice.
D) A covered entity may require individuals to waive their rights.
E) A covered entity must provide maximum safeguards for PHI from any intentional or unintentional use or disclosure that is in violation of the regulations and to limit incidental uses and disclosures made pursuant to permitted or required use or disclosure.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
25
Which one of the following is a required implementation specification of the Security Management Process?

A) Risk Analysis
B) Access Control and Validation Procedures
C) Integrity Controls
D) Access Authorization
E) Termination Procedures
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
26
The Security Rule requires that the covered entity identifies a security official who is responsible for the development and implementation of the policies and procedures. This is addressed under which security standard?

A) Security incident Procedures
B) Response and Reporting
C) Assigned Security Responsibility
D) Termination Procedures
E) Facility Access Controls
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
27
The Health Care Claim Status Response (277) can be used in a number of ways. Select the correct usage.

A) As a response to a health care claim status request.
B) As a health care claim payment advice.
C) Electronic funds transfer.
D) As a request for health care claims status.
E) Request for the psychotherapy notes of a patient.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
28
A covered entity' that fails to implement the HIPAA Privacy Rule would risk:

A) $50O0 in fines.
B) $5000 in fines and six months in prison.
C) An annual cap of $5000 in fines.
D) A fine of up to $50000 if they wrongfully disclose PHI.
E) Six months in prison.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
29
Select the correct statement regarding the responsibilities of providers and payers under HIPAA's privacy rule.

A) Optionally, they might develop a mechanism of accounting for all disclosures of PHI for purposes other than TPO.
B) They must redesign their offices, workspaces, and storage systems to afford maximum protection to PHI from intentional and unintentional use and disclosure.
C) They must develop methods for disclosing only the minimum amount of protected information necessary to accomplish any intended purpose.
D) They must obtain a "top secret" security clearance for all member of their workforce.
E) They must identify business associates that need to use PHI to accomplish their function and develop authorization forms to allow PHI to be shared with these business associates.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
30
Within the context of a transaction set, the fields that comprise a hierarchical level are referred to as a(n):

A) Loop
B) Enumerator
C) Identifier
D) Data segment
E) Code set
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
31
Information in this transaction is generated by the payer's adjudication system:

A) Eligibility (2701271)
B) Premium Payment (2O)
C) Unsolicited Claim Status (277)
D) Remittance Advice (35)
E) Functional Acknowledgment (997)
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
32
This code set describes drugs:

A) ICD-9-CM, Volumes 1 and 2
B) CPT-4
C) CDT
D) ICD-9-CM, Volume 3
E) NDC
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
33
The code set that must be used to describe or identify dentist's services and procedures is:

A) lcD-9-cM, Volumes 1 and 2
B) CPT-4
C) CDT
D) ICD-9-CM, Volume 3
E) HCPCS
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
34
Select the FALSE statement regarding the responsibilities of providers with direct treatment relationships under HIPAA's privacy rule.

A) Provide the individual with a Notice of Privacy Practices that describes the use of PHI.
B) Obtain a written authorization for each and every TPO event.
C) Obtain a written authorization for any disclosure or use of PHI other than for the purposes of TPO.
D) Provide access to the PHI that it maintains to the individual and make reasonable efforts to correct possible errors when requested by the individual.
E) Establish procedures to receive complaints relating to the handling of PHI.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
35
Health information is protected by the Privacy Rule as long as:

A) The authorization has been revoked by the physician
B) The patient remains a citizen of the United States
C) The information is under the control of HHS
D) The information is in the possession of a covered entity
E) The information is not also available on paper forms
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
36
Which one of the following security standards is part of Technical Safeguards?

A) Access control
B) Security Management Process
C) Facility Access Controls
D) Workstation Use
E) Device and Media Controls
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
37
The key objective of a contingency plan is that the entity must establish and implement policies and procedures to ensure The:

A) Creation and modification of health information during and after an emergency.
B) Integrity of health information during and after an emergency.
C) Accountability of health information during and after an emergency.
D) Vulnerability of health information during and after an emergency.
E) Non-repudiation of the entity.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
38
A business associate:

A) Requires PKI for the provider and the patient.
B) Is electronically stored information about an individual's lifetime health status and health care.
C) Is another name for an HMO.
D) Identifies all non-profit organizations.
E) Is a person or an entity that on behalf of the covered entity performs or assists in the performance of a function or activity involving the use or disclosure of health-related information.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
39
A doctor sends patient records to another company for data entry services. A bonded delivery service is used for the transfer. The records are returned to the doctor after entry is complete, using the same delivery service. The entry facility and the network they use are secure. The doctor is named as his own Privacy Officer in written policies. The doctor has written procedures for this process and all involved parties are documented as having been trained in them The doctor does not have written authorizations to disclose Protected Health Information (PHI). Is the doctor in violation of the Privacy Rule?

A) No - This would be considered an allowed "routine disclosure between the doctor and his business partner.
B) Yes - There is no exception to the requirement for an authorization prior to disclosure, no matter how well intentioned or documented.
C) Yes - a delivery service is not considered a covered entity.
D) Yes - to be a "routine disclosure" all the parties must have their own Privacy Officer as mandated by l-IIPAA.
E) Yes - this is not considered a part of "treatment", which is one of the valid exceptions to the Privacy Rule.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
40
The office manager of a small doctor's office wants to donate several of their older workstations to the local elementary school. Which Security Rule Standard addresses this situation?

A) Security Management Process
B) Device and Media Controls
C) information Access Management
D) Facility Access Controls
E) Workstation Security
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
41
In terms of Security, the best definition of "Access Control" is:

A) A list of authorized entities, together with their access rights.
B) Corroborating your identity
C) The prevention of an unauthorized use of a resource.
D) Proving that nothing regarding your identity has been altered.
E) Being unable to deny you took part in a transaction.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
42
A provider is in compliance with the Privacy Rule. She has a signed Notice of Privacy Practices from her patient. To provide treatment, the doctor needs to consult with an independent provider who has no relationship with the patient to comp with the Privacy Rule the doctor MUST:

A) Establish a business partner relationship with the other provider.
B) Obtain a signed authorization from the patient to cover the disclosure.
C) Make a copy of the signed Notice available to the other provider
D) Obtain the patients signature on the second providers Notice of Privacy Practices.
E) Do nothing more - the Notice of Privacy Practices covers treatment activities.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
43
This transaction, which is not a HIPAA standard, may be used as the first response when receiving a Health Care Claim (837):

A) Eligibility (270/271).
B) Premium Payment (820).
C) Unsolicited Claim Status (277).
D) Remittance Advice (835).
E) Functional Acknowledgment (997).
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
44
As part of their HIPAA compliance process, a small doctor's office formally puts the office manager in charge of security related issues. This complies with which security rule standard?

A) Security Awareness and Training
B) Security Management Process
C) Access Control
D) Assigned Security Responsibility
E) Security incident Procedures
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
45
The National Provider Identifier (NPI) will eventually replace the:

A) NPF
B) NPS
C) CDT
D) ICD-9-CM, Volume 3
E) UPIN
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
46
Some of the information that an authorization must include is:

A) The date on which any automatic extension occurs.
B) Covered entity's signature.
C) A statement that federal privacy laws still protect the information after it is disclosed.
D) A statement that the individual has no right to revoke the authorization.
E) The date signed.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
47
A pharmacist is approached by an individual and asked a question about an over-the-counter medication. The pharmacist needs some protected health information (PHI) from the individual to response the question. The pharmacist will not be creating a record of this interaction. The Privacy Rule requires the pharmacist to:

A) Verbally request a consent and offer a copy of the Notice of Privacy Practices.
B) Verbally request specific authorization for the PHI.
C) Do nothing more.
D) Obtain the signature of the patient on their Notice of Privacy Practices.
E) Not respond to the request without an authorization from the primary physician.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
48
This transaction supports multiple functions. These functions include: telling a bank to move money OR telling a bank to move money while sending remittance information.

A) 277
B) 276
C) 271
D) 820
E) 270
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
49
This transaction is typically used in two modes: update and full replacement:

A) Premium Payment.
B) Health Care Claim.
C) First Report of Injury.
D) Health Plan Enrollment and Dis-enrollment.
E) Coordination of Benefits.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
50
The objective of this document is to safeguard the premises and building from unauthorized physical access and to safeguard the equipment therein from unauthorized physical access, tampering and theft:

A) Contingency Plan
B) Facility Security Plan
C) Emergency Mode Operation Plan
D) Accountability
E) Device and Media Controls
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
51
Title 1 of the HIPAA legislation in the United States is about:

A) P1<1 requirements for hospitals and health care providers.
B) Encryption algorithms that must be supported by hospitals and health care providers.
C) Fraud and abuse in the health care system and ways to eliminate the same.
D) Guaranteed health insurance coverage to workers and their families when they change employers.
E) The use of strong authentication technology that must be supported by hospitals and health care providers.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
52
This transaction is the response to a Health Care Claim (837):

A) Eligibility (270/271)
B) Premium Payment (B20)
C) Claim Status Notification (277)
D) Remittance Advice (35)
E) Functional Acknowledgment (997)
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
53
To comply with the Final Privacy Rule, a valid Notice of Privacy Practices:

A) Is required for all Business Associate Contracts
B) Must always be associated with a valid authorization
C) Must be signed before providing treatment to a patient.
D) Must be associated with a valid Business Associate Contract
E) Must describe the individual's rights under the Privacy Rule.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
54
An Electronic Medical Record (EMR):

A) Is another name for the Security Ruling.
B) Requires the use of biometrics for access to records.
C) Is electronically stored information about an individual's health status and health care.
D) Identifies all hospitals and health care organizations.
E) Requires a PK1 for the provider and the patient.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
55
A doctor is sending a patient's lab work to a lab That is an external business partner. The lab and the doctor's staff are all trained on the doctor's Privacy Practices. The doctor has a signed Notice from the patient. In order to use or disclose PHI, the lab MUST:

A) Request that the patient sign the lab's Notice of Privacy Practices.
B) Do nothing more - the activity is covered by the doctor's Notice of Privacy Practices.
C) Obtain a specific authorization from the patient.
D) Obtain a specific authorization from the doctor.
E) Verify that the doctor's Notice of Privacy Practices has not expired.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
56
The Final Privacy Rule requires a covered entity to obtain an individual's prior written authorization to use his or her PHI for marketing purposes except for:

A) Situations where the marketing is for a drug or treatment could improve the health of that individual.
B) Situations where the patient has already signed the covered entity's Notice of Privacy Practices.
C) A face-to-face encounter with the sales person of a company that provides drug samples.
D) A communication involving a promotional gift of nominal value.
E) The situation where the patient has signed the Notice of Privacy Practices of the marketer.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
57
Security reminders, using an anti-virus program on workstations, keeping track of when users log-in and out, and password management are all part of:

A) Security incident Procedures
B) information Access Management
C) Security Awareness and Training
D) Workforce Security
E) Security Management Process
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
58
When PHI is sent or received over an electronic network there must be measures to guard against unauthorized access. This is covered under which security rule standard?

A) Device and Media Controls
B) Access Controls
C) Transmission Security
D) Integrity
E) Audit Controls
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
59
Signed authorization forms must be retained:

A) Indefinitely, because the life of a signed authorization is indefinite
B) Six (6) years from the time it expires.
C) For as long as the patient's records are kept.
D) Until it is specifically revoked by the individual.
E) Ten (10) years from the date it was signed.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
60
Use or disclosure of Protected Health Information (PHI) for Treatment, Payment, and Health care Operations (TPO) is:

A) Limited to the minimum necessary to accomplish the intended purpose.
B) Left to the professional judgment and discretion of the requestor.
C) Controlled totally by the requestor's pre-existing authorization document.
D) Governed by industry "best practices" regarding use.
E) Left in force for eighteen (18) years.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
61
Select the correct statement regarding the Notice of Privacy Practices.

A) The Notice must be signed before a State authorized notary.
B) Direct Treatment Providers must make a good faith effort to obtain patient's written acknowledgement of Notice of Privacy Practices.
C) Organizations may not have a "layered" Notice - a short, summary Notice preceding the more detailed Notice.
D) Authorization forms are mandatory for the Notice to be valid.
E) An individual must sign an authorization before a state authorized notary.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
62
Which of the following is NOT a correct statement regarding HIPAA requirements?

A) A covered entity must change its policies and procedures to comply with HIPAA regulations, standards, and implementation specifications.
B) A covered entity must reasonably safeguard PHI from any intentional or unintentional use or disclosure that is in violation of the regulations.
C) A covered entity must provide a process for individuals to make complaints concerning privacy issues.
D) A covered entity must document all complaints received regarding privacy issues.
E) The Privacy Rule requires that the covered entity has a documented security policy.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
63
HIPAA establishes a civil monetary penalty for violation of the Administrative Simplification provisions. The penalty may not be more than:

A) $1 000000 per person per violation of a single standard for a calendar year
B) $10 per person per violation of a single standard for a calendar year.
C) $25000 per person per violation of a single standard for a calendar year.
D) $2,500 per person per violation of a single standard for a calendar year.
E) $1000 per person per violation of a single standard for a calendar year.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
64
Physical access to workstations such as, whether or not patients can easily see a screen with PHI on it, is addressed by:

A) Workstation Use
B) Workstation Security
C) Sanction Policy
D) Termination Procedures
E) Facility Security Plan
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
65
Which of the following is a required implementation specification associated with the Contingency Plan Standard?

A) Integrity Controls
B) Access Control and Validation Procedures
C) Emergency Mode Operation Plan
D) Response and Reporting
E) Risk Analysis
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
66
Select the best example of a business associate (if they had access to PHI).

A) Accountants
B) Hospital employees
C) A covered entity's internal IT department
D) CEO of the covered entity
E) The covered entity's billing service department
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
67
An Electronic Medical Record (EMR):

A) Is another name for the Security Ruling.
B) Requires the use of biometrics for access to records.
C) Is electronically stored information about an individual's health status and health care.
D) Identifies all hospitals and health care organizations.
E) Requires a P1<1 for the provider and the patient.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
68
Which HIPAA Title is fueling initiatives within organizations to address health care priorities in the areas of transactions, privacy, and security'?

A) Title I
B) Title II
C) Title Ill
D) Title W
E) Title V
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
69
Select the best statement regarding the definition of a business associate of a covered entity. A business associate is:

A) A person who acts on behalf of a non-covered entity.
B) A person whose function may involve claims processing, administration, data analysis or practice management with access to PHI.
C) A person who is a member of the covered entity's workforce.
D) A clearinghouse.
E) A person that performs or assists in the performance of a function or activity that involves the use or disclosure of de-identified health information.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
70
Select the correct statement regarding the requirements of HIPAA regulations.

A) A covered entity must have and apply sanction against members of its workforce who fail to comply with the privacy policies and procedures of the covered entity.
B) A covered entity does not need to train all members of its workforce whose functions are affected by a change in policy or procedure.
C) A covered entity must designate, and document, a privacy officer, and a HIPAA compliance officer,
D) A covered entity may require individuals to waive their rights.
E) A covered entity must require the individual to sign the Notice of Privacy Practices prior to delivering any treatment related service.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
71
Formal, documented instructions for reporting security breaches are referred to as:

A) Business Associate Contract
B) Response and Reporting
C) Emergency Access Procedure
D) Sanction policy
E) Risk Management
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
72
Workstation Use falls under which Security Rule area?

A) Person or Entity Authentication
B) Technical Safeguards
C) Administrative Safeguards
D) Physical Safeguards
E) Transmission Security
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
73
Select the best statement regarding de-identified information (DII).

A) De-identified information is IIHI that has had all individually (patient) identifiable information removed.
B) DII may be used only with the authorization of the individual.
C) DII remains PHI.
D) The only approved method of de-identification is to have a person with "appropriate knowledge and experience" tie-identify the IIHI.
E) All PHI use and disclosure requirements do not apply to re-identified DII.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
74
The security standard that has the objective of implementing mechanisms to record and examine system activity is:

A) Access Control
B) Audit Controls
C) Authorization Controls
D) Data Authentication
E) Person or Entity Authentication
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
75
Within the context of a transaction set, the fields that comprise a hierarchical level are referred to as a(n):

A) Loop
B) Enumerator
C) Identifier
D) Data segment
E) Code set
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
76
A key date in the transaction rule timeline is:

A) October 16, 2003 - small health plans to begin testing without ASCA extension
B) October 16, 2004 - full compliance deadline for small health plans
C) April 16, 2004 - small health plans to begin testing with ASCA extension
D) April 16, 2003 - deadline to begin testing with ASCA extension
E) April 14, 2003; deadline to begin testing with ASCA extension.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
77
Select the FALSE statement regarding violations of the HIPAA Privacy rule.

A) Covered entities that violate the standards or implementation specifications will be subjected to civil penalties of up to $100 per violation except that the total amount imposed on any one person in each calendar year may not exceed $25,000 for violations of one requirement.
B) Criminal penalties for non-compliance are fines up to $65,000 and one year in prison for each requirement or prohibition violated.
C) Criminal penalties for willful violation are fines up to $60,000 and one year in prison for each requirement or prohibition violated.
D) Criminal penalties for violations committed under "false pretenses are fines up to $100,000 and five years in prison for each requirement or prohibition violated.
E) Criminal penalties for violations committed with the intent to sell, transfer, or use PHI for commercial advantage, personal gain or malicious harm are fines up to $250,000 and ten years in prison for each requirement or prohibition violated.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
78
One mandatory requirement for the Notice of Privacy Practices set by HIPAA regulations is:

A) If the notice must state that the covered entity reserves the right to disclose PHI without obtaining the individuals authorization.
B) The notice must prominently include an expiration date.
C) The notice must describe every potential use of PHI.
D) The notice must describe an individual's rights under the rule such as to inspect, copy and amend PHI and to obtain an accounting of disclosures of PHI.
E) The notice must clearly identify that the covered entity is in compliance with HIPAA regulations as of April 16, 2003.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
79
Select the best statement regarding the definition of the term "use" as used by the HIPAA regulations.

A) 'Use" refers to the release, transfer, or divulging of IIHI between various covered entities.
B) "Use" refers to adding, modifying and deleting the PHI by other covered entities.
C) "Use" refers to utilizing, examining, or analyzing IIHI within the covered entity
D) "Use" refers to the movement of de-identified information within an organization.
E) "Use" refers to the movement of information outside the entity holding the information.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
80
The transaction number assigned to the Payment Order/Remittance Advice transaction is:

A) 270
B) 836
C) 278
D) 820
E) 834
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 95 flashcards in this deck.