Health care Law Quiz

28 Questions | Total Attempts: 53

SettingsSettingsSettings
Please wait...
Health Care Quizzes & Trivia

Questions and Answers
  • 1. 
    Which court deals with lesser criminal offences, young offenders, family law issues, civil law matters and small claims?
    • A. 

      Federal Courts

    • B. 

      Appellate Courts

    • C. 

      Provincial/Territorial Courts

    • D. 

      Provincial & Territorial Superior Courts

  • 2. 
    Judge made law or case law 
    • A. 

      Legislation

    • B. 

      Regulation

    • C. 

      Guidelines

    • D. 

      Common Law

  • 3. 
    Which statutory law does not have the force of law?
    • A. 

      Guidelines

    • B. 

      Legislation

    • C. 

      Regulation

    • D. 

      Civil law

  • 4. 
    Which is not one of the five principles of the Canada health Act?
    • A. 

      Public Administration

    • B. 

      Comprehensiveness

    • C. 

      Accuracy

    • D. 

      Universality

  • 5. 
    This term describes physician services rendered by medical practitioners.
    • A. 

      Medically required

    • B. 

      Medically necessary

    • C. 

      Reimbursements

    • D. 

      Supplemental Benefits

  • 6. 
    This principle requires provinces to fund 100% of the cost of “all insured health services” provided by hospitals, medical practitioners and dentists.
    • A. 

      Accessibility

    • B. 

      Universality

    • C. 

      Comprehensiveness

    • D. 

      Public Administration

  • 7. 
    Which of the following is correct about the Regulated Health Professional Act.
    • A. 

      Ensure that a review system is in place - where the incident is analyzed and a plan is developed to avoid or reduce this type of risk for the future

    • B. 

      A unique number assigned to each patient an identification number for all personal health information & other health information relating to that patient

    • C. 

      Act states that administrator must ensure that a record keeping system is set up and that a health record must be maintained for every patient

    • D. 

      Set out registration requirements, identify the scope of practice and permitted/restricted activities

  • 8. 
    Fiduciary relationship requires a health care professional to act with utmost good from faith and loyalty and to hold information received from or about a client in confidence.
    • A. 

      True

    • B. 

      False

  • 9. 
    A privacy legislation which guides the collection, use or disclosure of personal information in the course of commercial activities.
    • A. 

      PHIPA

    • B. 

      PIPEDA

    • C. 

      FIPPA

    • D. 

      MFIPPA

  • 10. 
    A person or organization described in PHIPA who has custody or control of personal health information as a result of or in connection with performing the person's or organization's powers or duties.
    • A. 

      Agents

    • B. 

      Patients

    • C. 

      Physicians

    • D. 

      Custodians

  • 11. 
    Which is true about correcting documentation errors?
    • A. 

      Failure to document the chart at all during a critical time is a breach of standard of care and documentation standards

    • B. 

      Correction must be completed by the care provider within 60 days of the request

    • C. 

      Both original and revised documentation must be retained as part of the record

    • D. 

      Incorrect information should be deleted and replaced with the correct information.

  • 12. 
    According to The College of Nurses of Ontario and the Public Hospital Act and The Medicine Act, what is the minimum recommended retention period for health records?
    • A. 

      10 years from the last visit/entry in the health record

    • B. 

      Minors: 10 years commence after they turn 19

    • C. 

      3 years from the last visit/entry in the health record

    • D. 

      5 years from the last visit/entry in the health record

  • 13. 
    All are elements of valid consent except:
    • A. 

      Must be within the circle of care

    • B. 

      Must not be obtained through deception or coercion

    • C. 

      Must be knowledgeable; must know details of collection, use, disclosure must know consent can be withdrawn

    • D. 

      Must be a consent of the individual

  • 14. 
    IPC Ontario Order states that it was incumbent upon agents to ensure the security of all health information in their possession throughout the entire life cycle of the records.
    • A. 

      True

    • B. 

      False

  • 15. 
    Who is the highest rank for substitute decision maker? 
    • A. 

      Guardian

    • B. 

      Spouse or partner

    • C. 

      Parent with right of access

    • D. 

      Attorney for personal care with authority for Health Decisions

  • 16. 
    All are mandatory reporting obligations except: 
    • A. 

      Reporting of suspected child abuse or neglect to child protection agencies

    • B. 

      Loss or theft of narcotics or targeted substance

    • C. 

      Gunshot wounds

    • D. 

      Stabbing wounds

  • 17. 
    All of the following should be considered prior to releasing health information except:
    • A. 

      Access whether further consultation is necessary and whether further legal processes may apply if the disclosure is required by law

    • B. 

      Verify the identity of the requesting party

    • C. 

      Ensure that the written consent form (if any) is filed on the individual’s health record, or that documentation is included providing the date of consent, the information provided and the date of disclosure

    • D. 

      Verify that the consent form was dated less than 90 days ago

  • 18. 
    This term describes an organization's control over information in the organization's custody.
    • A. 

      Privacy

    • B. 

      Security

    • C. 

      Protection

    • D. 

      Confidentiality

  • 19. 
    Which term describes to make the information available or to release it to another health information custodian or to another person. 
    • A. 

      Use

    • B. 

      Collect

    • C. 

      Disclose

    • D. 

      Retain

  • 20. 
    What type of information is the following?James Smith, DOB: August 1, 2011, 1234 Whatever Street, North Pole, H0H 0H0
    • A. 

      Personal Information

    • B. 

      Quasi-identifiers

    • C. 

      De-Identifiable

    • D. 

      Personal Health Information

  • 21. 
    The following variables gender, marital status, postal code or other location information, a significant date, diagnosis information, profession, ethnic origin, visible minority status, and income would be what kind of identifier?
    • A. 

      Direct identifiers

    • B. 

      De-Identifiers

    • C. 

      Quasi-identifiers

    • D. 

      Personal Health Information

  • 22. 
    Provides services to two or more health information custodians, where the services are provided primarily to enable the custodians to use electronic means to disclose personal health information to one another.
    • A. 

      Entity

    • B. 

      Electronic Service Provider

    • C. 

      Pseudonymization

    • D. 

      Health Information Network Provider

  • 23. 
    Health Information Exchange and data-Sharing Agreements deals with the protection of all the following except:  
    • A. 

      Intellectual property rights

    • B. 

      Accountability

    • C. 

      Software licensing

    • D. 

      Dispute resolution

  • 24. 
    Check all that applies to logging ROI requests:
    • A. 

      Status of request

    • B. 

      Funds requested and collected

    • C. 

      Name of the facility releasing the information

    • D. 

      Information sent

    • E. 

      Date of the request

    • F. 

      Date and time information sent

  • 25. 
    Which is included in a Threat and Risk Assessment.
    • A. 

      Includes data mapping through the systems and analyzing the results

    • B. 

      Process helps departments and agencies determine whether new technologies, information systems, initiatives or proposed programs and policies meet the established privacy requirements.

    • C. 

      Concerned with safeguarding information assets and avoiding potential breaches

    • D. 

      Identifying threats and risks to a system and corrective or mitigating actions are developed

Back to Top Back to top