1.
What is PHI?
A. 
Protected Health Information, as defined under the DHHS Privacy Regulations, which requires individually identifiable health information to be protected.
B. 
C. 
Three letters of the alphabet.
D. 
Confidential consumer information that covered entities, such as your employer must protect
2.
What is the maximum criminal penalty that you could be subject to if you violate HIPAA?
A. 
10 years in prison and $250,000 in monetary fines.
B. 
One week as a daycare director.
C. 
1 year's imprisonment and a $50,000 fine.
D. 
A $50,000 fine assessed by DHHS under the highter penalties under the HITECH Act
3.
HIPAA requires me to take immediate action, such as intervening and reporting to the proper authority, if I suspect or detect:
A. 
B. 
A violation of one of my employee's protocol protecting PHI.
C. 
A breach of patient confidentiality.
D. 
4.
What are my obligations to my employer in regard to HIPAA?
A. 
Comply with HIPAA law and regulations.
B. 
Comply with my employer's security rules, regulations, and policies.
C. 
Report violations of HIPAA and my employer's security requirements.
D. 
5.
HIPAA means that we can ignore other federal and state laws protecting health information.
6.
Because of my rights of privacy, I do not have to worry about my employer auditing my computer for HIPAA compliance purposes.
7.
If a co-worker breaches HIPAA and I detect it, there is no way I will get in trouble if I do not report it.
8.
In some cases, NO/AIDS Task Force protocols and procedures may be more strict that HIPAA regulations. In these cases, I can ignore NO/AIDS Task Force protocols and procedures and only follow HIPAA regulations.
9.
Which of the following must I be familiar with?
A. 
Health Information Disaster Plan
B. 
Emergency Mode Operation Plan
C. 
NO AIDS Breach Reporting Protocol
D. 
10.
Once I leave my job, I can talk about patients' / clients' PHI as much as I want.
11.
If I report a violation of my employer's policy intended to protect PHI in good faith, I will not face retaliation.
12.
Which of the following actions could my employer take in the event of a breach of its policies and procedures that did not actually result in a breach of confidentiality?
A. 
B. 
Take disciplinary action short of firing the offender, such as suspension.
C. 
Report the matter to any relevant disciplinary authority and cooperate in any investigation.
D. 
Give the offender a second chance and let it go.
E. 
Discuss the violation at the next training session to prevent its happening again.
13.
If you don't understand a HIPAA policy or procedure, you should
A. 
Take a wild guess at what it means and follow it as best as you can.
B. 
Ask your supervisor or other competent person.
C. 
Hire a lawyer to give you a legal opinion.
D. 
Do nothing, assuming that, by doing nothing, you won't make a mistake.
14.
At NO / AIDS Task Force, all suspected HIPAA breaches should first be reported for investigation to which of the following
A. 
The NATF Security Officer (Health Information Manager), your immediate supervisor, and your coworker.
B. 
Your immediate supervisor and the NO/AIDS Task Force Security Officer (Health Information Manager)
C. 
The State of Louisiana Regulations Committee
15.
Because of HIPAA and the "need to know" rule, I must restrict my information access to only the information I am authorized to access.
16.
The minimum necessary rule limits the amount of information a clinician or provider may obtain during a patient/client intake visit.
17.
It is allowable to send an email containing only a patient's UIN (Unique Identifying Number) through unencrypted email.
18.
I have been trained on HIPAA, the HIPAA Security Rule, and my emploer's HIPAA policies and procedures and will learn the contents of each policy that applies to me and will comply with HIPAA, the Security Rule, and my employer's policies and procedures. I understand that I am required to complete the NO/AIDS Task Force annual HIPAA annual I further understand that I may face disciplianry action if I do not.
19.
Check all of the following which would support Security Measures for protecting electronic PHI.
A. 
Encryption of electronic information
B. 
C. 
Installed Antivirus software
D. 
Sharing individual passwords
E. 
Automatic two-minute screen lock
20.
HIPAA regulations state that I can use my personal computer for necessary work involving PHI for work related purposes; however, NO/AIDS Task Force protocols and procedures state that I may not use my personal computer for these purposes.
Therefore, which of the following stements are true:
A. 
I can use my personal computer for work related purposes involving PHI
B. 
With my supervisor's permission,I can use my personal computer for work related purposes involving PHI
C. 
I may not use my personal computer for work related purposes involving PHI at NO/AIDS Task Force.
21.
What is HIPAA?
A. 
Something that you find in the zoo next to the elephants.
B. 
Health Insurance Portability and Accountability Act of 1996, a Public Law.
C. 
The law passed by Congress that gave the U.S. Department of Health and Human Services ("DHHS") the authority to regulate the privacy and security of patient information.
D.