Trivia: Can You Pass HIPAA Privacy And Security Rule Quiz?

20 Questions | Total Attempts: 2445

SettingsSettingsSettings
Trivia: Can You Pass HIPAA Privacy And Security Rule Quiz?

Can you pass the HIPAA privacy and security rule quiz? HIPAA law under the Privacy and Security Rules requires covered entities to notify individuals of uses of their Private Health Information, do you know the instances under which the information might be given out to a third party? The quiz below is perfectly designed for someone having a hard time understanding the act. Do give it a try and keep a lookout for other quizzes like it!


Related Topics
Questions and Answers
  • 1. 
    What does “HIPAA” stand for? 
    • A. 

      Health Insurance Portability and Accountability Act

    • B. 

      Healthcare Industry Privacy and Accountability Act

    • C. 

      Health Insurance Privacy and Administration Act

    • D. 

      None of the above

  • 2. 
    What is PHI (Protected Health Information)? 
    • A. 

      Covered transactions (eligibility, enrollment, health care claims, payment, etc,) performed electronically

    • B. 

      Information about past or present mental or physical condition of a patient.

    • C. 

      Information that can be used to identify a patient.

    • D. 

      All of the above

  • 3. 
    What does HIPAA do? 
    • A. 

      Protects the privacy and security of a patient’s health information

    • B. 

      Provides for electronic and physical security of a patient’s health information.

    • C. 

      Prevents health care fraud and abuse.

    • D. 

      All of the above.

  • 4. 
    Under the right to Access, healthcare employees have the right to access their own medical records directly, utilizing job-related access such as hospital information and medical records. 
    • A. 

      True

    • B. 

      False

  • 5. 
    When can you use or disclose PHI? 
    • A. 

      For the treatment of a patient, if that is part of my job.

    • B. 

      For obtaining payment for services, if that is part of my job.

    • C. 

      When the patient has authorized, in writing, its release.

    • D. 

      All of the above

  • 6. 
    How does a patient learn about privacy under HIPAA? 
    • A. 

      He looks it up on the internet.

    • B. 

      He asks his doctor or nurse.

    • C. 

      At his first visit he is given the Provider’s Notice of Privacy Practices, and signs an acknowledgement that he has received a copy of it.

    • D. 

      The Government sent this out in the mail to every U.S. Citizen prior to April 14, 2003.

  • 7. 
    Who at Mi Doctor has to follow HIPAA Law? 
    • A. 

      Every Mi Doctor Employee.

    • B. 

      Physicians and Clinicians of the Mi Doctor Medical Group.

    • C. 

      Mi Doctor employees who provide management, administrative, financial, legal, or operational support to the Mi Doctor Medical Group, if they use or disclose individually identifiable Health Information.

    • D. 

      A) b) and c)

  • 8. 
    How do you send a patient’s Protected Health Information? 
    • A. 

      With all precautions in place for the security of the records to include encrypted messages

    • B. 

      Sending PHI is never appropriate

  • 9. 
    What if you know that a patient’s PHI has been leaked to an unauthorized party? 
    • A. 

      Report it to the newspaper.

    • B. 

      Call the patient at home and report it to him

    • C. 

      Report it to Your Privacy Officer

    • D. 

      Call the HIPAA Oversight and Compliance Committee

  • 10. 
    How do I protect our patients’ PHI from unauthorized individuals? 
    • A. 

      Log off computer terminals and/or have password-protected screen-savers.

    • B. 

      Don’t give out your computer log-on and/or password to anybody.

    • C. 

      Position printers and computer terminals so that information is not accessible to or viewable by unauthorized viewers.

    • D. 

      All of the above.

  • 11. 
    • A. 

      Log your co-worker off and re-log in under your own User-ID and password.

    • B. 

      To save time, just continue working under your co-worker’s User-ID.

    • C. 

      Wait for the co-worker to return before disconnecting him/her; or take a long break until the co-worker returns

    • D. 

      Find a different computer to use.

    • E. 

      A) and/or d)

  • 12. 
    Your sister sends you an email at work with a screen saver she says you would love. What should you do? 
    • A. 

      Download it onto your computer, since it’s from a trusted source.

    • B. 

      ) Forward the message to other friends to share it.

    • C. 

      Call Information Technology (Help Desk), and ask them to help you install it.

    • D. 

      Delete the message.

  • 13. 
    Which workstation security safeguards are YOU responsible for using and/or protecting? 
    • A. 

      User ID

    • B. 

      Password

    • C. 

      Log-off procedures

    • D. 

      Lock up the office or work area (doors, windows, laptops)

    • E. 

      All of the above

  • 14. 
    Your supervisor, physician or co-worker is very busy and asks you to log into the clinical information system, using his/her User-ID and password, to retrieve some patient reports. What should you do? 
    • A. 

      It’s your job, so it’s okay to do this

    • B. 

      Ignore the request, and hope he/she forgets

    • C. 

      Decline the request, and refer to the HIPAA Security/Privacy policies

  • 15. 
    You are personally responsible for giving a patients results in a very crowded busy waiting room. You are completely compliant with the HIPAA security rules to allow the patient to view your computer instead of privately talking to the patient.
    • A. 

      True

    • B. 

      False

  • 16. 
    • A. 

      To protect against natural disasters

    • B. 

      To ensure security plans, policies, procedures, training, and contractual agreements exist

    • C. 

      To provide security for physical facilities, computer systems, and associated equipment

    • D. 

      To protect data and control access to it

  • 17. 
    Which of the following is a Technical Security?
    • A. 

      Passwords

    • B. 

      Training

    • C. 

      Locked media storage cases

    • D. 

      Designating a security officer

  • 18. 
    Penalties for non-compliance can be which of the following types?
    • A. 

      Civil and Accidental

    • B. 

      Criminal and Incidental

    • C. 

      Accidental and Purposeful

    • D. 

      Civil and Criminal

  • 19. 
    • A. 

      Covered entities and business associates are required to limit the use or disclosure of PHI to the minimum necessary to accomplish the intended or specified purpose.

    • B. 

      Minimum necessary provisions do not apply to uses or disclosures of PHI to business associates under a Business Associate Contract.

    • C. 

      Minimum Necessary does not apply when PHI is used for marketing purposes

    • D. 

      The covered entity must rely on the requesting party to determine the minimum necessary information to be provided.

  • 20. 
    Which standard is for controlling and safeguarding of PHI in all forms?
    • A. 

      Security Standards

    • B. 

      Transaction Standards

    • C. 

      Unique Identifiers and Code Sets

    • D. 

      Privacy Standards