1.
Alison received an e-mail from an employer group which contains a member’s consumer number, social security number and date of birth. She needs to reply back to this e-mail, what should Alison do before she sends her reply?
Correct Answer
B. Remove the confidential information from the e-mail.
Explanation
Before sending her reply, Alison should remove the confidential information from the email. This is important to protect the privacy and security of the recipient's personal information. By removing the consumer number, social security number, and date of birth, Alison ensures that sensitive data is not exposed or at risk of being misused. Encrypting her response or confirming the absence of new confidential information may also be good practices, but the immediate and necessary action is to remove the sensitive data from the email.
2.
Becky works in the maternity ward. She is walking out to her car at the end of her shift and sees Brad Pitt being wheeled into the ER. She is really curious to know why he’s there and she knows that his personal business is always in the news anyway. Is Becky allowed to peek in his medical record?
Correct Answer
B. No, Becky shouldn’t look in the medical record unless she’s involved in his care, regardless of whether he is famous or not.
Explanation
Becky is not allowed to peek into Brad Pitt's medical record because she is not involved in his care. Regardless of his fame, medical records are confidential and should only be accessed by healthcare professionals who are directly involved in the patient's treatment. Patient privacy and confidentiality are important ethical principles that must be upheld in healthcare settings.
3.
You are working at your desk and need to make a quick trip to the copier. Is there anything you need to do to your computer before you leave your desk?
Correct Answer
B. Yes, secure or lock my computer.
Explanation
Before leaving your desk, it is important to secure or lock your computer to protect it from unauthorized access. This helps to ensure the confidentiality and security of any sensitive information that may be stored on your computer. By locking your computer, you prevent anyone from accessing your files, emails, or any other personal or confidential data. This simple precautionary measure can help prevent unauthorized use or tampering with your computer while you are away from your desk.
4.
Columbia Medical Associates has privacy and security policies because they:
Correct Answer
D. All of the above.
Explanation
Columbia Medical Associates has privacy and security policies to ensure the protection of member information, comply with legal requirements, and provide clear guidelines for staff on their responsibilities. These policies serve multiple purposes, including safeguarding sensitive data, meeting legal obligations, and ensuring that employees understand their roles and obligations in maintaining privacy and security. Therefore, the correct answer is "All of the above."
5.
When a doctor is e-mailing a patient, what type of messaging should be used?
Correct Answer
B. Columbia Medial Associates has no appropriate electronic forms of messaging patients.
Explanation
The correct answer is "Columbia Medical Associates has no appropriate electronic forms of messaging patients." This answer suggests that when a doctor is e-mailing a patient, they should not use any electronic forms of messaging available at Columbia Medical Associates. This implies that the organization does not have a secure or suitable system in place for doctor-patient communication through electronic means. Therefore, it is advisable for the doctor to avoid using any electronic messaging platforms provided by Columbia Medical Associates and explore alternative methods of communication with the patient.
6.
If you have access to Allscripts, are you allowed to use your employee access to view your own medical record?
Correct Answer
B. No, you are not allowed to use your employee access to look at your own medical record.
Explanation
Access to medical records is typically restricted to authorized healthcare professionals who have a legitimate need to view the information for patient care purposes. Even though it is your own medical record, using your employee access to view it would likely be considered a breach of privacy and a violation of the organization's policies.
7.
You need to dispose of patient labels; they have a patient’s name and consumer number printed on them. Where should they be disposed of?
Correct Answer
A. In the locked paper confidential waste bin.
Explanation
Patient labels containing personal information should be disposed of in the locked paper confidential waste bin. This bin is specifically designed for confidential documents and ensures that sensitive information is securely disposed of. This helps to protect patient privacy and prevent unauthorized access to personal data. Disposing of the labels in the garbage or recycling bin could potentially lead to the information being accessed by unauthorized individuals, which could result in privacy breaches or identity theft. The special confidential waste bin for non-paper items may not be suitable for disposing of labels as they are typically made of paper.
8.
A 14 year old patient comes in for a pregnancy test. The patient’s mother calls the clinic, she didn’t know her daughter was going in for care and wants information about why her child is there. Can you tell the mother why the patient is being seen?
Correct Answer
B. No, 14 year olds have the right to choose if reproductive information is shared with family.
Explanation
In many jurisdictions, minors who are 14 years old or older have the right to confidentiality regarding their reproductive health information. This means that healthcare providers are not allowed to share this information with their parents or guardians without the minor's consent. Therefore, the mother does not have the right to know why her child is being seen for a pregnancy test unless the patient gives permission to disclose this information.
9.
Chris notices his co-worker looking at her own medical record in Allscripts. Is Chris required to report his co-worker.
Correct Answer
A. Yes, as a staff member, Chris is required to report all privacy breaches.
Explanation
As a staff member, Chris is required to report all privacy breaches because it is important to maintain the confidentiality of medical records. Regardless of the person involved, any breach of privacy should be reported to ensure that appropriate actions can be taken to address the issue and prevent further breaches. This helps to protect the privacy and rights of patients and maintain the trust and integrity of the healthcare system.
10.
Dana wants to send flowers to her co-worker for his birthday. Is Dana allowed to get her co-worker’s address from a Columbia Medical Associates system?
Correct Answer
B. No, Columbia Medical Associates information should only be used for business purposes.
Explanation
The correct answer is "No, Columbia Medical Associates information should only be used for business purposes." This answer is based on the principle that accessing someone's personal information, such as their address, without their consent or for non-business purposes would be a violation of privacy and misuse of the company's information. It is important to respect privacy and only use personal information for the intended and authorized purposes.
11.
What are some ways you can support password security?
Correct Answer
E. All of the above.
Explanation
All of the given ways can support password security. Choosing a password that is hard to guess, including numbers, letters, and special characters makes it more difficult for others to crack the password. Not writing down passwords prevents them from being easily accessible to others. Changing the password immediately if there is a suspicion of inappropriate access helps to maintain security. Never sharing or asking to share passwords with others ensures that only authorized individuals have access to the account. Therefore, all of these practices contribute to enhancing password security.
12.
June would like to review Columbia Medical Associates privacy and security policies. Where can she find them?
Correct Answer
B. Go to CMA Web.
Explanation
The correct answer is "Go to CMA Web." This is because Columbia Medical Associates' privacy and security policies would most likely be found on their official website, which is referred to as CMA Web. Therefore, June can review the policies by visiting the website.