Question

Please help to answer these questions HIPAA Assessment 1. When you comply with HIPAA standards, what...

Please help to answer these questions

HIPAA Assessment

1. When you comply with HIPAA standards, what are you ensuring?

a. Patients have unlimited access and control over their health information.

b. Patients have legal rights regarding who can access and use their PHI.

c. Our organization has implemented the proper security controls required by law.

d. Our organization has the final say on who can access our patients and/or customers’ PHI.

2. You attempt to log in to an unattended computer but notice one of your coworkers is still logged in with their credentials. What should you do?

a. Log out of the computer and log back in with your credentials.

b. Stay logged in as your coworker—you will only be using the computer for a minute.

c. Ask around to see if anyone else has used the computer.

d. Log out and report the situation to the Privacy Officer.

3. You are eating lunch in a public place with a coworker who begins to tell you details about a patient’s condition. Is this permitted?

a. Yes, if you have an authorized need to know.

b. Yes, as long as she doesn’t disclose the patient’s name.

c. No, only your coworker and her patient are legally allowed to discuss the patient’s condition.

d. No, even if you have an authorized need to know, you should never discuss PHI in a public place where others may hear.

4. You receive a medical file containing a patient name, address, e-mail address, injury report, and automobile VIN number. Which of the information is PHI?

a. The patient name

b. The patient name, address, and e-mail address

c. All of the information is PHI

d. None of the information is PHI

5. What’s your responsibility in protecting PHI?

a. To know and follow our organization’s HIPAA security and privacy policies and procedures for safeguarding PHI.

b. Limited, the person who gave me the PHI is responsible for its protection.

c. To know what it is and report violations as needed.

d. None, I don’t ever work with PHI.

6. True or False: You are only liable for securing physical or electronic forms of PHI.

a. True—having conversations about PHI is just part of our business and requires no security controls.

b. False—reasonable safeguards need to be taken to secure all PHI, regardless of its form.

7. To what extent can you access, use or disclose PHI?

a. To the minimum degree necessary required for treatment, payment, and health care operations.

b. To the minimum degree necessary to ensure a profit for the organization.

c. To the extent necessary to fulfill authorizations allowed by the patient.

d. Generally, if you can access PHI, you can use it.

8. You just learned from Facebook that your friend had an accident and they may be in the hospital. You’re concerned about them and want to know if they are OK. What can you do (select all that apply)?

a. Contact a mutual friend to find out what they might know.

b. Call the Operators to inquire of their presence.

c. Contact Health Information Management (HIM) to get a copy of information.

d. Look them up in the system to see what happened.

9. You receive a patient complaint that their privacy has been violated. What should you do?

a. Try to resolve the situation.

b. Direct the complaint to the appropriate person in the organization (the Privacy Officer).

c. Determine if it is a valid complaint and then report it as necessary.

d. Nothing—complaints are a natural part of business operations.

10.A coworker asks you to provide him with PHI for one of his employees. He isn’t authorized to access the information himself, but assures you he has no malicious intent. Should you do this?

a. Yes, because he is a coworker, he has a business need.

b. Yes, if he has no malicious intent, there’s no harm in doing a favor.

c. No, you can’t be sure he won’t use this information illegally.

d. No, providing this information—regardless of intent—is against the law and could result in massive legal repercussions.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

1,c, Our organization has implemented the proper security controls required by law.
HIPAA security rule, privacy rule standards ensure how the organization must protect ePHI include administrative safeguard, technical safeguard, and physical safeguard.
2,d, logout and report the situation to the privacy officer
If you find the confidential information whether in paper and computer if unattended with log in if inappropriately accessed it should be reported to the privacy officer.
3, d, no, even if you have an authorized need to know, you should never discuss PHI in a public place where others may hear.
Protecting privacy guidelines will include not speaking about patient information where others can hear.
4, c, All of the information is PHI
PHI considered personally identifiable with the injury report, vehicle identifier with the serial number, patient name, address, email address, geographic locators, dates and tax numbers.

Add a comment
Know the answer?
Add Answer to:
Please help to answer these questions HIPAA Assessment 1. When you comply with HIPAA standards, what...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Please help to answer these questions 5. What’s your responsibility in protecting PHI? a. To know...

    Please help to answer these questions 5. What’s your responsibility in protecting PHI? a. To know and follow our organization’s HIPAA security and privacy policies and procedures for safeguarding PHI. b. Limited, the person who gave me the PHI is responsible for its protection. c. To know what it is and report violations as needed. d. None, I don’t ever work with PHI. 6. True or False: You are only liable for securing physical or electronic forms of PHI. a....

  • 16 When using speakerphone, which of the following should occur to comply with HIPAA? a Inform...

    16 When using speakerphone, which of the following should occur to comply with HIPAA? a Inform the caller that you will be using speakerphone b. Let the person know who else will be listening in c Door or reception window should be closed d. Should not be used in areas where conversation can be overheard 17. When answering incoming calls, what is the finst thing the caller should hear? a The name of the facility b Your name 4 seuc...

  • Protecting Health Care Privacy The U.S. Health Insurance Portability and Accountability Act (HIPAA) addresses (among other...

    Protecting Health Care Privacy The U.S. Health Insurance Portability and Accountability Act (HIPAA) addresses (among other things) the privacy of health information. Its Title 2 regulates the use and disclosure of protected health information (PHI), such as billing services, by healthcare providers, insurance carriers, employers, and business associates Email is often the best way for a hospital to communicate with off-site specialists and insurance carriers about a patient. Unfortunately, standard email is insecure. It allows eavesdropping, later retrieval of messages...

  • pls i need answers to them DIRECTIONS: For each question below circle the best response among...

    pls i need answers to them DIRECTIONS: For each question below circle the best response among the choices listed 1. True or false: It is allowable under HIPAA to log in to the facility's system under a generic username and password a) True b) False 2. Which of the following is a common way to ensure physical security in the workplace? a) Make sure desk drawers and doors are locked, as appropriate. b) Verify the identification of anyone unknown requesting...

  • Instructions: Read each case, 1 - 7, and choose which forensic psyche identification goes with that...

    Instructions: Read each case, 1 - 7, and choose which forensic psyche identification goes with that particular case. Explain your rationale for your choice. Submit your assignment as an attachment. Case # 4 A staff member of a medical practice discussed HIV testing procedures with a patient in the waiting room, thereby disclosing PHI to several other individuals. Also, computer screens displaying patient information were easily visible to patients A. Competency to Stand Trial B. M’naghten Rule C. HIPAA D....

  • c. reading written WUIUS. d listening to what is said. e. A and D 11. With...

    c. reading written WUIUS. d listening to what is said. e. A and D 11. With the cognitive domain, what is a way to help patients remember critical information? a. Provide written step-by-step directions for the patient to follow. b. Give timely feedback on the patient's performance. c. Consider cultural customs in your coaching. d. Present information in small chunks and in a clear well-organized manner. e. Band D Which of the following would be a barrier to learning in...

  • 27 Chapter 2 Quality Assurance and legales in Healthcare KNOWLEDGE DRILLS KNOWLEDGE DRILL 2-1: CAUTION AND...

    27 Chapter 2 Quality Assurance and legales in Healthcare KNOWLEDGE DRILLS KNOWLEDGE DRILL 2-1: CAUTION AND KEY POINT RECOGNITION The following sentences are taken from "CAUTION and KEY POINT statements found throughout Chapter 2 in the TEXTBOOK. Using the TEXTBOOK, fill in the banks with the missing information 1. The CAP requires (A) In an employee's personnel file to confirm that the employee and (C) to perform the responsibilities for which he or she is 2. There have been cases...

  • Note: Questions can have multiple valid answers, hence select all choices that apply. 1. What security...

    Note: Questions can have multiple valid answers, hence select all choices that apply. 1. What security feature ensures that only trusted and approved parties can view a file? a) Availability b) Integrity e) Confidentiality d) Authorization e) None of the above 2. An organization wanting to achieve improved security via diversity should: a) Limit access to information to certain individuals and systems b) Perform extensive types of penetration testing of its networks and systems c) Purchase products from multiple different...

  • 1. It is the responsibility of the _____ workstation to contact the patient about an Action...

    1. It is the responsibility of the _____ workstation to contact the patient about an Action Note prior to pick-up. a. Verification b. Production c. Pick-up d. Drop-off 2. Which type of medication is placed in the ear? a. Suspensions b. Otic preparations c. Elixirs d. Ophthalmic preparations 3. The medication stock bottle contains an NDC number that is how many digits? a. 9 b. 11 c. 10 d. 12 4. Which of the following is NOT typically provided on...

  • Please help Look through the questions, answer and research. You will provide a word doc that...

    Please help Look through the questions, answer and research. You will provide a word doc that wil lprovide what you believe is the correct answer. Along with your answer you will give a rationale that is cited with a reference. The rationale you submit is your interpretation of what you think and believe supports your chosen answer. Yoost: Fundamentals of Nursing Chapter 01: Nursing, Theory, and Professional Practice Review Questions 1.   In comparing the American Nurses Association (ANA) and International...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT