Question

Please help to answer these questions 5. What’s your responsibility in protecting PHI? a. To know...

Please help to answer these questions

5. What’s your responsibility in protecting PHI?

a. To know and follow our organization’s HIPAA security and privacy policies and procedures for safeguarding PHI.

b. Limited, the person who gave me the PHI is responsible for its protection.

c. To know what it is and report violations as needed.

d. None, I don’t ever work with PHI.

6. True or False: You are only liable for securing physical or electronic forms of PHI.

a. True—having conversations about PHI is just part of our business and requires no security controls.

b. False—reasonable safeguards need to be taken to secure all PHI, regardless of its form.

7. To what extent can you access, use or disclose PHI?

a. To the minimum degree necessary required for treatment, payment, and health care operations.

b. To the minimum degree necessary to ensure a profit for the organization.

c. To the extent necessary to fulfill authorizations allowed by the patient.

d. Generally, if you can access PHI, you can use it.

8. You just learned from Facebook that your friend had an accident and they may be in the hospital. You’re concerned about them and want to know if they are OK. What can you do (select all that apply)?

a. Contact a mutual friend to find out what they might know.

b. Call the Operators to inquire of their presence.

c. Contact Health Information Management (HIM) to get a copy of information.

d. Look them up in the system to see what happened.

9. You receive a patient complaint that their privacy has been violated. What should you do?

a. Try to resolve the situation.

b. Direct the complaint to the appropriate person in the organization (the Privacy Officer).

c. Determine if it is a valid complaint and then report it as necessary.

d. Nothing—complaints are a natural part of business operations.

10.A coworker asks you to provide him with PHI for one of his employees. He isn’t authorized to access the information himself, but assures you he has no malicious intent. Should you do this?

a. Yes, because he is a coworker, he has a business need.

b. Yes, if he has no malicious intent, there’s no harm in doing a favor.

c. No, you can’t be sure he won’t use this information illegally.

d. No, providing this information—regardless of intent—is against the law and could result in massive legal repercussions.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

5.Knowing the organisation policies in regards to HIPAA usage but at the same time it is very essential to report a violation too.

It is not limited to the person who provides it but to the concerned professionals who have the access to use it

Personal Health Record are the most confidential data to be maintained by the organization and it is the utmost responsibility of a healthcare professionals to secure and protect it from any misuse.If suspected for any misuse or at risk for violations it is an important thing to report the concerned authorities to prevent any breach of confidentiality .It shoykd be reported as per protocol not as oer need.

Ans:To know and follow our organization's HIPAA security and privacy policies and procedures and safeguarding PHI

6.Any conversation about the healthcare records should be kept confidential though used for official purposes as per the standards of law..It is a must to protect all records reasonably in any forms

Ans:False-reasonable safeguards need to be taken to secure all PHI,regardless of it's form

7.The covered entity generally makes use of PHI as per the minimum requirement. It depends on the consent given by patients for treatment, payment and health care operation

It does not divides on the profits of organization

Patient authorization is needed only to disclose certain specific information otherwise the standard is followed

Ans:To the minimum degree necessary for treatment, payment and healthcare operations

8.It is better to collect information from a mutual friend if they are aware.The operators can be contacted to know their presence and plan for a visit.

Collection of information from HIM professionals is an act of intruding in others privacy

Looking up in system without authorization or access is violation

Abs:Contact mutual friend to find out what they know

  Call the operators to inquire of their presence

Add a comment
Know the answer?
Add Answer to:
Please help to answer these questions 5. What’s your responsibility in protecting PHI? a. To know...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Please help to answer these questions HIPAA Assessment 1. When you comply with HIPAA standards, what...

    Please help to answer these questions HIPAA Assessment 1. When you comply with HIPAA standards, what are you ensuring? a. Patients have unlimited access and control over their health information. b. Patients have legal rights regarding who can access and use their PHI. c. Our organization has implemented the proper security controls required by law. d. Our organization has the final say on who can access our patients and/or customers’ PHI. 2. You attempt to log in to an unattended...

  • Overview: Now that you’re super knowledgeable about security, let's put your newfound know-how to the test....

    Overview: Now that you’re super knowledgeable about security, let's put your newfound know-how to the test. You may find yourself in a tech role someday, where you need to design and influence a culture of security within an organization. This project is your opportunity to practice these important skillsets. Assignment: In this project, you’ll create a security infrastructure design document for a fictional organization. The security services and tools you describe in the document must be able to meet the...

  • (PLEASE TYPE THE ANSWER TO THIS QUESTION OUT AND NOT WRITE IT ON A NOTE PD...

    (PLEASE TYPE THE ANSWER TO THIS QUESTION OUT AND NOT WRITE IT ON A NOTE PD OR WHITE BOARD) Overview: Now that you’re super knowledgeable about security, let's put your newfound know-how to the test. You may find yourself in a tech role someday, where you need to design and influence a culture of security within an organization. This project is your opportunity to practice these important skillsets. Assignment: In this project, you’ll create a security infrastructure design document for...

  • Protecting Health Care Privacy The U.S. Health Insurance Portability and Accountability Act (HIPAA) addresses (among other...

    Protecting Health Care Privacy The U.S. Health Insurance Portability and Accountability Act (HIPAA) addresses (among other things) the privacy of health information. Its Title 2 regulates the use and disclosure of protected health information (PHI), such as billing services, by healthcare providers, insurance carriers, employers, and business associates Email is often the best way for a hospital to communicate with off-site specialists and insurance carriers about a patient. Unfortunately, standard email is insecure. It allows eavesdropping, later retrieval of messages...

  • MBA 5005 law home help required please help me answer questions 83 thru 86 83. Which...

    MBA 5005 law home help required please help me answer questions 83 thru 86 83. Which of the following is true regarding assault? a. Assault is an intentional, nonconsensual act that gives rise to the apprehension that a harmful or offensive contact is imminent. offensive contact is imminent. harmful or offensive contact is imminent. b. Assault is an intentional, nonconsensual act that gives rise to the fear that a harmful or e. Assault is a negligent, nonconsensual act that gives...

  • Help Sever Required information Planning Your Internship or Job Search Preparing to search for a job requires buil...

    Help Sever Required information Planning Your Internship or Job Search Preparing to search for a job requires building a network of contacts: analyzing your skills, abilities, and interests, and finding an employer. In this activity, you will be asked to do some planning for your own search for an internship or a job To engage in this planning, you will need an understanding of the following: What a network of contacts is and how to acquire one -What you need...

  • question3,4&5.. Part Read the scenario, then answer the questions that follow Scenario You have assisted Mark...

    question3,4&5.. Part Read the scenario, then answer the questions that follow Scenario You have assisted Mark to become active in a local theatre group that meets once Saturday. The program leader has contacted you by phone to say she is womed about Man She you he has had several falls at the theatre lately and that his mood and level of awareness to have changed in recent weeks. You know Mark has had difficulties with medication management the past and...

  • Hi, I do not know what to do with these three questions. Please help me with...

    Hi, I do not know what to do with these three questions. Please help me with them. I so appreciate! Thank you! 1. Applying the results of a study of the National Basketball Association would lead you as a college coach to encourage touching among teammates in the hope of improving your team's performance. Group of answer choices: True False 2. You don't want your parents to know you borrowed their car while they were away on vacation. Your parents...

  • Please choose 5 questions from 20 and answer them. 1. How can a security framework assist...

    Please choose 5 questions from 20 and answer them. 1. How can a security framework assist in the design and implementation of a security infrastructure? What is information security governance? Who in the organization should plan for it? 2. Where can a security administrator find information on established security frameworks? 3. What is the ISO 27000 series of standards? Which individual standards make up the series? 4. What are the issues associated with adopting a formal framework or model? 5....

  • please let me know the answer to these two questions. These are related questions E10-2 AS...

    please let me know the answer to these two questions. These are related questions E10-2 AS Company buys a marketable security on January 1, 2002, that is expected to pay off $1,000 on December 31, 2005. AS believes a 7% interest rate is appropriate. Required: a. Determine how much AS paid for the security. b. Fill in the following chart with the economic value of the security on the dates indi- cated, assuming that events unfold as expected. 1/1/02 12/31/02...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT