JKO Remedial HIPAA Questions and Answers
True or False? Under HIPAA, a person or entity that provides services to a CE that do not involve the use or disclosure of PHI would be considered a BA.
False
Do Betty's actions in this scenario constitute a HIPAA Privacy Rule violation?
Yes, because Betty's actions are in violation of the minimum necessary standard in that John did not need access to the patient's complete medical file (PHI) to perform his job duties
A friend of Phillip Livingston, a military service member who is being treated for a broken leg at Valley Forge MTF, asked what room Phillip is in so that he can visit.
Which of the following is required?
The patient must be given an opportunity to agree or object to the use or disclosure
The Chief Medical Officer for Valley Forge MTF utilizing PHI is conducting a monthly physician peer review operations exercise.
Which of the following is required?
Neither an authorization nor an opportunity to agree or object is required
Abigail Adams is a TRICARE beneficiary and patient at Valley Forge MTF and is applying for Sun Life Insurance. Sun Life has requested some of Abigail's medical records in order to evaluate her application.
Which of the following is required?
An authorization is required
Dr. Jefferson sends a patient's medical record to the surgeon's office in support of a referral for treatment he made for the patient.
Which of the following is required?
Neither an authorization nor an opportunity to agree or object is required
Valley Forge MTF discloses a patient's information in response to a request from HHS in the investigation of a patient complaint.
Which of the following is required?
Neither an authorization nor an opportunity to agree or object is required
Did Valley Forge MTF handle George's request appropriately?
No, because the MTF is required to respond to George in writing, providing an accounting of certain disclosures going back 6 years from the date of the request
Which of the following would be considered PHI?
An individual's first and last name and the medical diagnosis in a physician's progress report
Select the best answer. The HIPAA Privacy Rule applies to which of the following?
All of the above
Which of the following is not electronic PHI (ePHI)?
Health information stored on paper in a file cabinet
Select the best answer. Which of the following are true statements about limited data sets?
All of the above
How should John advise the staff member to proceed?
Both B and C
Was this a violation of HIPAA security safeguards?
Yes --- Thomas violated DoD's policy in downloading ePHI to a flash drive. As a result of this policy violation, Thomas put the ePHI of a significant number of Valley Forge....
Physical safeguards are:
Physical measures, including policies and procedures that are used to protect electronic information systems and related buildings and equipment, from natural and environmental hazards, and unauthorized intrusion
Select the best answer. Which of the following statements about the HIPAA Security Rule are true?
All of the above
The HIPAA Security Rule applies to which of the following:
PHI transmitted electronically
Administrative safeguards are:
Administrative actions, and policies and procedures that are used to manage the selection, development, implementation and maintenance of security measures to protect electronic PHI (ePHI). These safeguards also outline how to manage the conduct of the workforce in relation to the protection of ePHI
What enforcement actions may occur based on Janet's conduct?
All of the above
Which HHS Office is charged with protecting an individual patient's health information privacy and security through the enforcement of HIPAA?
Office for Civil Rights (OCR)
Select the best answer. If an individual believes that a DoD covered entity (CE) is not complying with HIPAA, he or she may file a complaint with the:
All of the above
A covered entity (CE) must have an established complaint process.
True
Select the best answer. Which of the following are categories for punishing violations of federal health care laws?
All of the above
How should John respond?
Yes. Privacy Act Statements and a SORN should both be considered prior to initiating the research project
Major Edmund Randolph, an active member of the United States Air Force, recently discovered through a publicnotice that his PII is being maintained by the federal government in a system of records. Because Major Randolph isvery diligent about safeguarding his personal information and is aware of how this information could bevulnerable, he is interested in obtaining a copy and reviewing them for accuracy. Is Major Randolph able to obtain acopy of his records from the system of records and request changes to ensure that they are accurate?
Yes, Major Randolph is able to request to inspect and copy his records and can request an amendment to correct inaccurate information.
The e-Government Act promotes the use of electronic government services by the public and improves the use of information technology in the government.
True
A Systems of Records Notice (SORN) serves as a notice to the public about a system of records and must:
All of the above
Select the best answer. Which of the following statements about the Privacy Act are true?
All of the above
Select the best answer. Which of the following are examples of personally identifiable information (PII)?
All of the above
George is reminded of a conversation he overheard between two co-workers who were contemplating selling some old Valley Forge MTF computers instead of disposing of them through the MTF's IT department. With reason to believe Alexander is telling the truth as to the computers and PHI in his possession, what is the appropriate course of action for George?
George should immediately report the possible breach to his supervisor and assist in providing any relevant information for purposes of the investigation
Is Carla's time saving measure appropriate provided she only sends unencrypted emails on occasion?
No, because unencrypted emails containing PHI or PII may be intercepted and result in unauthorized access
Select the best answer. Which of the following are common causes of breaches?
All of the above
Select the best answer. Which of the following are breach prevention best practices?
All of the above
A breach as defined by the DoD is broader than a HIPAA breach (or breach defined by HHS).
True
When must a breach be reported to the U.S. Computer Emergency Readiness Team?
Within 1 hour of discovery
In which of the following circumstances must an individual be given the opportunity to agree or object to the use and disclosure of their PHI?
-Before their information is included in a facility directory
-Before PHI directly relevant to a person's involvement with the individual's care or payment of health care is shared with that person
Which of the following statements about the HIPAA Security Rule are true?
All of the above
-a national set of standards for the protection of PHI that is created, received, maintained, or transmitted in electronic media by a HIPAA covered entity (CE) or business associate (BA)
-Protects electronic PHI (ePHI)
- Addresses three types of safeguards - administrative, technical and physical - that must be in place to secure individuals' ePHI
A covered entity (CE) must have an established complaint process.
true
The e-Government Act promotes the use of electronic government services by the public and improves the use of information technology in the government.
true
When must a breach be reported to the U.S. Computer Emergency Readiness Team?
1 hour
Which of the following statements about the Privacy Act are true?
All of the above
What of the following are categories for punishing violations of federal health care laws?
All of the above
Which of the following are common causes of breaches?
All of the above
Which of the following are fundamental objectives of information security?
All of the above
If an individual believes that a DoD covered entity (CE) is not complying with HIPAA, he or she may file a complaint with the:
All of the above
Technical safeguards are:
Information technology and the associated policies and procedures that are used to protect and control access to ePHI (correct)
A Privacy Impact Assessment (PIA) is an analysisof how information is handled
All of the above
A breach as defined by the DoD is broader than a HIPAA breach (or breach defined by HHS).
true
Which of the following are breach prevention best practices?
All of the above
An incidental use or disclosure is not a violation of the HIPAA Privacy Rule if the covered entity (CE) has:
All of the above
Under the Privacy Act, individuals have the right to request amendments of their records contained in a system of records.
true
Which HHS Office is charged with protecting an individual patient's health information privacy and security through the enforcement of HIPAA?
Office for Civil Rights (OCR) (correct)
Physical safeguards are:
Physical measures, including policies and procedures that are used to protect electronic information systems and related buildings and equipment, from natural and environmental hazards, and unauthorized intrusion (correct)
Which of the following would be considered PHI?
An individual's first and last name and the medical diagnosis in a physician's progress report (correct)
The minimum necessary standard:
All of the above