Which Hhs Office Is Charged With Protecting Phi

Question:

Answer: A. An individual’s first and last name and the medical diagnosis in a physician’s progress report

Question: Under HIPAA, a covered entity (CE) is defined as:

  1. A health plan.

  2. B. A health care clearinghouse.

  3. C. A health care provider engaged in standard electronic transactions covered by HIPAA

  4. D. All of the above

  5. Answer: The correct answer is D. Under HIPAA, a CE is a health plan, a health care clearinghouse, or a health care provider engaged in standard electronic transactions covered by HIPAA.

  6. Question: Select the best answer. The HIPAA Privacy Rule applies to which of the following?

  7. A. PHI transmitted orally

  8. B. PHI in paper form

  9. C. PHI transmitted electronically

  10. D. All of the above

  11. Answer: The correct answer is D. The HIPAA Privacy Rule applies to PHI that is transmitted or maintained by a covered entity or a business associate in any form or medium.

  12. Question: An incidental use or disclosure is not a violation of the HIPAA Privacy Rule if the covered entity (CE) has:

  13. A. Implemented the minimum necessary standard

  14. B. Established appropriate administrative safeguards

  15. C. Established appropriate physical and technical safeguards

  16. D. All of the above

  17. Answer:

  18. Question:

  19. Answer:

  20. Question:

  21. Answer:

  22. Question: Was this a violation of HIPAA security safeguards?

  23. A. Yes

  24. B. No

  25. Answer:

  26. Question: Select the best answer. Which of the following are fundamental objectives of information security?

  27. A. Confidentiality

  28. B. Integrity

  29. C. Availability

  30. D. All of the above

  31. Answer: The correct answer is D. Confidentiality, Integrity, and Availability are the fundamental objectives of health information security and the HIPAA Security Rule requires covered entities and business associates to protect against threats and hazards to these objectives.

  32. Question:

  33. Answer:

  34. Question:

  35. Answer: The correct answer is B. Physical safeguards are the physical measures, including policies and procedures that are used to protect electronic information systems and related buildings and equipment, from natural and environmental hazards, and unauthorized intrusion.

Donation Page

Support Our Work

Do you appreciate the value this website provides? If so, please consider donating to help keep it running. Your donation will go a long way in helping us continue to provide the same quality of content and services. Every bit helps, and your support is greatly appreciated. Thank you for your generosity.