Back to AI Flashcard MakerHealthcare /HIPAA and Privacy Act Training Flashcards Part 1
HIPAA and Privacy Act Training Flashcards Part 1
This deck covers key concepts from the HIPAA and Privacy Act Training, including privacy rules, security measures, and breach protocols.
Select all that apply: In which of the following circumstances must an individual be given the opportunity to agree or object to the use and disclosure of their PHI?
Both A and C
-Before PHI directly relevant to a person's involvement with the individual's care or payment of health care is shared with that person
- Before their information is included in a facility directory
Tap or swipe ↕ to flip
Swipe ←→Navigate
1/20
Key Terms
Term
Definition
Select all that apply: In which of the following circumstances must an individual be given the opportunity to agree or object to the use and disclosure of their PHI?
Both A and C
-Before PHI directly relevant to a person's involvement with the individual's care or payment of health care is shared with that person
-...
Which of the following statements about the HIPAA Security Rule are true?
All of the above
A covered entity (CE) must have an established complaint process.
True
The e-Government Act promotes the use of electronic government services by the public and improves the use of information technology in the government.
True
When must a breach be reported to the U.S. Computer Emergency Readiness Team?
Within 1 hour of discovery
Which of the following statements about the Privacy Act are true?
All of the above
Related Flashcard Decks
Study Tips
- Press F to enter focus mode for distraction-free studying
- Review cards regularly to improve retention
- Try to recall the answer before flipping the card
- Share this deck with friends to study together
| Term | Definition |
|---|---|
Select all that apply: In which of the following circumstances must an individual be given the opportunity to agree or object to the use and disclosure of their PHI? | Both A and C
-Before PHI directly relevant to a person's involvement with the individual's care or payment of health care is shared with that person
- Before their information is included in a facility directory |
Which of the following statements about the HIPAA Security Rule are true? | All of the above |
A covered entity (CE) must have an established complaint process. | True |
The e-Government Act promotes the use of electronic government services by the public and improves the use of information technology in the government. | True |
When must a breach be reported to the U.S. Computer Emergency Readiness Team? | Within 1 hour of discovery |
Which of the following statements about the Privacy Act are true? | All of the above |
What of the following are categories for punishing violations of federal health care laws? | All of the above |
Which of the following are common causes of breaches? | All of the above |
Which of the following are fundamental objectives of information security? | All of the above |
If an individual believes that a DoD covered entity (CE) is not complying with HIPAA, he or she may file a complaint with the: | All of the above |
Technical safeguards are: | Information technology and the associated policies and procedures that are used to protect and control access to ePHI |
A Privacy Impact Assessment (PIA) is an analysis of how information is handled: | All of the above |
A breach as defined by the DoD is broader than a HIPAA breach (or breach defined by HHS). | True |
Which of the following are breach prevention best practices? | All of the above |
An incidental use or disclosure is not a violation of the HIPAA Privacy Rule if the covered entity (CE) has: | All of the above |
Under the Privacy Act, individuals have the right to request amendments of their records contained in a system of records. | True |
Which HHS Office is charged with protecting an individual patient's health information privacy and security through the enforcement of HIPAA? | Office for Civil Rights (OCR) |
Physical safeguards are: | Physical measures, including policies and procedures that are used to protect electronic information systems and related buildings and equipment, from natural and environmental hazards, and unauthorized intrusion |
Which of the following would be considered PHI? | An individual's first and last name and the medical diagnosis in a physician's progress report |
The minimum necessary standard: | All of the above |