UNIT 7 CAHIMS 100% VERIFIED SOLUTION UPDATE
UNIT 7 CAHIMS 100% VERIFIED SOLUTION UPDATE True or false? Administrative activities, fraud and abuse investigations, and health insurance policy underwriting are not covered by the HIPAA Privacy Rule. - ANS-false In general, patient authorization is not required in order to disclose personal health information for the purposes of treatment, payment, and healthcare operations (TPO). Healthcare operations are all activities that support the treatment and payment activities of healthcare. Administrative activities, fraud and abuse investigations, and health insurance policy underwriting are just a few examples of healthcare operations. The National Research Council (NRC) recommends that all organizations that handle protected health information (PHI) should have --authentication/access/audit-- controls in place to ensure that users can access only the information they need to perform their job. - ANS-access True or false? Under the HIPAA compliance audit program, entities that the Office for Civil Rights (OCR) finds not to be in good faith compliance with HIPAA could face large penalties. - ANS-true True or false? Although it is resource intensive, humans must directly verify the accuracy of data stored in databases to ensure their integrity. - ANS-false --Nonrepudiation/Integrity/Availability-- provides proof that a certain action has taken place or that something or someone is what or who they claim to be. - ANSNonrepudiation Nonrepudiation requires that those who access protected health information are allowed to do so and that they prove they are who they say they are. When Minjoon received a statement from his insurance company regarding his recent eye surgery, he noticed that it said he had surgery on his right eye, but the surgery was actually performed on his left eye. It turns out that the mistake was in the provider's records, which he eventually had corrected. Which of the following principles underlying HIPAA privacy and security came into play when the records were changed? Accountability Public responsibility Consumer control Security - ANS-consumer control Under the HITECH Act, covered entities must maintain a log of breaches and annually report them to --HHS/affected patients/local media--. - ANS-HHS Providing patients with a copy of their paper health record poses a security safeguard challenge because the data must be encrypted. - ANS-false Data encryption is a security safeguard for electronic data, not paper data. An example of a public health agency that functions primarily as a -- covered/hybrid/noncovered-- entity is one that is mandated by state law to receive protected health information (PHI) from healthcare providers in order to conduct an epidemiological investigation. - ANS-noncovered In cases of --international disease outbreaks/births and deaths/workplace medical surveillance--, public health agencies must notify patients of disclosure of their protected health information (PHI) even though patient authorization is not required. - ANSworkplace medical surveillance Acme Health Informatics is a company that receives medical claim information from providers who do not have systems that can process standard code sets electronically. Acme converts this information into standard electronic format and submits it to the appropriate health insurance plan for processing. True or false? Acme Health Informatics is not a covered entity according to HIPAA. - ANS-false Acme Health Informatics is a healthcare clearinghouse and so is a covered entity according to HIPAA. True or false? The Privacy Act of 1974 applied only to federal agencies, not to state or local governments. - ANS-true Sonja is a data entry clerk for American Health Insurance Corporation. Her sole job function is to type information from paper claims into the company's computer system so it can be processed. She cannot view records of customer service calls or previously submitted claims. Which recommendation of the National Research Council (NRC) is the company following? Software discipline Backup plans Audit trails Access controls - ANS-access controls General Hospital has an automated process in place that records all accesses to its computer systems. Designated staff are charged with running reports to break down and review these accesses to ensure that any access to and creation or modification of protected health information (PHI) complies with regulations and hospital guidelines. Which of the following safeguards is the hospital implementing in maintaining this record of all accesses to its PHI?...
Written for
- Institution
- UNIT 7 CAHIMS
- Course
- UNIT 7 CAHIMS
Document information
- Uploaded on
- October 22, 2023
- Number of pages
- 23
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
- unit 7 cahims
-
unit 7 cahims 100 verified solution update
-
true or false administrative activities fraud an
Also available in package deal