HIPAA Training Questions and Answers Graded A+
HIPAA Training Questions and Answers Graded A+ If you find a USB drive, do not insert it into a University machine, even to identify the owner. True Once a person has died, how long does HIPAA protect the decedent's PHI? 50 years The HIPAA Security Rule requires what type of safeguards for ePHI? administrative, physical, and technical (all of the above) A covered entity is required to enter into a business associate agreement with another health care provider before disclosing PHI for the treatment of an individual. False During a charity golf tournament, a University vice chancellor was injured and transported to a UNC clinic for treatment. The vice chancellor's medical record may be accessed or viewed only: B and C If you are at home or some other off-site location, any computers and mobile devices you use to connect to University networks or systems must meet the same minimum security standards that apply to your work computer. True Before treating a vice chancellor who was injured during a charity golf tournament, the UNC clinic providing treatment requested her complete medical records for review. The clinic's request must follow the Minimum Necessary standard for purposes of treating the vice chancellor False To use or disclose PHI for research purposes, you must have: Appropriate HIPAA documentation, including an authorization or waiver of authorization All University Units are covered by HIPAA. False Which of the following are examples of best practices for safeguarding the privacy and security of PHI? All the above Which of the following best describes the University "workforce" for HIPAA purposes: Faculty, permanent and temporary staff, students, volunteers, interns and other persons whose conduct in the performance of work for a Covered Components is under the direct control of the covered component The University may be subject to fines and penalties if a University Covered Component does not timely and fully respond to patient requests to view and copy their healthcare records True Which of the following are examples of appropriate safeguards for PHI Both A & B You want to send a get-well card to a colleague's home address. Since you have access to medical records for your job, it is permissible to get the address from the medical records. False If your University-issued laptop is stolen from your home, you must report the incident to the Department of Public Safety and the IT Response Center at 919-962-HELP. True Individuals who violate the University's Privacy and Security policies will be held personally responsible and may be subject to All of the above HIPAA provides that patients have a right to: All of the above Researcher Jack intended to send an email containing PHI to his colleague Researcher Bill, but inadvertently sent the email containing PHI to Researcher Jill. All three individuals are employed by UNC in a Covered Component. Jill had no legitimate work reason to receive the email. Upon receipt of the email, Jill notified Jack that she received the email in error, deleted the email from her inbox and from her "deleted items" folder. Jack resends the email to the intended recipient, Bill. Does
Written for
- Institution
- HIPAA Training
- Course
- HIPAA Training
Document information
- Uploaded on
- March 2, 2024
- Number of pages
- 5
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
hipaa training questions and answers graded a
Also available in package deal