WGU C810 EXAM STUDY SET 3
TRUE - ANSWER True or false:
If a patient requests that his or her name is removed from the hospital directory,
the hospital must take the patient's name off.
without permission of the patient - ANSWER PHI can be used and disclosed
___________________ if the PHI is de-identified. Under HIPAA,
deidentification refers to health information that has had identifiers removed so
there is not the capability to reasonably identify the individual to which the
information belongs.
Documentation to release records:
Verification: Identification of attorney. - ANSWER If an attorney comes in to
request medical records for a malpractice case that he or she is assigned to, what
documentation requirements are necessary to release the records, and what type
of verification should be completed prior to releasing the records?
Avoid
transfer
accept - ANSWER What are the three basic methods to address risk after a
HIPAA risk analysis?
HIPAA Security Rule- ANSWER The ________________ requires an
organization to implement a process for regular review of system activity.
Implement hardware, software, and such to allow the ability to track and review
activity on an information system.
TRUE - ANSWER True or false:
If a patient requests that his or her name is removed from the hospital directory,
the hospital must take the patient's name off.
without permission of the patient - ANSWER PHI can be used and disclosed
___________________ if the PHI is de-identified. Under HIPAA,
deidentification refers to health information that has had identifiers removed so
there is not the capability to reasonably identify the individual to which the
information belongs.
Documentation to release records:
Verification: Identification of attorney. - ANSWER If an attorney comes in to
request medical records for a malpractice case that he or she is assigned to, what
documentation requirements are necessary to release the records, and what type
of verification should be completed prior to releasing the records?
Avoid
transfer
accept - ANSWER What are the three basic methods to address risk after a
HIPAA risk analysis?
HIPAA Security Rule- ANSWER The ________________ requires an
organization to implement a process for regular review of system activity.
Implement hardware, software, and such to allow the ability to track and review
activity on an information system.