HIPAA Training Questions with 100% Correct
Answers | Latest Version 2024 | Expert Verified |
Ace the Test
If you find a USB drive, do not insert it into a University machine, even to identify the owner.
True
Once a person has died, how long does HIPAA protect the decedent's PHI?
50 years
The HIPAA Security Rule requires what type of safeguards for ePHI?
administrative, physical, and technical (all of the above)
A covered entity is required to enter into a business associate agreement with another health
care provider before disclosing PHI for the treatment of an individual.
False
During a charity golf tournament, a University vice chancellor was injured and transported to a
UNC clinic for treatment. The vice chancellor's medical record may be accessed or viewed only:
B and C
If you are at home or some other off-site location, any computers and mobile devices you use to
connect to University networks or systems must meet the same minimum security standards that
apply to your work computer.
True Before treating a vice chancellor who was injured during a charity golf tournament, the UNC clinic providing treatment requested her complete medical records for review. The clinic's request must follow the Minimum Necessary standard for purposes of treating the vice chancellor
False
To use or disclose PHI for research purposes, you must have:
Appropriate HIPAA documentation, including an authorization or waiver of authorization
All University Units are covered by HIPAA.
False
Which of the following are examples of best practices for safeguarding the privacy and security of PHI?
All the above
Which of the following best describes the University "workforce" for HIPAA purposes:
Faculty, permanent and temporary staff, students, volunteers, interns and other persons whose conduct in the performance of work for a Covered Components is under the direct control of the
covered component
The University may be subject to fines and penalties if a University Covered Component does not
timely and fully respond to patient requests to view and copy their healthcare records
True
Which of the following are examples of appropriate safeguards for PHI
Answers | Latest Version 2024 | Expert Verified |
Ace the Test
If you find a USB drive, do not insert it into a University machine, even to identify the owner.
True
Once a person has died, how long does HIPAA protect the decedent's PHI?
50 years
The HIPAA Security Rule requires what type of safeguards for ePHI?
administrative, physical, and technical (all of the above)
A covered entity is required to enter into a business associate agreement with another health
care provider before disclosing PHI for the treatment of an individual.
False
During a charity golf tournament, a University vice chancellor was injured and transported to a
UNC clinic for treatment. The vice chancellor's medical record may be accessed or viewed only:
B and C
If you are at home or some other off-site location, any computers and mobile devices you use to
connect to University networks or systems must meet the same minimum security standards that
apply to your work computer.
True Before treating a vice chancellor who was injured during a charity golf tournament, the UNC clinic providing treatment requested her complete medical records for review. The clinic's request must follow the Minimum Necessary standard for purposes of treating the vice chancellor
False
To use or disclose PHI for research purposes, you must have:
Appropriate HIPAA documentation, including an authorization or waiver of authorization
All University Units are covered by HIPAA.
False
Which of the following are examples of best practices for safeguarding the privacy and security of PHI?
All the above
Which of the following best describes the University "workforce" for HIPAA purposes:
Faculty, permanent and temporary staff, students, volunteers, interns and other persons whose conduct in the performance of work for a Covered Components is under the direct control of the
covered component
The University may be subject to fines and penalties if a University Covered Component does not
timely and fully respond to patient requests to view and copy their healthcare records
True
Which of the following are examples of appropriate safeguards for PHI