A) has been backed up routinely.
B) is accurate and has not been altered, lost, or destroyed in an unauthorized manner.
C) has accepted all changes and modifications to the medical record.
D) has been reviewed by the Security Officer as being accurate.
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Organization requirements; policies, procedures, and documentation; technical safeguards; administrative safeguards; and physical safeguards
B) Unique identifiers; administrative safeguards; technical safeguards; physical safeguards; and electronic signatures
C) Administrative safeguards; physical safeguards; policies, procedures, and documentation; a HIPAA Security Officer in charge; and a complex computer data backup system
D) Policies, procedures, and documentation; organization requirements; protected wireless access; secure firewalls; and virus protection
Correct Answer
verified
Multiple Choice
A) who logged in, what was done, when it was done, and what equipment was accessed.
B) who logged in, what was changed, and when it was altered.
C) all user's passwords and login information.
D) all security incidents recorded in patient records.
Correct Answer
verified
Multiple Choice
A) Administrative safeguards
B) Physical safeguards
C) Technical safeguards
Correct Answer
verified
Multiple Choice
A) must be met with documentation being optional since everyone must comply.
B) must be achieved and documented.
C) may be met with a "reasonable and appropriate" approach.
D) are the administrative and technical safeguards.
Correct Answer
verified
Multiple Choice
A) Risk management
B) Gap analysis
C) Risk analysis
D) Security management
Correct Answer
verified
Multiple Choice
A) all computer hardware and software used within the facility when it comes in and when it goes out of the facility.
B) just the addition of hardware and software within the facility to be sure they are compliant with the Security Rule.
C) just the removal of hardware and software within the facility to be sure all data is removed.
D) the net value of disposed equipment that the facility has removed from use.
Correct Answer
verified
Multiple Choice
A) Report disclosure to all patients.
B) Exclude notation of incident from the patient's medical record.
C) Notify Business Associates and Trading Partners of the breach.
D) Change passwords to protect from further invasion.
Correct Answer
verified
Multiple Choice
A) Centers for Medicare and Medicaid Services.
B) Office of E-Health Standards and Services.
C) Office for Civil Rights.
D) Office of HIPAA Standards.
Correct Answer
verified
Multiple Choice
A) Administrative safeguards
B) Physical safeguards
C) Technical safeguards
Correct Answer
verified
Multiple Choice
A) when the Security Officer includes budget items to pay for a better computer system.
B) how hard it is for hackers to access the computer system.
C) a balance between what is cost-effective and the potential risks of disclosure.
D) the cost of insurance to cover possible losses.
Correct Answer
verified
Multiple Choice
A) Risk management
B) Gap analysis
C) Risk analysis
D) Security management
Correct Answer
verified
Multiple Choice
A) Administrative safeguards
B) Physical safeguards
C) Technical safeguards
Correct Answer
verified
Multiple Choice
A) all clinical staff personnel.
B) only volunteer and nonpaid staff.
C) only new employees.
D) all workforce employees and nonemployees.
Correct Answer
verified
Multiple Choice
A) those who bill health claims only.
B) authorizing personnel to view PHI.
C) information sent to a health plan for reimbursement.
D) all clinical staff when treating a patient.
Correct Answer
verified
True/False
Correct Answer
verified
Showing 21 - 40 of 53