The objective of this document is to safeguard the premises and building from unauthorized physical access and to safeguard the equipment therein from unauthorized physical access, tampering and theft
As part of their HIPAA compliance process, a small doctor's office formally puts the office manager in charge of security related issues. This complies with which security rule standard?
Once a year, a team at ABC Hospital reviews environmental and operational changes that may have had an impact on the security of electronic PHI. This is an example of:
A pharmacist is approached by an individual and asked a question about an over-the-counter medication. The pharmacist needs some protected health information (PHI) from the individual to answer the question. The pharmacist will not be creating a record of this interaction. The Privacy Rule requires the pharmacist to:
The transaction number assigned to the Health Care Claim Payment/Advice transaction is:
The Final Privacy Rule requires a covered entity to obtain an individual's prior written authorization to use his or her PHI for marketing purposes except for:
Information in this transaction is generated by the payer's adjudication system:
The code set that must be used to describe or identify outpatient physician services and procedures is:
Conducting an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality, integrity, and availability of electronic PHI is:
Select the FALSE statement regarding health-related communications and marketing in the HIPAA regulations:
The transaction number assigned to the Payment Order/Remittance Advice transaction is:
Which of the following is a required implementation specification associated with the Contingency Plan Standard?
Which HIPAA Title is fueling initiatives within organizations to address health care priorities in the areas of transactions, privacy, and security?
When limiting protected health information (PHI) to the minimum necessary for a use or disclosure, a covered entity can use:
Policies requiring workforce members to constantly run an updated anti-virus program on their workstation might satisfy which implementation specification?
A State insurance commissioner is requesting specific, individually identifiable information from an insurer as a part of a routine review of the insurer's practices. What must the insurer do to deidentify the information?
Conducting an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality, integrity, and availability of electronic PHI is:
Individually identifiable health information (IIHI) includes information that is:
The transaction number assigned to the Health Care Eligibility Request transaction is:
This transaction supports multiple functions. These functions include: telling a bank to move money OR telling a bank to move money while sending remittance information:
Select the correct statement regarding the "Minimum Necessary" standard in the HIPAA regulations.
Within the context of a transaction set, the fields that comprise a hierarchical level are referred to as a(n):
ABC Hospital implements policies and procedures to ensure that all members of its workforce have appropriate access to electronic protected health information. These policies and procedures satisfy which HIPAA security standard?
This Administrative Safeguard standard implements policies and procedures to ensure that all members of its workforce have appropriate access to electronic information.
The transaction pair used for requesting and responding to a health claim status inquiry is:
Which of the following is primarily concerned with implementing security measures that are sufficient to reduce risks and vulnerabilities to a reasonable and appropriate level.
Use or disclosure of Protected Health Information (PHI) for Treatment, Payment, and Health care Operations (TPO) is:
Select the best statement regarding the definition of the term "use" as used by the HIPAA regulations.
Encryption is included as an addressable implementation specification under which security rule standard?
A provider is in compliance with the Privacy Rule. She has a signed Notice of Privacy Practices from her patient. To provide treatment, the doctor needs to consult with an independent provider who has no relationship with the patient. To comply with the Privacy Rule the doctor MUST: