Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

A business associate:

A.

Requires PKJ for the provider and the patient.

B.

Is electronically stored information about an individual's lifetime health status and healthcare.

C.

Is another name for an HMO.

D.

Identities all non-profit organizations.

E.

Is a person or an entity that on behalf of the covered entity performs or assists in the performance of a function or activity invoking the use or disclosure of health-relatedinformation.

The Data Backup Plan is part of which Security Standard?

A.

Contingency Plan

B.

Evaluation

C.

Security Management Procedures

D.

Facility Access Control

E.

Security Incident Procedures

Dr Jones, a practicing dentist, has decided to directly implement an EDI solution to comply with the HIPAA transaction rule Dr. Jones employs a small staff of 4 persons for whom he has sponsored a health care plan. Dr. Jones has revenues of less than $1 million. Select the code set that Dr. Jones should consider supporting for his EDI system.

A.

837 - Professional

B.

834

C.

CPT-4

D.

837 - Institutional

E.

CDT

Title 1 of the HIPAA legislation in the United States is about:

A.

PKI requirements for hospitals and health care providers.

B.

Encryption algorithms that must be supported by hospitals and health care providers.

C.

Fraud and abuse in the health care system and ways to eliminate the same.

D.

Guaranteed health insurance coverage to workers and their families when they change employers.

E.

The use of strong authentication technology that must be supported by hospitals and health care providers.

A covered entity that fails to implement the HIPAA Privacy Rule would risk:

A.

$5,000 in fines.

B.

55000 in fines and six months in prison.

C.

An annual cap of $50,000 in fines.

D.

A fine of up to $50,000 if they wrongfully disclose PHI.

E.

Six months in prison.

The Security Rule requires that the covered entity identifies a security official who is responsible for the development and implementation of the policies and procedures. This is addressed under which security standard?:

A.

Security Incident Procedures

B.

Response and Reporting

C.

Assigned Security Responsibility

D.

Termination Procedures

E.

Facility Access Controls

One mandatory requirement for the Notice of Privacy Practices set by HIPAA regulations is:

A.

If the notice must state that the covered entity reserves the right to disclose PHI without obtaining the individuals authorization.

B.

The notice must prominently include an expiration date.

C.

The notice must describe every potential use of PHI

D.

The notice must describe an individual's rights under the rule such as to inspect, copy and amend PHI and to obtain an accounting of disclosures of PHI

E.

The notice must clearly identify that the covered entity is in compliance with HIPAA regulations as of April 16,2003

The security standard that has the objective of implementing mechanisms to record and examine system activity is:

A.

Access Control

B.

Audit Controls

C.

Authorization Controls

D.

Data Authentication

E.

Person or Entity Authentication