Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

The HIPPA task force must inventory the organization's systems, processes, policies, procedures and data to determine which elements are critical to patient care and central to the organizations business. All must be inventoried and listed by

A.

by priority as well as encryption levels, authenticity, storage-devices, availability, reliability, access and use. The person responsible for criticality analysis must remain mission-focused and carefully document all the criteria used.

B.

by priority and cost as well as availability, reliability, access and use. The person responsible for criticality analysis must remain mission-focused and carefully document all the criteria used.

C.

by priority as well availability, reliability, access and use. The person responsible for criticality analysis must remain mission-focused but need not document all the criteria used.

D.

by priority as well as availability, reliability, access and use. The person responsible for criticality analysis must remain mission-focused and carefully document all the criteria used.

Under the HIPAA Privacy Rule, who is NOT considered a covered entity?

A.

Clearinghouse

B.

Client patient

C.

Health practitioner

D.

Third party

What is a credential for Coders?

A.

AAPC

B.

ASPCA

C.

AHIMA

Diagnosis-Related Groups (DRGs) lumps together all services performed during a hospital episode. Under the DRG system, which is/are true?

A.

Medicare is at risk for the number of admissions.

B.

The hospital is at risk for the number of admissions.

C.

The hospital is at risk for the length of stay.

D.

Only A and C

As of 2010, what is different with regard to business associates and HIPAA protections?

A.

Business associates now must notify clients directly of privacy breaches, as if they were a covered entity

B.

There are no significant changes in business associate practices

C.

Covered entities have increase responsibilities to ensure the practice of business associates

D.

Business associates are no longer required to notify clients directly of privacy breaches

What is the meaning of the term 'Access'?

A.

All citizens have health insurance coverage

B.

Ability to get health care when needed

C.

Availability of services

D.

Employer-based health insurance

Which racial/ethnic group is least likely to use mammography?

A.

White

B.

Black or African American

C.

Asian or Pacific Islander

D.

Hispanic

Which of the following is NOT a best practice for privacy and security?

A.

Keeping fax machines in areas that are not generally accessible

B.

Keeping consumer records and other documents containing PHI out of sight

C.

Documents containing PHI do not need to be shredded

D.

Keeping medical records rooms locked/secured

Are there penalties under HIPPA?

A.

No penalties

B.

HIPPA calls for severe civil and criminal penalties for noncompliance, including: -- fines up to $25k for multiple violations of the same standard in a calendar year -- fines up to $250k and/or imprisonment up to 10 years for knowing misuse of individually identifiable health information.

C.

HIPPA calls for severe civil and criminal penalties for noncompliance, includes: -- fines up to 50k for multiple violations of the same standard in a calendar year -- fines up to $500k and/or imprisonment up to 10 years for knowing misuse of individually identifiable health information

D.

HIPPA calls for severe civil and criminal penalties for noncompliance, including: -- fines up to $100 for multiple violations of the same standard in a calendar year -- fines up to $750k and/or imprisonment up to 20 years for knowing misuse of individually identifiable health information

A continuous information security monitoring program can BEST reduce risk through which of the following?

A.

Collecting security events and correlating them to identify anomalies

B.

Facilitating system-wide visibility into the activities of critical user accounts

C.

Encompassing people, process, and technology

D.

Logging both scheduled and unscheduled system changes