A passing grade of 80% or higher is required for all contractors coming aboard for CHP and must be completed at least 48 hours before arriving at the client site. After you complete the quiz, you MUST email your results page or certificate to pack_mam@dell. Com. The results are not automatically sent. Thank you and good luck!
Read moreonbeforeupdate="null" ="null" oncellchange="null" onclick="null" oncontextmenu="null" oncontrolselect="null" oncopy="null" oncut="null" ondataavailable="null" ondatasetchanged="null" ondatasetcomplete="null" ondblclick="null" ondeactivate="null" ="null" end="null" enter="null" leave="null" over="null" start="null" ondrop="null" onerrorupdate="null" onfilterchange="null" ="null" in="null" out="null" onhelp="null" onkeydown="null" onkeypress="null" onkeyup="null" onlayoutcomplete="null" onlosecapture="null" onmousedown="null" onmouseenter="null" onmouseleave="null" onmousemove="null" onmouseout="null" onmouseover="null" onmouseup="null" onmousewheel="null" onmove="null" onmoveend="null" onmovestart="null" onpage="null" onpaste="null" onpropertychange="null" onreadystatechange="null" onresize="null" onresizeend="null" onresizestart="null" onrowenter="null" onrowexit="null" onrowsdelete="null" onrowsinserted="null" onscroll="null" onselectstart="null" role="" tabindex="0" title="" />The Dell Team
The company has to disclose healthcare information when the media requests it in writing
The company doesn't have to train its workforce in security procedures
The only data that's actually protected in e-PHI are the patient names
The company has to protect its e-PHI against all reasonable threats
Rate this question:
The accounting firm must provide written documentation of its proper safeguards to protect the e-PHI she provides
She must closely monitor the accounting firm's compliance with the Security Standards
She can allow the business associate to transmit e-PHI on her behalf without restriction
She isn't responsible for investigating concerns she has about the accounting firm's security measures
Rate this question:
Have his nurse review the records to determine if the risk of re-identification is low
Remove all individually identifiable information
Encrypt the patient's name only
Use only patient demographics to identify the records
Rate this question:
Yes, cost is irrelevant
No, as long as it documents its decision in writing and implements an equivalent measure
Yes, all implementation specifications must be implemented
No, addressable implementation specifications are completely optional and may be skipped with no further action
Rate this question:
A healthcare provider must review its documentation daily
Policy documentation must be retained for 20 years or the life of the organization
Security procedures developed by health insurance companies must be made available to every employee, whether or not they are subject to them
Every covered healthcare organization must implement appropriate measures to comply with HIPAA's safeguards
Rate this question:
Use voice and eye recognition software
Use encryption software
Assign unique names or numbers to system users
Implement automatic logoff for computers
Rate this question:
Access controls
Integrity
Authentication
Transmission
Rate this question:
Risk analysis to identify potential vulnerabilities
Surveillance cameras to monitor computer access
Monitoring systems to track login attempts and discrepancies
A strict dismissal policy for employees who fail to comply with any security measure
Rate this question:
Evaluation standard
Security awareness standard
Security incident procedures standard
Contingency plan standard
Rate this question:
Facility access control standard
Device and media controls standard
Workstation security standard
Ergonomic comfort standard
Rate this question:
Quiz Review Timeline +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.