1.
HIPAA is a federal law, true or false?
Correct Answer
A. True
Explanation
HIPAA (Health Insurance Portability and Accountability Act) is indeed a federal law. It was enacted in 1996 to protect the privacy and security of individuals' health information. The law sets standards for the electronic exchange, privacy, and security of health information, ensuring that healthcare providers, health plans, and healthcare clearinghouses handle patients' information securely and confidentially. HIPAA also gives individuals certain rights over their health information and provides penalties for non-compliance. Therefore, the statement "HIPAA is a federal law" is true.
2.
pHI Includes health and service information that is individually identifiable, with the exception of employee records.
Correct Answer
A. True
Explanation
The statement is true because PHI (Protected Health Information) does indeed include health and service information that can be used to identify an individual. However, employee records are an exception to this rule, as they are not considered PHI.
3.
What does pHI stand for?
Correct Answer
B. Protected Health Information
Explanation
PHI stands for Protected Health Information. This refers to any individually identifiable health information that is created, transmitted, or maintained by a covered entity. It includes information about an individual's past, present, or future physical or mental health condition, as well as any healthcare services provided to them. The purpose of protecting this information is to ensure the privacy and confidentiality of patients' personal health data.
4.
pHI includes information on which of the following? (check all that apply)
Correct Answer(s)
A. Names
B. Addresses
C. Birthdates
D. Social Security Information
Explanation
The correct answer is "Names, Addresses, Birthdates, Social Security Information". PHI stands for Protected Health Information, which includes personal identifiers such as names, addresses, birthdates, and social security information. These are considered sensitive and confidential information in the healthcare industry and are protected under privacy laws to ensure the security and privacy of individuals' health information.
5.
Some of the documents that fall under protected health information include T-Logs, General Event Reports, and Billing Documentation.
Correct Answer
A. True
Explanation
The statement is true because T-Logs, General Event Reports, and Billing Documentation are all examples of documents that contain protected health information. Protected health information refers to any information that is created or received by a healthcare provider and relates to the past, present, or future physical or mental health of an individual. These documents often contain sensitive information such as medical diagnoses, treatment plans, and payment details, which are protected under the Health Insurance Portability and Accountability Act (HIPAA) to ensure patient privacy and confidentiality.
6.
Whenever Dungarvin requests, uses, or discloses pHI, Dungarvin staff will make reasonable efforts to limit protected information to the minimum necessary.True or False?
Correct Answer
A. True
Explanation
The statement is true because Dungarvin staff will make reasonable efforts to limit protected information to the minimum necessary whenever they request, use, or disclose PHI. This means that they will only access or share the minimum amount of information required to fulfill their duties or provide necessary services, thereby reducing the risk of unauthorized access or disclosure of sensitive information.
7.
HIPAA information is not given on a need to know basis.
Correct Answer
B. False
Explanation
The statement is incorrect. HIPAA (Health Insurance Portability and Accountability Act) actually requires that protected health information (PHI) be disclosed on a need-to-know basis. This means that only individuals who need access to the information for legitimate purposes should be granted access. By limiting access to PHI, HIPAA aims to protect patient privacy and prevent unauthorized disclosure of sensitive health information. Therefore, the correct answer is False.
8.
Which three of the following are names of protected health information?
Correct Answer(s)
B. Routine and Recurring
C. Non Routine and Recurring that do not require an authorization
D. Non Routine and Recurring that do require an authorization
Explanation
The three names of protected health information are Routine and Recurring, Non Routine and Recurring that do not require an authorization, and Non Routine and Recurring that do require an authorization. These terms refer to different types of health information that are protected and require certain authorizations for access and disclosure.
9.
Some examples of protected information can include
Correct Answer(s)
B. Information related to payment for services
C. Information related to the provision of health treatment services
D. Information related to funding ability
Explanation
The examples provided all involve sensitive information that should be protected. Information related to payment for services is typically confidential and should not be shared without proper authorization. Similarly, information related to the provision of health treatment services should be kept private to maintain patient confidentiality. Information related to funding ability may also be considered protected as it can impact financial privacy and security.
10.
Everyone has the right to privacy including the individuals we serve.
Correct Answer
A. True
Explanation
This statement is true because privacy is a fundamental human right that should be respected for all individuals, including those who are being served. Respecting privacy is important for maintaining dignity, autonomy, and trust in any relationship, including professional ones. It is essential to ensure that personal information, communication, and personal space are protected and not invaded without consent. Respecting privacy also promotes a sense of security and confidentiality, which is crucial in building effective and respectful relationships with individuals.
11.
If disclosure of pHI occurs during regular working hours you need to contact your supervisor if during non-working hours you call the on-call supervisor.
Correct Answer
A. True
Explanation
If there is a disclosure of Protected Health Information (PHI) during regular working hours, it is necessary to inform your supervisor. However, if the disclosure happens outside of regular working hours, you should contact the on-call supervisor. This protocol ensures that any potential breach of PHI is promptly addressed and appropriate actions are taken to protect patient privacy and comply with relevant regulations.
12.
Should you always ask yourself if the pHI you are about to disclose needs an authorization?
Correct Answer
A. Yes
Explanation
It is important to always ask oneself if the PHI (Protected Health Information) being disclosed requires an authorization. This is because PHI is sensitive and confidential information, and the disclosure of such information without proper authorization can lead to privacy breaches and legal consequences. Therefore, it is crucial to assess the necessity of authorization before sharing any PHI to ensure compliance with privacy regulations and protect patient confidentiality.
13.
If a disclosure is a routine & recurring event a signed authorization is not required.
Correct Answer
A. True
Explanation
If a disclosure is a routine and recurring event, it means that it happens regularly and predictably. In such cases, a signed authorization is not required because the individual or organization making the disclosure has already established a pattern of sharing the information. This suggests that the disclosure is expected and does not require additional consent each time it occurs. Therefore, the statement "If a disclosure is a routine & recurring event a signed authorization is not required" is true.
14.
May an individual we serve have a friend come to his or her team meeting?
Correct Answer
C. Yes, but an authorization is needed prior to the start of the team meeting
Explanation
Friends can attend an individual's team meeting, but an authorization is required before the meeting starts. This means that the individual served must obtain permission for their friend to attend the team meeting.
15.
Police officers who are investigating something that may involve your client do not need a signed authorization for you to give them protected health information.
Correct Answer
A. True
Explanation
Police officers who are investigating a potential case involving a client do not require a signed authorization to obtain protected health information. This is because law enforcement agencies are granted certain exceptions under HIPAA, allowing them to access such information without explicit consent. These exceptions are in place to ensure that law enforcement agencies can effectively carry out their duties and investigate potential crimes.
16.
The preceding issue with the police officer would be listed as a "defined exception".
Correct Answer
A. True
Explanation
The statement is true because a "defined exception" refers to a specific situation or circumstance that deviates from the norm or standard. In the given context, the preceding issue with the police officer is being categorized as a defined exception, implying that it is a unique case or an outlier compared to typical situations involving police officers.
17.
Forms and documents need to be kept a minimum of 6 years time.
Correct Answer
A. True
Explanation
Forms and documents need to be kept for a minimum of 6 years to comply with legal and regulatory requirements. This is important for record-keeping purposes, as it allows organizations to maintain a historical record of their activities and transactions. It also ensures that important information is readily available for audits, investigations, or legal proceedings. By keeping forms and documents for at least 6 years, organizations can demonstrate transparency, accountability, and compliance with applicable laws and regulations.
18.
pHI safeguards should be applied to which of the following
Correct Answer(s)
A. Trash
B. Files
C. Computers
D. Conversations
Explanation
PHI (Protected Health Information) safeguards should be applied to trash, files, computers, and conversations. This means that proper measures and protocols should be in place to protect any sensitive health information that may be present in these areas or mediums. This is important to ensure the privacy and security of individuals' health data and to comply with HIPAA (Health Insurance Portability and Accountability Act) regulations.
19.
When using a computer at your program, you should not leave the computer unattended, even though there is a time-limit safeguard on the software.
Correct Answer
A. True
Explanation
Leaving a computer unattended, even with a time-limit safeguard on the software, is not recommended because it can still pose security risks. Unauthorized access or tampering with the computer or its data can occur if it is left unattended. Therefore, it is important to always stay present and monitor the computer while it is in use.
20.
You may send unsecured emails through therapy.
Correct Answer
B. False
Explanation
The statement suggests that you can send unsecured emails through therapy. However, this is not true. Therapy is a form of treatment or counseling, and it does not provide a platform or service for sending emails. Therefore, the correct answer is false.
21.
Conversations involving pHI can not be heard by the general public or co-workers from other sites.
Correct Answer
A. True
Explanation
This statement is true because PHI (Protected Health Information) is sensitive and confidential information related to a person's health, which should only be accessed by authorized individuals. To maintain privacy and comply with HIPAA regulations, conversations involving PHI should be restricted to only those who have a need to know, such as healthcare professionals directly involved in patient care. Therefore, the general public and co-workers from other sites should not be able to hear these conversations to ensure patient confidentiality.
22.
New hires need to take the HIPAA course within how many days of their start date?
Correct Answer
B. 30
Explanation
New hires need to take the HIPAA course within 30 days of their start date. This timeframe ensures that new employees receive the necessary training on HIPAA regulations and compliance within a reasonable period after joining the organization. It allows them to understand the importance of protecting patient privacy and maintaining the security of sensitive health information. Failing to complete the course within this timeframe may result in non-compliance with HIPAA requirements.