1.
Alison received an e-mail from an employer group which contains a member’s consumer number, social security number and date of birth. She needs to reply back to this e-mail, what should Alison do before she sends her reply?
Correct Answer
B. Remove the confidential information from the e-mail.
Explanation
Alison should remove the confidential information from the email before sending her reply. This is important to ensure the protection of the member's personal information, such as their consumer number, social security number, and date of birth. By removing this information, Alison can prevent any potential misuse or unauthorized access to sensitive data. Encrypting her response or confirming the absence of new confidential information are not mentioned as necessary actions in the given question.
2.
Becky works in the maternity ward. She is walking out to her car at the end of her shift and sees Brad Pitt being wheeled into the ER. She is really curious to know why he’s there and she knows that his personal business is always in the news anyway. Is Becky allowed to peek in his medical record?
Correct Answer
B. No, Becky shouldn’t look in the medical record unless she’s involved in his care, regardless of whether he is famous or not.
Explanation
Regardless of Brad Pitt's fame, Becky is not allowed to look into his medical record unless she is directly involved in his care. Patient privacy is a fundamental principle in healthcare, and unauthorized access to medical records is a violation of patient confidentiality. It is important for healthcare professionals to respect and uphold patient privacy rights, regardless of the individual's celebrity status.
3.
You are working at your desk and need to make a quick trip to the copier. Is there anything you need to do to your computer before you leave your desk?
Correct Answer
B. Yes, secure or lock my computer.
Explanation
It is important to secure or lock the computer before leaving the desk, even for a quick trip to the copier. This ensures that unauthorized individuals cannot access or tamper with the computer and its contents in the user's absence.
4.
Columbia Medical Associates has privacy and security policies because they:
Correct Answer
D. All of the above.
Explanation
Columbia Medical Associates has privacy and security policies in place to protect the privacy and security of member information. These policies also help the organization fulfill legal requirements regarding the handling and protection of sensitive data. Additionally, having these policies in place helps staff members understand what is expected of them in terms of maintaining privacy and security standards. Therefore, the correct answer is "All of the above."
5.
When a doctor is e-mailing a patient, what type of messaging should be used?
Correct Answer
B. Columbia Medial Associates has no appropriate electronic forms of messaging patients.
Explanation
The correct answer is "Columbia Medial Associates has no appropriate electronic forms of messaging patients." This means that when a doctor is e-mailing a patient, they should not use any electronic messaging forms provided by Columbia Medical Associates as they are not suitable for messaging patients.
6.
If you have access to Allscripts, are you allowed to use your employee access to view your own medical record?
Correct Answer
B. No, you are not allowed to use your employee access to look at your own medical record.
Explanation
The answer is "No, you are not allowed to use your employee access to look at your own medical record." This is because accessing one's own medical record using employee access may violate privacy and confidentiality policies. It is important to maintain the integrity and security of medical records, and allowing employees to access their own records using their employee access can lead to potential breaches or misuse of sensitive information.
7.
You need to dispose of patient labels; they have a patient’s name and consumer number printed on them. Where should they be disposed of?
Correct Answer
A. In the locked paper confidential waste bin.
Explanation
Patient labels with sensitive information such as a patient's name and consumer number should be disposed of in the locked paper confidential waste bin. This ensures that the labels are securely disposed of and prevents unauthorized access to the confidential information. The locked bin provides an added layer of security compared to regular garbage or recycling bins, reducing the risk of potential data breaches or privacy violations.
8.
A 14 year old patient comes in for a pregnancy test. The patient’s mother calls the clinic, she didn’t know her daughter was going in for care and wants information about why her child is there. Can you tell the mother why the patient is being seen?
Correct Answer
B. No, 14 year olds have the right to choose if reproductive information is shared with family.
Explanation
The correct answer is "No, 14 year olds have the right to choose if reproductive information is shared with family." In many places, minors have the right to confidentiality when it comes to reproductive health services. This means that healthcare providers are legally obligated to keep their patients' information private, even from their parents or guardians, unless there are specific circumstances where the minor's safety is at risk. Therefore, the mother does not have the right to know why her child is being seen without the patient's consent.
9.
Chris notices his co-worker looking at her own medical record in Allscripts. Is Chris required to report his co-worker.
Correct Answer
A. Yes, as a staff member, Chris is required to report all privacy breaches.
Explanation
As a staff member, Chris is required to report all privacy breaches, including his co-worker looking at her own medical record in Allscripts. This is because maintaining patient privacy and confidentiality is a crucial aspect of healthcare, and any breach of privacy, regardless of the person involved, should be reported to ensure the protection of patient information.
10.
Dana wants to send flowers to her co-worker for his birthday. Is Dana allowed to get her co-worker’s address from a Columbia Medical Associates system?
Correct Answer
B. No, Columbia Medical Associates information should only be used for business purposes.
Explanation
The correct answer is "No, Columbia Medical Associates information should only be used for business purposes." This answer is based on the principle that accessing personal information from a company's system should only be done for legitimate business reasons. In this case, Dana wanting to send flowers to her co-worker's birthday does not qualify as a business purpose, so it would be inappropriate for her to retrieve the co-worker's address from the Columbia Medical Associates system.
11.
What are some ways you can support password security?
Correct Answer
E. All of the above.
Explanation
All of the options mentioned in the question are ways to support password security. Choosing a password that is hard to guess and includes a combination of numbers, letters, and special characters helps to make it more secure. Not writing down passwords prevents them from being easily accessed by others. Changing passwords immediately if there is a suspicion of unauthorized access helps to protect the account. Lastly, never sharing or asking to share passwords with others ensures that they remain confidential and less prone to being compromised.
12.
June would like to review Columbia Medical Associates privacy and security policies. Where can she find them?
Correct Answer
B. Go to CMA Web.
Explanation
June can find Columbia Medical Associates' privacy and security policies by going to their website, CMA Web. The website is likely to have a dedicated section or page where these policies are provided for review.