The HIPPA task force must inventory the organization's systems, processes, policies, procedures and data to determine which elements are critical to patient care and central to the organizations business. All must be inventoried and listed by
A. by priority as well as encryption levels, authenticity, storage-devices, availability, reliability, access and use. The person responsible for criticality analysis must remain mission-focused and carefully document all the criteria used.
B. by priority and cost as well as availability, reliability, access and use. The person responsible for criticality analysis must remain mission-focused and carefully document all the criteria used.
C. by priority as well availability, reliability, access and use. The person responsible for criticality analysis must remain mission-focused but need not document all the criteria used.
D. by priority as well as availability, reliability, access and use. The person responsible for criticality analysis must remain mission-focused and carefully document all the criteria used.
Which of the following is the BEST reason for the use of security metrics?
A. They ensure that the organization meets its security objectives.
B. They provide an appropriate framework for Information Technology (IT) governance.
C. They speed up the process of quantitative risk assessment.
D. They quantify the effectiveness of security processes.
What does the federal Ryan White CARE Act fund?
A. Care for underserved rural and urban populations
B. Skin cancer screening programs
C. School-based health services in predominantly minority neighborhoods
D. Development of treatment and care options for persons with HIV and AIDS
True or false: For people with Medicaid coverage, access to health care is guaranteed.
A. True
B. False
Under HIPAA, what is the entity that processes healthcare claims and performs related functions for a health plan?
A. Policy Advisory Group
B. Third Party Administrator
C. Joint Commission on Accreditation of Healthcare Organizations
D. Plan Sponsor
Breach notification exceptions are provided to all, EXCEPT:
A. Business associates who access information by good faith, unintentional means and do not further disclose information
B. Unintentional, good faith access by employees of covered entities if the information was not further disclosed
C. If the information impacted less than 500 people within a single demographic area
D. Inadvertent disclosure made individual to individual within a covered entity who is authorized to access protected health information
HIPAA security and privacy regulations apply to:
A. Attending physicians, nurses, and other healthcare professionals.
B. Health information managers, information systems staff, and other ancillary personnel only.
C. Anyone working in the facility.
D. Only staff that have direct patient contact.
Which of the following are some common features designed to protect confidentiality of health information contained in patient medical records?
A. Locks on medical records rooms
B. Passwords to access computerized records
C. Rules that prohibit employees from looking at records unless they have a need to know
D. All of the above