And Correct Verified Answers-26
HIPAA stands for
a. Health Information Portability and Accountability Act
b. Health Insurance Portability and Accountability Act
c. Health Insurance Protection and Activity Act
d. Home Information Protection and Accountability Act. - Ans--b. Health
Insurance Portability and Accountability Act
One primary change included in the HIPAA Omnibus Final Rule of 2013
requires a business associate of the covered entity (physician practice) to
sign a Business Associate Agreement with:
a. Subcontractors of professional associations
b. Subcontractors of business associates
c. Subcontractors of optometrists
d. Subcontractors of affiliated hospitals - Ans--b. Subcontractors of
business associates
T/F. According to the regulations contained in the Omnibus Final Rule of
2013, a patient has the right to receive a copy of his or her medical record in
an electronic format if the associated provider utilizes electronic health
records. - Ans--True
Covered entities under HIPAA include:
a. Lawyers
b. Health care providers
c. Health care facilities
d. Librarians
e. a and d.
f. b and c. - Ans--b and c.
Health care providers and Health care facilities
Protected Health Information (PHI) includes:
,a. Demographic information on individuals
b. Insurance eligibility and coverage information
c. Billing records, claims data, referral authorizations
d. Medical records, diagnosis, genetic information, and testing
e. c and d
f. All of the above. - Ans--f. All of the above.
T/F. Entities covered under HIPAA are required to develop a Notice of
Privacy Practices (NPP) and must make these available to individuals
accessing services through the entity. - Ans--True
Which of the following disclosures require signed permission from the
individual whose PHI is being requested?
a. Referrals to physicians
b. Consultations between physicians treating individuals
c. Information requested by an attorney without a subpoena
d. Information requested by insurance companies for payment purposes. -
Ans--c. Information requested by an attorney without a subpoena
T/F. Patient names on a sign-in form are considered an intentional breach
of PHI. - Ans--False; incidental breach
T/F. Under the HITECH Act, the Breach Notification Act does NOT require
notification to HHS of the intentional or unintentional disclosure of PHI to
unapproved entities on an annual basis unless the breach has affected
more than 500 individuals. - Ans--False
Notice of Privacy Practices (NPP) must be updated in 2013 to include which
of the following?
a. Names of the owners of the covered entity
b. Names of companies that have access to PHI
c. Patient's right to restrict disclosures of PHI to a health plan when the
patient pays out of pocket and in full for the health care item or service.
d. Profitability of the covered entity. - Ans--c. Patient's right to restrict
disclosures of PHI to a health plan when the patient pays out of pocket and
in full for the health care item or service.
,If an individual or staff member has a complaint regarding the use of PHI,
the individual must speak with the facility's:
a. Manager
b. Owner
c. Maintenance coordinator
d. Privacy Officer
e. Chief Physician - Ans--d. Privacy officer.
Which of the following is NOT an administrative safeguard requirement?
a. Designating a privacy officer
b. Developing a cost analysis of HIPAA requirements.
c. Obtaining HIPAA-compliant business associate agreements for
subcontractors
d. Establishing procedures to prevent terminated employees from obtaining
access to confidential information after termination - Ans--b. Developing a
cost analysis of HIPAA requirements.
Physical safeguards do NOT include which of the following?
a. Posting PHI on a white board in the facility
b. Storage of PHI in a secure place
c. Shredding of PHI
d. Use of surge-protectors - Ans--a. Posting PHI on a white board in the
facility
Technical safeguards include which of the following?
a. Encryption of data
b. Computer system log-ins and passwords
c. Anti-virus software and firewalls
d. Information technology (IT) certification review
e. All of the above - Ans--e. All of the above
"Safe" computing includes which of the following?
a. Sharing passwords with other staff members
b. Remaining "logged on" always, to save time
c. Using email and the internet ONLY as allowed by practice protocols
d. Installing personal software on the computer - Ans--c. Using email and
the internet ONLY as allowed by practice protocols
, T/F. Most elective care focused practices answer the telephone within one
or two rings. - Ans--True
T/F. It is not necessary to give your name if you have already said the
practice name in the greeting. - Ans--False
When a caller inquires about a procedure the receptionist should:
a. Just confirm that they offer the procedure by saying, "Yes we do."
b. Try to engage callers by asking if they have had any similar procedure
before.
c. Put callers on hold until they have time to talk.
d. Tell the caller to call back later when we aren't so busy. - Ans--b. Try to
engage callers by asking if they have had any similar procedure before.
What percentage of consultants would book appointments with practice
they mystery shopped?
a. 10%
b. 28%
c. 57%
d. 91% - Ans--c. 57%
T/F. When a caller asks a practice whether it performs a particular
procedure, and the receptionist simply says, "Yes, we do," the next question
will likely be, "How much is it?" - Ans--True
In the research study discussed, what percentage of the time did the
practices actually send the information they promised to patients?
a. 90%
b. 50%
c. 30%
d. 10% - Ans--c. 30%
It is important to establish a dialogue with prospective patients because:
a. It allows the practice to create rapport with the patient
b. It helps the receptionist credential the providers and practice with the
patient.
c. It leads to a higher inquiry-to-appointment rate.
d. ALl of the above - Ans--d. All of the above