Updated 2026 | 200+ Verified Questions with Detailed Rationales | HIPAA
Privacy Rule and Security Rule, Protected Health Information (PHI), Minimum
Necessary Standard, Administrative Physical and Technical Safeguards, Breach
Notification Requirements, Patient Rights and Consent, Confidentiality in Clinical
Practice, Compliance Audits and Risk Management, Violations and Penalties,
Healthcare Data Security | Complete Exam Prep Resource for HIPAA Compliance
Certification Success
Question 1: Which of the following best defines Protected Health Information (PHI)
under HIPAA?
A. Any health information stored electronically
B. Any individually identifiable health information held or transmitted by a covered entity
or business associate
C. Only mental health records and substance abuse treatment information
D. Health information that has been de-identified according to HIPAA standards
CORRECT ANSWER: B. Any individually identifiable health information held or
transmitted by a covered entity or business associate
RATIONALE:PHI is defined by HIPAA as any individually identifiable health information,
in any form (electronic, paper, or oral), that is created, received, maintained, or
transmitted by a covered entity or business associate. De-identified information is not
PHI, and PHI is not limited to electronic formats or specific types of health records.
Question 2: Under the HIPAA Privacy Rule, which of the following is a permitted
disclosure of PHI without patient authorization?
A. Disclosing PHI to an employer for employment decisions
B. Sharing PHI with a marketing company for promotional campaigns
C. Providing PHI to public health authorities for disease reporting
D. Selling PHI to a pharmaceutical research company
CORRECT ANSWER: C. Providing PHI to public health authorities for disease
reporting
RATIONALE:The HIPAA Privacy Rule permits covered entities to disclose PHI to public
health authorities for purposes such as preventing or controlling disease, injury, or
disability. Disclosures for employment decisions, marketing, or selling PHI generally
require explicit patient authorization unless a specific exception applies.
Question 3: What is the primary purpose of the HIPAA Security Rule?
A. To establish national standards for protecting electronic protected health information
(ePHI)
B. To regulate the privacy of all health information regardless of format
C. To mandate patient consent for all uses and disclosures of PHI
D. To create a federal database of all patient health records
,CORRECT ANSWER: A. To establish national standards for protecting electronic
protected health information (ePHI)
RATIONALE:The HIPAA Security Rule specifically addresses the protection of ePHI by
establishing administrative, physical, and technical safeguards that covered entities
and business associates must implement. The Privacy Rule addresses PHI in all
formats, while the Security Rule focuses exclusively on electronic PHI.
Question 4: Which of the following scenarios constitutes a breach under the HIPAA
Breach Notification Rule?
A. An encrypted laptop containing ePHI is stolen, and the encryption key was not
compromised
B. A staff member accidentally emails PHI to the wrong patient, but the recipient
deletes it immediately upon notification
C. PHI is disclosed to an unauthorized person, and there is a low probability that the PHI
has been compromised based on a risk assessment
D. Unsecured PHI is accessed by an unauthorized individual, and the covered entity
cannot demonstrate a low probability of compromise
CORRECT ANSWER: D. Unsecured PHI is accessed by an unauthorized individual,
and the covered entity cannot demonstrate a low probability of compromise
RATIONALE:A breach is defined as the acquisition, access, use, or disclosure of PHI in
a manner not permitted under the Privacy Rule that compromises the security or
privacy of the PHI. If a risk assessment demonstrates a low probability of compromise,
notification may not be required. Encrypted data that remains encrypted is generally not
considered a breach.
Question 5: What does the "Minimum Necessary Standard" require under HIPAA?
A. Covered entities must collect the minimum amount of PHI possible from patients
B. Covered entities must make reasonable efforts to limit uses, disclosures, and
requests of PHI to the minimum necessary to accomplish the intended purpose
C. Patients must provide only the minimum necessary information when requesting
access to their records
D. Business associates must destroy PHI after the minimum necessary retention period
CORRECT ANSWER: B. Covered entities must make reasonable efforts to limit
uses, disclosures, and requests of PHI to the minimum necessary to accomplish
the intended purpose
RATIONALE:The Minimum Necessary Standard requires covered entities to reasonably
limit PHI uses, disclosures, and requests to the minimum amount necessary to achieve
the purpose of the use or disclosure. This standard does not apply to disclosures made
pursuant to a patient's authorization or for treatment purposes.
Question 6: Which of the following is NOT a patient right under the HIPAA Privacy
Rule?
,A. The right to request an amendment to their PHI
B. The right to receive an accounting of disclosures of their PHI
C. The right to demand that their PHI be shared with any third party of their choosing
without authorization
D. The right to inspect and obtain a copy of their PHI
CORRECT ANSWER: C. The right to demand that their PHI be shared with any third
party of their choosing without authorization
RATIONALE:While patients have significant rights regarding their PHI, including access,
amendment, and accounting of disclosures, they cannot compel a covered entity to
disclose PHI to a third party without following proper authorization procedures or
meeting a permitted disclosure exception under HIPAA.
Question 7: When must a covered entity provide a Notice of Privacy Practices (NPP)
to a patient?
A. Only upon the patient's written request
B. No later than the date of first service delivery, and must make a good faith effort to
obtain the patient's written acknowledgment
C. Only when the patient is discharged from care
D. Within 30 days after the patient requests it
CORRECT ANSWER: B. No later than the date of first service delivery, and must
make a good faith effort to obtain the patient's written acknowledgment
RATIONALE:Covered entities must provide the NPP no later than the first service
encounter and must make a good faith effort to obtain the patient's written
acknowledgment of receipt. If acknowledgment cannot be obtained, the entity must
document the effort and the reason.
Question 8: Which of the following individuals or entities is considered a "covered
entity" under HIPAA?
A. A life insurance company
B. A health care clearinghouse
C. An employer maintaining employee health records
D. A fitness app developer not contracted with a health plan
CORRECT ANSWER: B. A health care clearinghouse
RATIONALE:HIPAA defines covered entities as health plans, health care
clearinghouses, and health care providers who transmit health information
electronically in connection with certain transactions. Employers, life insurers, and
direct-to-consumer app developers not acting on behalf of a covered entity are
generally not covered entities.
Question 9: What is the primary function of a Business Associate Agreement (BAA)
under HIPAA?
, A. To allow business associates to use PHI for marketing purposes
B. To establish the permitted uses and disclosures of PHI by a business associate and
require safeguards to protect PHI
C. To transfer liability for HIPAA violations from the covered entity to the business
associate
D. To authorize the business associate to determine patient consent requirements
CORRECT ANSWER: B. To establish the permitted uses and disclosures of PHI by a
business associate and require safeguards to protect PHI
RATIONALE:A BAA is a contract required by HIPAA that outlines the permissible uses
and disclosures of PHI by a business associate, mandates appropriate safeguards, and
ensures the business associate will report breaches and comply with applicable HIPAA
requirements.
Question 10: Which administrative safeguard is required by the HIPAA Security
Rule?
A. Installation of firewalls on all network devices
B. Conducting a risk analysis to identify potential vulnerabilities to ePHI
C. Using biometric authentication for all system access
D. Encrypting all ePHI both at rest and in transit
CORRECT ANSWER: B. Conducting a risk analysis to identify potential
vulnerabilities to ePHI
RATIONALE:The Security Rule requires covered entities to conduct an accurate and
thorough assessment of the potential risks and vulnerabilities to the confidentiality,
integrity, and availability of ePHI. Encryption, while addressable and often
recommended, is not universally required; firewalls and biometrics are implementation
specifications that may be reasonable and appropriate depending on the risk analysis.
Question 11: Under HIPAA, when is patient authorization required for the use or
disclosure of PHI?
A. For treatment, payment, or health care operations
B. For disclosures to public health authorities for disease control
C. For most marketing communications and sales of PHI
D. For reporting abuse, neglect, or domestic violence
CORRECT ANSWER: C. For most marketing communications and sales of PHI
RATIONALE:HIPAA permits uses and disclosures for treatment, payment, and health
care operations without authorization. Authorization is generally required for marketing
communications that promote a product or service and for any sale of PHI, unless a
specific exception applies.
Question 12: Which of the following best describes "de-identified" health
information under HIPAA?