1 out of 1 points
The individual who is the object of a lawsuit is called the:
Selected D.
Answer: Defendant
Question 2
1 out of 1 points
Whistle-blowers bring suit on their own behalf as well as on behalf of the
government. The Latin phrase for this action is abbreviated:
Selected C.
Answer: Qui Tam
Question 3
1 out of 1 points
Which of the following provides a complete description to patients about how PHI is
used in a healthcare facility?
Selected A.
Answer: Notice of privacy practices
Question 4
1 out of 1 points
AHIMA’s record retention guidelines recommend that the health records of adults be
maintained:
Selected C.
Answer: At least 10 years after the most recent encounter
Question 5
1 out of 1 points
What does the term access control mean?
Selected A.
Answer: Identifying which data employees should have a right to use
Question 6
1 out of 1 points
The unintentional misapplication of coding and billing guidelines is monitored for
compliance by this office:
Selected B.
Answer: Office of Inspector General
Question 7
1 out of 1 points
With the advent of the Electronic Medical Record, a new area of noncompliance, as
well as potential patterns of fraud and abuse, has developed. What is it?
Selected A.
Answer: Cloning of medical records.
Question 8
1 out of 1 points
Conducting a loose observation, especially of a suspected spy or criminal is called
, what?
Selected D.
Answer: Surveillance
Question 9
1 out of 1 points
A punitive damage for fraudulent behavior that results in exclusion from Medicare,
means that the healthcare provider or facility can’t:
Selected A.
Answer: provide care to patients with Medicare insurance.
Question 10
1 out of 1 points
An employee accesses PHI on a computer system that does not relate to her job
functions. What security mechanism should have been implemented to minimize this
security breach?
Selected D.
Answer: Access controls
Question 11
1 out of 1 points
Which of the following statements about the directory of patients maintained by a
covered entity is true?
Selected D.
Answer: Patients must be given an opportunity to deny permission to put
information about them in the directory.
Question 12
1 out of 1 points
A question posed to the provider to obtain additional, clarifying documentation for the
completeness of documentation is what?
Selected B.
Answer: query
Question 13
1 out of 1 points
Which of the following is true about HIPAA security requirements?
Selected D.
Answer: All of these are true.
Question 14
1 out of 1 points
Confidentiality can be defined as:
Selected A.
Answer: The limitation of the use and disclosure of private information
Question 15
1 out of 1 points
Which statement below is not true in regards to a proven HIPAA investigation?