2022
Developing a process to discipline employees for failure to protect ePHI is:
Encryption
Log-in monitoring
Sanction policy
Access authorization - Answer Sanction policy
Which of the following statements are FALSE regarding the HIPAA Security Rule?
The Rule was designed to be flexible, as Covered Entities differ in capabilities.
The Rule protects patient privacy rights.
This Rule works in coordination with the Privacy Rule.
None of the above. - Answer The Rule protects patient privacy rights.
True or False: A required implementation specification must be put into place as written
in the Rule. - Answer T
One of your close friends and classmates was on rotation during their APPEs at the
same pharmacy you are currently finishing your rotation. He became close to a patient
who was diagnosed with cancer. He asks you how the patient is doing when you are
together during class. Is it ok to tell him? - Answer Nope
The Health Insurance Portability and Accountability Act of 1996 was designed to do all
of the following EXCEPT:
Set national privacy standards for when a patient's protected health information can be
used and disclosed - Answer B?
Which of the following are examples of Protected Health Information (PHI)?
Patient's Name
Patient's Date of Birth
Patient's Medication List
All of the above - Answer All of the above
What best describes a Risk Analysis?
Providing patients access to their ePHI immediately.
Evaluating where an organization needs to install alarms.
Understanding where ePHI is received, stored and used.
Identifying areas where ePHI could be vulnerable to misuse or loss. - Answer
Understanding where ePHI is received, stored and used.
Identifying areas where ePHI could be vulnerable to misuse or loss.
Which is true with regard to electronic message of patient information?