In which of the following circumstances must an individual be Civil money penalties
given the opportunity to agree or object to the use and Sanctions
disclosure of their PHI? - ANSWER -A and C (answer)
a). Before their information is included in a facility directory Which of the following are common causes of breaches? -
ANSWER -All of the above (answer)
b). Before PHI directly relevant to a person's involvement with
the individual's care or payment of health care is shared with Theft and intentional unauthorized access to PHI and personally
that person identifiable information (PII)
Human error (e.g. misdirected communication containing PHI or
Which of the following statements about the HIPAA Security PII)
Rule are true? - ANSWER -All of the above (answer)
Lost or stolen electronic media devices or paper records
a). Established a national set of standards for the protection of containing PHI or PII
PHI that is created, received, maintained, or transmitted in
electronic media by a HIPAA covered entity (CE) or business
associate (BA) Which of the following are fundamental objectives of information
security? - ANSWER -All of the above (answer)
b). Protects electronic PHI (ePHI)
Confidentiality
c). Addresses three types of safeguards - administrative,
technical and physical - that must be in place to secure Integrity
individuals' ePHI
Availability
A covered entity (CE) must have an established complaint
process. - ANSWER -True If an individual believes that a DoD covered entity (CE) is not
complying with HIPAA, he or she may file a complaint with the: -
ANSWER -All of the above (answer)
The e-Government Act promotes the use of electronic
government services by the public and improves the use of DHA Privacy Office
information technology in the government. - ANSWER -
True HHS Secretary
(CORECT)
MTF HIPAA Privacy Officer
When must a breach be reported to the U.S. Computer
Emergency Readiness Team? - ANSWER -Within 1 hour Technical safeguards are: - ANSWER -Information
of discovery technology and the associated policies and procedures that are
used to protect and control access to ePHI
Which of the following statements about the Privacy Act are
true? - ANSWER -All of the above (answer) A Privacy Impact Assessment (PIA) is an analysis of how
information is handled: - ANSWER -Physical measures,
a). Balances the privacy rights of individuals with the including policies and procedures that are used to protect
Government's need to collect and maintain information electronic information systems and related buildings and
equipment, from natural and environmental hazards, and
b). Regulates how federal agencies solicit and collect unauthorized intrusion
personally identifiable information (PII) (correct)
c). Sets forth requirements for the maintenance, use, and
disclosure of PII A Privacy Impact Assessment (PIA) is an analysis of how
information is handled: - ANSWER -All of the above
To ensure handling conforms to applicable legal, regulatory, and
What of the following are categories for punishing violations of policy requirements regarding privacy
federal health care laws? - ANSWER -All of the above
(answer) To determine the risks and effects of collecting, maintaining and
disseminating information in identifiable form in an electronic
Criminal penalties information system
1/3