- Question: (CO 1) Gail Smith oversees all activities associated with the development, implementation, and administration of Health Science Center policies and procedures covering the privacy of, and access to, patient health information. Based on this information, she is most likely in the position of a(n) _____.
- Question: (CO 1) Sarah Williams' responsibilities include leading the incident response team and conducting personnel pertaining to data protection in the Health Information Systems (HIS) Department. Based on her responsibilities, she is most likely in the role of a(n) _____.
- Question: (CO 1) Ms. Jones oversees all activities associated with the development, implementation, and administration of Health Science Center policies and procedures, covering patient confidentiality. Based on this information, she is most likely in the position of a(n) _____.
- Question: (CO 9) Which of the following most accurately describes the difference between training and awareness?
- Question: (CO 9) Which of the following should you do if an audit does not return any opportunities for improvement?
- Question: (CO 9) Which technical components should be included in developing a checklist for auditing and monitoring compliance?
- Question: (CO 2) All patient information is designated protected health information (PHI) and includes information that is _____.
- Question: (CO 2) Which of the following is the main purpose of HIPAA?
- Question: (CO 2) Which of the following headers must appear in a notice of privacy practices?
- Question: (CO 4) Which of the following is characteristic of an appropriate consent?
- Question: (CO 4) Organizations should perform an initial risk analysis to determine which of the following?
- Question: (CO 4) Which of the following is NOT a level or risk to be taken into consideration when analyzing risks to protected health information (PHI)?
- Question: (CO 5) To address disposal of media, an organization should _____.
- Question: (CO 5) Which is NOT an example of a physical safeguard, as outlined by HIPAA?
- Question: (CO 6) Access controls consist of _____.
- Question: (CO 3) Which term identifies patient information related to medical record numbers and fingerprinting?
- Question: (CO 3) How often should you consider performing a review of your security policies?
- Question: (CO 8) Which of the following is the most likely group to target for HIPAA privacy and security training?
- Question: (CO 7) Which of the following are the appropriate guidelines for dealing with medical information requests?
- Question: (CO 7) Who does not need to be part of a security incident team?
Instituition / Term | |
Term | Uploaded 2023 |
Institution | HIM 370 |
Contributor | Ashley |