baonest All American 47902 Posts user info edit post |
31/31
Question 1 True/False 1 point PHI is only in the form of a paper document. True False
Question 2 Multiple Choice 1 point Some examples of Confidential Information include: Student records Personnel information System access passwords All of the above
Question 3 Multiple Choice 1 point Your responsibilities in keeping PHI confidential include: Access information only as necessary for your authorized job responsibilities Keep your passwords confidential Report the loss or misuse of UNC-Chapel Hill information Comply with Information Security and Privacy policies Initiate appropriate actions when problems are indentified All of the above
Question 4 Multiple Choice 1 point An example of public information is: Marketing brochure Social Security Number Patient's weight Medical record number
Question 5 True/False 1 point Individuals will NOT be held responsible for the breach of PHI or Confidental Information when utilizing mobile computing devices (laptops and PDA's) or external storage devices. True False
Question 6 Multiple Choice 1 point HIPAA stands for: Healthy Intent to Promote Access to Acorns Health Interest Portability Access Act Huge Irrigation Projects Aiding Agriculture Health Insurance Portability and Accountability Act
Question 7 Multiple Choice 1 point An example of PHI is: A patient's diagnosis A patient's x-rays A patient's lab results All of the above
Question 8 Multiple Choice 1 point Federal criminal penalties for a HIPAA violation range from: $100 per incident $25K to $50K and 2 years in prison $10K and 5 years in prison $50K to $250K in fines and up to 10 years in prison
Question 9 True/False 1 point A patient cannot complain about UNC-Chapel Hill policies and procedures regarding privacy and security of their PHI. True False
Question 10 True/False 1 point If you do not have direct patient contact, you do NOT have to keep PHI confidential. True False
Question 11 Multiple Choice 1 point PHI is: Protected Health Inquiries Practicing Health Institute Prohibited Head Infection Protected Health Information
Question 12 True/False 1 point The bottom line on HIPAA and research is that an individual's health information is subject to confidentiality and privacy restrictions. True False
Question 13 True/False 1 point With certain exceptions, during the period in which UNC-Chapel Hill maintains the information, patients have the right to inspect and receive a copy of PHI that is used to make decisions about him/her. True False
Question 14 True/False 1 point The goal of Information Security is to protect the confidentiality, integrity, and availability of information. True False
Question 15 Multiple Choice 1 point Other patient rights in relation to their PHI include: Right to Accounting of Disclosures Right to Amendment of PHI Right to Complain about Privacy and Security policies Right to Confidential and Alternative Communications All of the above
Question 16 True/False 1 point UNC-Chapel Hill is required to have agreements with business associates that protect an individual's PHI. True False
Question 17 True/False 1 point Lost or stolen PDAs or Personal computers containing PHI should be reported to your supervisor or HIPAA office immediately. True False
Question 18 Multiple Choice 1 point Identify the malicious software also known as malware that can be prevented by regular updates (patches) of your computer's operating system and antivirus software: Viruses Worms Spyware All of the above
Question 19 True/False 1 point Individuals who breach these policies will be subject to appropriate discipline under the applicable UNC-Chapel Hill policies. True False
Question 20 True/False 1 point Spam is annoying but harmless. True False
Question 21 Multiple Answer 1 point I fully understand the importance of HIPAA security and privacy and agree to abide by all University and Departmental Policies: Yes
Question 22 Multiple Choice 1 point Additional information on HIPAA and the University's policies and provedures can be found at: http://www.unc-hippa.com http://www.hippo.org http://www.hipaa.com http://www.unc.edu/hipaa
Question 23 True/False 1 point E-mail is the preferred method of transmitting unencrypted PHI or Confidential Information outside of the UNC-Chapel Hill internal network. True False
Question 24 Multiple Choice 1 point Identify the strong password(s): 2005Hipaaisgreat! HIP@@2005 1loveHIPA@ All of the above
Question 25 Multiple Choice 1 point Use caution when conducting conversations in: Dental Operatories Corridors Elevators and stairwells All of the above
Question 26 True/False 1 point Limited PHI may be shared with family, friends or representatives of the patient: (1) if sharing the information is related to his/her care or payment for care, or (2) if needed to notify individuals about the patient's condition or general location. True False
Question 27 True/False 1 point The Notice of Privacy Practices (NPP) is a summary of the privacy policies & procedures of UNC-Chapel Hill and must be given to each patient on his/her first visit. True False
Question 28 True/False 1 point Breaches of these policies or of a patient's confidentiality must be reported to the University HIPAA Privacy Officer, University HIPAA Security Officer or the covered unit's Privacy or Security Liaison. True False
Question 29 Multiple Choice 1 point Confidential Information contains material that is: Not important Available to the public Received through the internet Very sensitive
Question 30 Multiple Choice 1 point The following items must be situated in such a way that they cannot be accessed or viewed by the public: Computer screens Copiers Fax machines All of the above
Question 31 Multiple Choice 1 point PHI can be used without the patient's consent for: Treatment Payment Health Care operations All of the above
[Edited on April 7, 2008 at 9:46 PM. Reason : lol. HIPAA. not good to be drinking and doing a quiz] 4/7/2008 9:45:55 PM |