This person is the Compliance & Privacy Officer at Healthmine.
Who is Tracy E. Tracy?
The HIPAA Privacy Rule protects these three forms of data.
What is verbal, electronic, and written.
This is a set of guidelines that outlines expected ethical behavior for employees.
What is the Code of Conduct?
This costs taxpayers billions of dollars each year.
What is Fraud, Waste, & Abuse?
PHI
Protected Health Information
The frequency in which Healthmine provides training on potential compliance risks.
What is annually.
PHI can be shared, without consent, for these purposes.
What is treatment, payment, and healthcare operations?
You have a responsibility to do this when you know of a potential compliance issue.
What is report.
This HIPAA rule also covers password management.
What is Security Rule.
FWA
Fraud, Waste and Abuse
Compliance is the responsibility of ___
Who is everyone?
The necessary amount of information needed to do your work or fulfill a request is know as this.
What is the minimum necessary.
These are ways to report improper conduct or violations of the Code of Conduct.
What is:
Directly to a Manager/Supervisor
Directly to the Compliance Officer
Compliance Helpline
The number one source of viruses and other malware
What are phishing emails?
91% of cyber attacks are caused by email. This is why Healthmine conducts phish tests and provides additional training.
PII
Personally Identifiable Information
The act of conforming to a rule, law, or policy.
What is compliance?
HIPAA is an acronym for this regulation
What is the Health Insurance Portability and Accountability Act?
Healthmine's Core Values.
What are:
Win Together
Deliver Excellence
Powered by People
Continuous Innovation
What is the most common cyber threat?
What is human error?
Human error is can range from clicking a malicious link to unintentionally sharing sensitive information on public forums. Human error is responsible for approx. 85% of data breaches and security incidents. These incidents can lead to financial loss, reputation damage, and legal consequences for the individual and organization.
OIG
Office of Inspector General
Knowingly and intentionally submitting false information for a benefit is considered this.
What is fraud
The year HIPAA was signed into law
When is 1996?
Scenario: You are in charge of buying office supplies for your department. Your sibling sells office supplies. Buying from them would violate this policy.
What is Conflict of Interest?
The name of the first cyber attack.
What is Morris Worm?
November 1988, a grad student name Robert Morris created the Morris Worm, known as one of the first computer worms. It was originally intended to measure the size of the internet, but a coding error caused it to replicate uncontrollably which resulted in thousands of computers being infected.
OCR
What if the Office of Civil Rights