Covered Entities
Administrative
Safeguards
Safeguards for
Security
Technical Safeguards
Uses of PHI
100

Entities covered by the privacy and security rules includes what?

What is? healthcare plans, healthcare providers, healthcare clearinghouses and business associates of covered entities.

100

The privacy rule requires the following administrative safeguards to ensure what?

What is? to ensure that PHI is not compromised.

100

The security rule portion of hippa requires what?

What is? that administrative physical and technical safeguards are in place to prevent the improper use or disclosure of PHI.

100

The security rule requires certain technical safeguards , which are what?

What is? access controls and audit controls.

100

As a general rule a covered entity may not use or disclose protected health information for purposes other than what?

What is? treatment or case management

200

A covered entity may not use or disclose protected health information except what?

What is? as the individual authorizes in writing or as the hippa privacy rule permits or requires.

200

What is a privacy officer?

What is? to be responsible for the development and implementation of privacy policies and the receiving of complaints.

200

Applying appropriate sanctions against employees who fail to comply with hippa policies and procedures is what policy?

What is? sanction policy

200

What is data authentication ? 

What is? controls to help ensure that health data has not been altered in an unauthorization manner.

200

New healthcare developments would not be considered what?

What is? marketing under the privacy rules.

300

What should covered entities rely on?

What is? professional ethics and best judgements in deciding which of these permissive uses and disclosures to make.

300

What are the requiring business associates to confirm that they will protect PHI?

What is? lawyers consultants auditors , billing companies, and pharmacists.

300

What is the plan for responding to system emergencies including the performance of backups , emergency mode operations , and disaster recovery procedures?

What is? contingency plan

300

Sending PHI VIA EMAIL and fax according to the security rule is what?

What is? it is permissible to use the internet to transmit PHI as long as an acceptable method of ecryption is used to protect confidentially.

300

The privacy rule allows incidental disclosures of PHI as long as what?

What is?as long as the covered entity uses reasonable safeguards and adheres to the minimum necessary standard.

400

The privacy rule requires a covered entity to what?

What is? provide patients with a notice of privacy practices (NPP).

400

What is tracking?

What is? developing a system to track who accessed what information. 

400

What is information system activity review?

What is? implement procedures to regularly review records of information system activity , such as audit logs, access reports, and security incident tracking reports.

400

What is person or entity authentication?

What is? controls to ensure that data is sent to the intended recipient and received by the intended party.

400

Define HiIPPA?

What is? a consent form for patient confidentiality

500

When using or disclosing PHI or when requesting PHI from another covered entity must make what?

What is? reasonable efforts to limit PHI to the minimium necessary.

500

What is the meaning of violations?

What is? implementing rules for addressing violations of privacy, security and transaction regulations , preventing retaliation against anyone who reports a hippa violation.

500

What is the purpose for security procedures?

What is? instructions for reporting and dealing with security breaches.

500

Name two controls for technical safeguards?

What is? access controls and audit controls.

500

What if someone violates hippa rules?

What is? there can be serious consequences, the violator may face disciplinary actions, termination of employment, and lawsuits from patients.

M
e
n
u