Suspected Security Breach or Hacked Device
Use of Personal Equipment
Organizational Response
Confidentiality Requirements
Documentation and Follow-Up/Internet and Network Security
100

If you think you’ve been hacked you shouldn’t immediately stop accessing organizational systems on that device. TRUE OR FALSE?

False

100

How can you protect your computer at home?

A. Disable the password feature
B. Authorize automatic installation of mobile code
C. Disable automatic security updates
D. Turn on spyware protection

D. Turn on spyware protection

100

The organization must investigate and respond to this.

Reported breach 

100
I can talk about clients with an unauthorized person as long as I don’t say any names or any other identifiable information. TRUE OR FALSE?

FALSE

100

Incidents must be recorded in this.

Incident report 

200

Which of the following e-mail practices can help to prevent inadvertently downloading viruses?

    A.View e-mails in rich text instead of plain text

    B.Use the Preview Pane instead of opening e-mails

    C. Look for a digital signature on e-mails

    D.Forward e-mails you suspect to be infected to your information technology POC

 C. Look for a digital signature on e-mails

200

Client information must never be stored _____ on personal devices. 

Permanently 

200

What is a confirmed data breach?

Organizations may need to notify affected individuals in this situation.

200

Name 4 things confidential information includes but is not limited to.

- Client names, clinical documentation, treatment plans, diagnoses, contact information, personal or medical information 

200

What is compliance or corrective action?

Follow-up ensures this after an incident.

300

Who do I contact when I believe I’ve been hacked ? 

Management team 

300

Which of the following is an allowed use of a government-furnished smartphone?

    A.Installing a sports betting app

    B.Downloading games for your child to play

    C.Responding to e-mails on your government e-mail account

     D.Jailbreaking the device to customize it

 C.Responding to e-mails on your government e-mail account

300

What is additional training?

Staff may be required to complete this after a violation.

300

This type of information includes names, DOB, and diagnoses.

Confidential information 

300

What is multi-factor authentication ?

This adds an extra layer of security beyond your password.

400

Delaying reporting a breach can cause?

increased risk or damage

400

What is report it to your supervisor?

If your personal device is lost or stolen and contains client info, you must do this immediately.

400

This may happen if policies are not followed.

Disciplinary action

400

What is a confidentiality breach?

Talking about clients in public places like elevators or restaurants is this.

400

Clicking suspicious links in emails can lead to this type of attack.

Phishing

500

What is unauthorized access to protected health information?

This type of information exposure must always be reported, even if accidental.

500

Using your personal phone to text a client without agency approval is what type of violation?

A HIPAA violation 

500

What is the HIPAA Breach Notification Rule?

This federal rule requires breach notifications in certain cases.

500

Sharing client information only with those involved in care is called?

Company policy 

500

What is your login credentials?

You should never share this, even with coworkers.