Privacy
Security
Technology
HIPAA Potpourri
100
Individually identifiable health information that is or has been electronically maintained or electronically transmitted by a covered entity.
What is Protected Health Information (PHI)?
100
The individual appointed by the Superintendent responsible for assuring the Board's compliance with HIPAA Security Standards.
What is the Security Officer?
100
Print jobs sent to the copier should be sent using this function.
What is locked job printing?
100
“Use or disclosure of PHI that compromises the security or privacy of the information such that that the use or disclosure poses a significant risk of financial, reputational, or harm to the affected individual”
What is a breach? Must be reported immediately in writing (email) to your supervisor and privacy officer.
200
Name, Address, Birthdate, SSN, Medicaid Number are all examples of this.
What are examples of PHI?
200
Discussing PHI in a public area.
What is an example of an Oral breach?
200
A method to enhance the security of a message or file by scrambling the contents so that it can be read only by someone who has the right key to unscramble it.
What is encryption?
200
• Unintentional acquisition, access or use of PHI by a workforce member acting under the authority of a covered entity or business associate. • Inadvertent disclosure of PHI from a person authorized to access PHI at a covered entity to another person authorized to access PHI at the covered entity. Are examples of this.
What are examples of exceptions to a breach?
300
Patient, Parent/Guardian or valid personal representative of a deceased individual are examples of this.
Who are people that can approve the release of PHI?
300
Making sure that your files and folders are put away before leaving for the day.
What is the clean desk "policy"?
300
Logging of the computer before leaving for the day is an example of this.
What is an example of best practices for protecting PHI?
300
This rule ensures medical information is protected; restricts the use/disclosure of PHI; Increased access and control of PHI by the individual.
What is the Privacy Rule?
400
Emergency situation; report of child abuse; report of abuse, neglect, domestic violence; Law enforcement investigation are all examples of this.
What are reasons to disclose without written authorization? Followed by an immediate written report (email) to your supervisor and privacy officer.
400
The section of the policy that refers to employee violations of the Board's HIPAA policies and procedures and possible disciplinary action.
What is Sanctions/Disciplinary Actions (section II.D.)?
400
Not entering PHI in the subject line of an email; using encrypted email to send email that contains PHI; are both examples of this.
What are examples of email best practices?
400
This document only needs to be signed on initial enrolment and documented and noted if client refuses to sign. It also needs to be made available in hard copy or posted on the Board's Website.
What is Notice of Privacy Practices (N.P.P.)?
500
• Full completion of board accepted consent to release information form. • Legal name of individual accompanied with date of birth and social security number. • Description of who is obtaining / releasing the information. • Description of information being disclosed. • Description of what the information will be used for. • Expiration date identified and appropriate signature of individual or legal representative.
What is a valid authorizations? If any of these items are missing the authorization is considered defective.
500
Printed documents that contain PHI should be disposed of here.
What is a shredding bin?
500
Passwords that contain both upper and lowercase characters, contains numbers and contain non-alphanumeric characters are know as this.
What are complex passwords?
500
The year HIPAA was enacted by congress.
What is August 21, 1996?