HIPAA 101
PHI
Privacy Rule
Security Rule
Violations
100

HIPAA stands for this

What is the Health Insurance Portability & Accountability Act of 1996

100

PHI stands for this

What is protected health information?
100

The HIPAA Privacy Rule

What is the rule that requires appropriate safeguards to protect the privacy of PHI and sets limits on uses and disclosures that may be made without an individual’s authorization?

100

The HIPAA Security Rule

What is the rule that sets national standards for the security of electronic protected health information?

100

An unauthorized acquisition, access, use or disclosure of protected health information

What is a breach?

200

These three types of organizations need to comply with HIPAA

What are health plans, healthcare professionals, and healthcare clearinghouses

200

A person’s name, birth date, email address, and SSN are all examples of this

What is PHI?

200

What you should do before you walk away from your computer

What is lock it or turn it off?

200

True or False – It’s totally fine to plug your phone into your computer to charge it

What is False?

200

You must do this if you send an email with PHI to the wrong recipient

What is notify the Privacy Officer, immediately?

300

The minimum amount of time that we must retain HIPAA-related documentation

What is 6 years?

300

What you need if a HR representative reaches out on a participant’s behalf to assist with an issue

What is a HIPAA Authorization Form?

300

What you should do with unneeded sensitive information in paper form

What is shred it?

300

This standard requires those using and disclosing PHI to do so using the least amount of PHI required to get the task done

What is the Minimum Necessary Rule?

300

A breach affecting 500 or more individuals must be reported to HHS and the media within this timeframe

What is 60 days?

400

This government department is responsible for enforcing HIPAA

What is the Department of Health and Human Services?

400

A contract that must be signed between the Trust and its service providers who use/disclose/access PHI prior to such u/d/a

What is a Business Associate Agreement?

400

Self-funded plans must comply with HIPAA by doing (at least) these five things

What are a risk assessment, implementing HIPAA policies and procedures, documented training, getting BAAs, and obtaining complete authorization forms?

400

The Security Officer must do this on a regular basis as required by HIPAA

What is a risk analysis: analyze and identify gaps in network security?

400

The potential legal consequences of a breach

What are civil penalties up to $2,1134,831 per violation, criminal fines up to $250,000 and up to 10 years imprisonment, and corrective action plans to address deficiencies?

500

HITECH stands for this

What is the Health Information Technology for Economic and Clinical Health Act, a federal law enacted in 2009 to promote the use of health information technology?

500

Four components of a valid authorization form

What are name of participant, name of recipient, expiration date, signature and date, description of information being disclosed?

500

A collection of medical and health information about an individual that is maintained by or for the Trust to make decisions about individuals

What is a Designated Record Set?

500

What you call someone who wants to keep their information private but overshares others’ information

What is a HIPAA-Crite?

500

This factor is considered when determining the penalty for a HIPAA violation

What is the organization’s level of culpability (4 tiers civil, 3 tiers criminal)?