PHI
HIPPA
ISMS
ISMS II
COMMANDMENTS
100

What is Protected Health Information (PHI)?

1.Comes from a health care provider or a health plan

2.Relates to the physical or mental health condition of an individual, at any time, past, present or future. 

3. Identifies an individual or could be used to identify an individual 

4.Describes the health care, condition, or payments of an individual or describes the demographics of an individual 

100

FULL FORM OF HIPPA

Health Insurance Portability and Accountability Act

100

What do you mean by Red Flag

Red flags are suspicious patterns or practices, or specific activities that indicate the possibility of identity theft

100

IS Compliance is Everyone’s Job , TRUE OR FALSE

TRUE

100

Can we use Official Email for Personal Reasons, True or FALSE

FALSE

200

What all constitutes a PHI?  Name any Five Examples

•Name •Address - street address, city, country, zip code (more than 3 digits) or other geographic codes •Dates directly related to patient •Telephone Number •Fax Number •email addresses •Social Security Number •Medical Record Number •Health Plan Beneficiary Number •Account Number •Certificate/License Number •Any vehicle or device serial number •Web URL, Internet Protocol (IP) Address •Finger or voice prints •Photographic images •Biometric identifiers •Any other unique identifying number, characteristic, or code (whether generally available in the public realm or not

200

As employees of a premier service provider of Health care revenue cycle management it is imperative that we comply with the

Privacy and security policies and procedures.

200

What do you mean by Identity Theft

It is a form of stealing someone’s identity to commit fraud or abuse 

200

AM’s and above are allowed to carry camera phone without sticker and smart devices 

True or False

True

200

ISMS FULL FORM

INFORMATION SECURITY MANAGEMENT SYSTEM

300

PHI must be secured in all forms, True of False

Types of PHI

True

Written information (EOB’s, Reports, Charts, Claims, Medical records, Billing records, X-rays, Letters, Messages, etc.) ➢ Oral communication (phone calls, meetings, informal conversations, etc.) ➢ E-mail, computerized and electronic information (computer records, faxes, voicemail, PDA entries, etc.)

300

HIPAA Penalties for Breaches

Civil Penalties $50,000 per incident up to $1.5 million per incident for violations that are not corrected per calendar year

Criminal Penalties:   $50,000 to $250,000 in fines and up to 10 years in prison

 

300

How Red Flags can be reported and who is authorized to do that

Red Flags can be reported via Compliance Tracker in Touch Dashboard and Only Team Leaders & Above can report it

300

Types of PHI a Business May Handle, Name any 5

Eligibility information • Enrollment information • Claims information • Claims appeals • Reports from third-party administrators or other vendors (such as, pharmacy benefit managers, preferred provider organizations, utilization review companies, etc.) may contain PHI • Coordination of benefits determinations • Quality assessment information (audits) • Medical condition information CO-119

300

You may report compliance concerns by calling the Compliance Line at 

1-800-346-1766

400

What are various different type of Security Rules applied in Coronis Ajuba to Protect PHI

1.Administrative Safeguards: •Policies •Procedures •Risk Management •Internal Audits •User Education •Training 

2. Physical Safeguards: •Facility Access Controls •Workstation Use/Security •Device and Media Controls •CCTV 

3.  Technical Safeguards: •Access Controls •Unique User Identification •Audit trails •Screen Savers •Transmission Security •Integrity Controls 

400

How to Report ISMS Compliance Violation

TOUCH PORTAL - HELPDESK - ISMS VIOLATIONS

400

What is OIG

Office of Inspector General

400

Not displaying ID Cards inside operations area, carrying camera mobile, Pen Drives, CD's, MP3 Players may lead to 

 -L1 Warning memo/3 days of Loss of Pay.

 -Repeat offense L2 Memo & 4 to 30 days Loss of       Pay

400

Why is Compliance/Security training important?

➢ Outlines ways to prevent accidental and intentional misuse of PHI.

 ➢ Makes PHI secure with minimal impact to staff and business processes.

 ➢ Shows our commitment to managing electronic protected health information (ePHI) with the same care and respect as we expect of our own private information

500

List out any 5 Information Security Measures or Reminders

➢ Do not share passwords. ➢ Always lock your desktop/laptop when you move out of your system ➢ Limit access to printers and faxes for people who deal with PHI. ➢ Limit access to health information to only those who require it for a specific task. ➢ Use email only for official purposes. ➢ Do not open email attachments from an unknown, suspicious or untrustworthy source if the subject line is questionable or unexpected ➢ Workstation use •Restrict viewing access to others and you should not take snapshot of your monitor • Follow appropriate log-on and log-off procedures. •Lock your workstation, press Ctrl-Alt-Del or Windows key + “L”. •Do not store PHI on desktops.

500

COMPLIANCE OFFICER FOR CORONIS AJUBA

Ashique CT – Associate Director - Client Deliverables 

Email : ashique.ct@miramed ajuba.com Ext : 613



500

What is FDCPA?

Fair Debt Collections Practices Act

500

Accessing unauthorized company information, Giving unapproved information to Vendors/ Media/ any external agency, Password sharing, Accessing inappropriate websites, Sharing of login ids and passwords to access a specific website, Failing to timely report known or suspected HIPAA issue or other potential unauthorized disclosure or breach may lead to


-Ranging from 3 days to 30 days of `Loss of Pay’ 

 Repeat offense, Suspension to possible termination of employment

500

FOUR COMMENDMENTS AND GROUND RULE WE ALL SHALL FOLLOW

Always store PHI is designated network folders

Always Shred PHI after use

Always lock your system when you leave your place

Always report all violations