What is PHI?
Protected Health Information
What are the three types of safe guards required by the security rule?
Administrative, physical, and technical safeguards
What is a breach under HIPAA?
An impermissible use or disclosure of PHI that compromises its security or privacy.
What does HIPAA stand for?
Health insurance Portability and Accountability Act
A nurse discusses a patient's condition with a colleague in a public elevator. Is this a HIPAA violation?
Yes
What is a right patients have under the Privacy Rule?
The right to access their medical records
What is the purpose of a risk analysis?
To identify and assess potential risk to the confidentiality, integrity and availability of ePHI
Writhing how many days must individuals be notified of a breach?
60 days
When was HIPAA enacted?
1996
A healthcare provider sends an unencrypted email containing PHI. Is this a HIPAA violation?
Yes
How long must covered entitles retain documentation of their privacy policies?
6 years
What is one example of a technical safeguard?
Encryption
Who must be notified if a breach affects more than 500 individuals?
The affected individuals, the security of HHS, and the media.
Name one of the main purposes of HIPAA
To protect the privacy and security of individuals health information
A patient request a copy of their medical records. How long does the provider have to comply?
30 days