#1
Which law governs the protection of healthcare information privacy in the United States?
Health Insurance Portability and Accountability Act (HIPAA)
ExplanationHIPAA governs healthcare information privacy in the United States.
#2
What does PHI stand for in the context of healthcare information?
Protected Health Information
ExplanationPHI stands for Protected Health Information.
#3
What is the purpose of a Business Associate Agreement (BAA) in healthcare information privacy?
To outline the responsibilities of third-party entities handling PHI
ExplanationBAA outlines the responsibilities of third-party entities handling PHI in healthcare information privacy.
#4
Which organization is responsible for enforcing HIPAA regulations?
Department of Health and Human Services (HHS)
ExplanationHHS is responsible for enforcing HIPAA regulations.
#5
What is the purpose of the Breach Notification Rule under HIPAA?
To require covered entities to notify affected individuals and the Department of Health and Human Services (HHS) of breaches of unsecured PHI
ExplanationBreach Notification Rule under HIPAA requires covered entities to notify affected individuals and HHS of breaches of unsecured PHI.
#6
Which of the following is NOT considered a breach of healthcare information privacy under HIPAA?
Secure transmission of PHI between authorized parties
ExplanationSecure transmission of PHI between authorized parties is not considered a breach under HIPAA.
#7
What is the role of a HIPAA Privacy Officer within a healthcare organization?
To ensure compliance with HIPAA regulations
ExplanationHIPAA Privacy Officer ensures compliance with HIPAA regulations within a healthcare organization.
#8
What is the purpose of the Health Information Technology for Economic and Clinical Health (HITECH) Act?
To improve healthcare quality, safety, and efficiency through the use of information technology
ExplanationHITECH Act aims to improve healthcare quality, safety, and efficiency through information technology.
#9
Which of the following is an example of a technical safeguard under HIPAA?
Access controls
ExplanationAccess controls are an example of a technical safeguard under HIPAA.
#10
Which of the following is NOT considered protected health information (PHI) under HIPAA?
Email address
ExplanationEmail address is not considered protected health information (PHI) under HIPAA.
#11
Which of the following is a key principle of the General Data Protection Regulation (GDPR) concerning healthcare data?
Data minimization
ExplanationData minimization is a key principle of GDPR concerning healthcare data.
#12
What is the term used to describe the process of converting data into a secret code to prevent unauthorized access?
Encryption
ExplanationEncryption is the process of converting data into a secret code to prevent unauthorized access.
#13
Which of the following is NOT a requirement of the Security Rule under HIPAA?
Obtaining patient consent for all disclosures of PHI
ExplanationObtaining patient consent for all disclosures of PHI is not a requirement of the Security Rule under HIPAA.
#14
What is the purpose of the Omnibus Rule under HIPAA?
To strengthen privacy and security protections for PHI
ExplanationThe purpose of the Omnibus Rule under HIPAA is to strengthen privacy and security protections for PHI.
#15
What is the penalty for HIPAA violations?
Civil monetary penalties ranging from $100 to $50,000 per violation
ExplanationPenalties for HIPAA violations include civil monetary penalties ranging from $100 to $50,000 per violation.