Definitions Questions Questions T or F
100
Security incident
The attempted or successful unauthorized access, use, disclosure, modification, or destruction of information or interference.
100
All ePHI
The Security Rule safeguards are to address
100
Technical Safeguards
The technology and the policies and procedures for its use that protect electronic protected health information and control access to it is
100
False
T or F: The Security Rule Specifies the methods for conductions the required risk analysis
200
Threat
The potential for exploitation of a vulnerability or potential danger to a computer, network, or data.
200
Vulnerability
An Inherent weakness or absence of a safeguard that could be exploited by a threat is a
200
From improper alteration or destruction
The integrity standard protects
200
False
T or F: When encrypted information is decrypted, it is in a different format than the original state
300
Red Flag
Suspicious documents, information, or behaviors that indicate the possibility of identity theft.
300
Know what data needs to be backed up and sources of that data
The data backup plan requires that organizations
300
When personal information, such as name, SSN, or Medicare number is taken without the patients knowledge
When does Medical Identity theft occur?
300
True
T or F: the Privacy Rule is the name given to the 1996 HIPAA law, its regulations, the HITECH Act, and other related regulations.
400
Encryption
A technical method that reduces access and viewing of ePHI by unauthorized users.
400
Impermissible uses and disclosures of PHI
What has been the most common complaint investigated for potential HIPAA violations?






Security Training

Press F11 for full screen mode



Limited time offer: Membership 25% off


Clone | Edit | Download / Play Offline