RHIT Practice Domain 2 Access, Disclosure, Privacy, and Security

RHIT Practice Domain 2 Access, Disclosure, Privacy, and Security

University

27 Qs

quiz-placeholder

Similar activities

Flashcards Cardiology 6-10 and 21-23 focused

Flashcards Cardiology 6-10 and 21-23 focused

University

23 Qs

Cancer Chapter Medical Surgical II (Prioritization & Delegat

Cancer Chapter Medical Surgical II (Prioritization & Delegat

University

24 Qs

NCM 110: NURSING INFORMATICS- SUMMER

NCM 110: NURSING INFORMATICS- SUMMER

University

25 Qs

Section 1 Review

Section 1 Review

University

25 Qs

Flashcards 3

Flashcards 3

University

23 Qs

Risk Management - Midterms LQ

Risk Management - Midterms LQ

University

25 Qs

Diabetes and Its Complications

Diabetes and Its Complications

University

25 Qs

RAD 100 Midterm Exam Review

RAD 100 Midterm Exam Review

University

25 Qs

RHIT Practice Domain 2 Access, Disclosure, Privacy, and Security

RHIT Practice Domain 2 Access, Disclosure, Privacy, and Security

Assessment

Quiz

Other

University

Hard

Created by

Rachel D

FREE Resource

27 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

At Wildcat Hospital, paper-based documents not already included in the EHR are scanned into the EHR at the time of discharge. These paper-based documents are then stored for 60 days before being destroyed. Which of the following statements is true?

The scanned documents do not need to added to the patient’s EHR.

The scanned documents can never be part of the legal record so we should not destroy the paper documentation.

The scanned documents become part of the legal record as soon as the original documentation is destroyed.

The paper-based documentation must be retained for the statute of limitations.

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An admitting clerk arrives early every morning to snoop through the EHR for information about neighbors and friends. What security mechanisms could minimize this security breach?

Information access controls

Facility access controls

Audit controls

Workstation security

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Sally Mitchell was treated for kidney stones at Graham Hospital last year. She now wants to review her health record in person. She has requested to review it by herself in a private room. Which of the following is true based on this scenario?

Sally’s request does not have to be granted because the hospital is responsible for the integrity of the health record.

Failure to accommodate her wishes will be a violation under the HIPAA Privacy Rule.

Sally owns the information in her record, so she must be granted her request.

Patients should never be given access to their actual health records.

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The outpatient clinic of a large hospital is reviewing its patient sign-in procedures. The registration clerks say it is essential that they know if the patient has health insurance and the reason for the patient’s visit. The clerks maintain having this information on a sign-in sheet will make their jobs more efficient and reduce patient waiting time in the waiting room. What should the HIM director advise in this case?

Patient name, insurance status, and diagnoses are permitted by HIPAA.

To be HIPAA compliant, sign-in sheets should contain the minimum information necessary such as patient name only.

Patient name, insurance status, and the reason for the visit would be considered incidental.

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An employee observes a non-employee putting a flash drive in a bag. The employee does not report this security breach. What security measures should have been in place to help ensure that such a case is reported?

Access controls

Audit controls

Authentication controls

Security incident procedures

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following would be used to encode textual material and convert it to scrambled data that must be decoded for the recipient to understand it?

Encoding

Encryption

Firewall

Virtual private network

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A visitor walks through the IT department and picks up a flash drive from an employee’s desk. What security controls should have been implemented to prevent this security breach?

Workstation security controls

Facility access controls

Workstation use controls

Device and media controls

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?