Search Header Logo

RHIT Practice Domain 2 Access, Disclosure, Privacy, and Security

Authored by Rachel D

Other

University

RHIT Practice Domain 2 Access, Disclosure, Privacy, and Security
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

27 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

At Wildcat Hospital, paper-based documents not already included in the EHR are scanned into the EHR at the time of discharge. These paper-based documents are then stored for 60 days before being destroyed. Which of the following statements is true?

The scanned documents do not need to added to the patient’s EHR.

The scanned documents can never be part of the legal record so we should not destroy the paper documentation.

The scanned documents become part of the legal record as soon as the original documentation is destroyed.

The paper-based documentation must be retained for the statute of limitations.

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An admitting clerk arrives early every morning to snoop through the EHR for information about neighbors and friends. What security mechanisms could minimize this security breach?

Information access controls

Facility access controls

Audit controls

Workstation security

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Sally Mitchell was treated for kidney stones at Graham Hospital last year. She now wants to review her health record in person. She has requested to review it by herself in a private room. Which of the following is true based on this scenario?

Sally’s request does not have to be granted because the hospital is responsible for the integrity of the health record.

Failure to accommodate her wishes will be a violation under the HIPAA Privacy Rule.

Sally owns the information in her record, so she must be granted her request.

Patients should never be given access to their actual health records.

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The outpatient clinic of a large hospital is reviewing its patient sign-in procedures. The registration clerks say it is essential that they know if the patient has health insurance and the reason for the patient’s visit. The clerks maintain having this information on a sign-in sheet will make their jobs more efficient and reduce patient waiting time in the waiting room. What should the HIM director advise in this case?

Patient name, insurance status, and diagnoses are permitted by HIPAA.

To be HIPAA compliant, sign-in sheets should contain the minimum information necessary such as patient name only.

Patient name, insurance status, and the reason for the visit would be considered incidental.

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An employee observes a non-employee putting a flash drive in a bag. The employee does not report this security breach. What security measures should have been in place to help ensure that such a case is reported?

Access controls

Audit controls

Authentication controls

Security incident procedures

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following would be used to encode textual material and convert it to scrambled data that must be decoded for the recipient to understand it?

Encoding

Encryption

Firewall

Virtual private network

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A visitor walks through the IT department and picks up a flash drive from an employee’s desk. What security controls should have been implemented to prevent this security breach?

Workstation security controls

Facility access controls

Workstation use controls

Device and media controls

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?