Exam 4: Security Ruling Explained

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Security of e-PHI has to do with keeping the data secure from a breach in the information system's security protocols.

(True/False)
4.8/5
(33)

Match the HIPAA term with the correct definition. -A study to find the problems or gaps between current practices and what the Security Rule requires.

(Multiple Choice)
4.8/5
(35)

Only monetary fines may be levied for violation under the HIPAA Security Rule.

(True/False)
4.8/5
(38)

Identify the choice that best completes the statement or answers the question. -Audit trails of computer systems include

(Multiple Choice)
4.8/5
(33)

Match the item that is addressed under the Security Rule with the correct area of safeguards. -access control by login and password

(Multiple Choice)
5.0/5
(31)

Identify the choice that best completes the statement or answers the question. -The Security Officer is to keep record of

(Multiple Choice)
4.7/5
(42)

Match the HIPAA term with the correct definition. -A process whereby cost-effective security control measures may be selected to balance the cost of security control measures against the losses expected if these measures were not in place.

(Multiple Choice)
4.7/5
(32)

Identify the choice that best completes the statement or answers the question. -Risk analysis in the Security Rule considers

(Multiple Choice)
4.9/5
(40)

Identify the choice that best completes the statement or answers the question. -HIPAA training must be provided to

(Multiple Choice)
4.8/5
(37)

Security and privacy of protected health information really cover the same issues.

(True/False)
4.8/5
(35)

Identify the choice that best completes the statement or answers the question. -Which are the five areas the DHHS has mandated each covered entity to address so that e-PHI is maintained securely?

(Multiple Choice)
4.8/5
(35)

Identify the choice that best completes the statement or answers the question. -Complaints about security breaches may be reported to

(Multiple Choice)
4.9/5
(34)

Identify the choice that best completes the statement or answers the question. -What step is part of reporting of security incidents?

(Multiple Choice)
4.9/5
(31)

Match the item that is addressed under the Security Rule with the correct area of safeguards. -integrity of data

(Multiple Choice)
4.9/5
(37)

The Office of HIPAA Standards seeks voluntary compliance to the Security Rule.

(True/False)
4.8/5
(38)

Identify the choice that best completes the statement or answers the question. -The policy of disclosing the "minimum necessary" e-PHI addresses

(Multiple Choice)
4.8/5
(42)

Match the item that is addressed under the Security Rule with the correct area of safeguards. -device and media controls

(Multiple Choice)
5.0/5
(28)

Identify the choice that best completes the statement or answers the question. -Integrity of e-PHI requires confirmation that the data

(Multiple Choice)
4.9/5
(38)

One good requirement to ensure secure access control is to install automatic logoff at each workstation.

(True/False)
4.9/5
(33)

Identify the choice that best completes the statement or answers the question. -The required areas of the Security Rule

(Multiple Choice)
4.7/5
(34)
Showing 21 - 40 of 53
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)