Exam 4: Security Rule Explained

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The ability to continue after a disaster of some kind is a requirement of Security Rule. What item is considered part of the contingency plan or business continuity plan?

Free
(Multiple Choice)
5.0/5
(34)
Correct Answer:
Verified

C

If a business visitor is also a Business Associate, that individual does not need to be escorted in the building to ensure protection of PHI.

Free
(True/False)
4.8/5
(35)
Correct Answer:
Verified

False

Only monetary fines may be levied for violation under the HIPAA Security Rule.

Free
(True/False)
4.7/5
(38)
Correct Answer:
Verified

False

What step is part of reporting of security incidents?

(Multiple Choice)
4.7/5
(38)

Integrity of e-PHI requires confirmation that the data

(Multiple Choice)
4.8/5
(30)

The Office of HIPAA Standards may not initiate an investigation without receiving a formal complaint.

(True/False)
4.9/5
(41)
Match the HIPAA term with the correct definition.
An ongoing process that considers the risk to electronic information and the data itself to determine if there is adequate security for the system to keep exposure to loss or alteration of PHI to a minimum.
Gap analysis
A study to find the problems or gaps between current practices and what the Security Rule requires.
Risk analysis
Implementing policies and procedures to prevent, detect, and contain any intrusions of security or unauthorized access.
Risk management
Correct Answer:
Verified
Premises:
Responses:
An ongoing process that considers the risk to electronic information and the data itself to determine if there is adequate security for the system to keep exposure to loss or alteration of PHI to a minimum.
Gap analysis
A study to find the problems or gaps between current practices and what the Security Rule requires.
Risk analysis
Implementing policies and procedures to prevent, detect, and contain any intrusions of security or unauthorized access.
Risk management
A process whereby cost-effective security control measures may be selected to balance the cost of security control measures against the losses expected if these measures were not in place.
Security management
(Matching)
4.8/5
(38)

One good requirement to ensure secure access control is to install automatic logoff at each workstation.

(True/False)
4.9/5
(24)

To protect e-PHI that is sent through the Internet, a covered entity must use encryption technology to minimize the risks. E-PHI that is "at rest" must also be encrypted to maintain security.

(True/False)
4.8/5
(38)

"At home" workers such as transcriptionists are not required to follow the workstation security rules for passwords, viewing of monitors by others, or locking of computer screens.

(True/False)
4.9/5
(29)

Which of the following items is a technical safeguard of the Security Rule?

(Multiple Choice)
4.8/5
(25)

The documentation for policies and procedures of the Security Rule must be kept for

(Multiple Choice)
4.7/5
(44)

The act of changing readable text into a vast series of "garbled" characters using complex mathematical algorithms is called

(Multiple Choice)
4.9/5
(32)

Security of e-PHI has to do with keeping the data secure from a breach in the information system's security protocols.

(True/False)
4.8/5
(33)

Reasonable physical safeguards for patient care areas include:

(Multiple Choice)
4.8/5
(33)

The Security Rule addresses four areas in order to provide sufficient physical safeguards. Which of the following is NOT one of them?

(Multiple Choice)
4.8/5
(32)

Compliance to the Security Rule is solely the responsibility of the Security Officer.

(True/False)
4.8/5
(42)

Whenever a device has become obsolete, the Security Office must

(Multiple Choice)
4.8/5
(34)

The Administrative Safeguards mandated by HIPAA include which of the following?

(Multiple Choice)
4.9/5
(36)

Risk analysis in the Security Rule considers

(Multiple Choice)
4.9/5
(40)
Showing 1 - 20 of 47
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)