A State insurance commissioner is requesting specific, individually identifiable information from an insurer as a part of a routine review of the insurer's practices. What must the insurer do to deidentify the information?
The Privacy Rule interacts with Federal and State laws by:
This requires records of the movement of hardware and electronic media that contain PHI.
Some of the information that an authorization must include is:
Select the phrase that makes the following statement FALSE. The 270 Health Care Eligibility Request can be used to inquire about:
A covered entity must adopt policies and procedures governing disclosures of PHI that identify
Select the correct statement regarding the requirements for oral communication in the HIPAA regulations.
Workstation Use falls under which Security Rule area?
HPAA establishes a civil monetary penalty for violation of the Administrative Simplification provisions. The penalty may not be more than:
Formal, documented instructions for reporting security breaches are referred to as:
A grouping of functional groups, delimited by' a header/trailer pair, is called a:
In terms of Security, the best definition of "Access Control" is:
Ensuring that physical access to electronic information systems and the facilities in which they are housed is limited, is addressed under which security rule standard?
Dr Jones, a practicing dentist, has decided to directly implement an EDI solution to comply with the HIPAA transaction rule Dr. Jones employs a small staff of 4 persons for whom he has sponsored a health care plan. Dr. Jones has revenues of less than $1 million. Select the code set that Dr. Jones should consider supporting for his EDI system.
Within the context of a transaction set, the fields that comprise a hierarchical level are referred to as a(n):
This final security rule standard addresses encryption of data.
A doctor sends patient records to another company for data entry services. A bonded delivery service is used for the transfer. The records are returned to the doctor after entry is complete, using the same delivery service. The entry facility and the network they use are secure. The doctor is named as his own Privacy Officer in written policies. The doctor has written procedures for this process and all involved parties are documented as having been trained in them. The doctor does not have written authorizations to disclose Protected Health Information (PHI). Is the doctor in violation of the Privacy Rule?
The security standard that has the objective of implementing mechanisms to record and examine system activity is:
Select the correct statement regarding the definition of the term "disclosure" as used in the HIPAA regulations.
The scope of the Privacy Rule includes:
A health care clearinghouse is an entity that:
Conducting an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality, integrity, and availability of electronic PHI is:
A key date in the transaction rule timeline is:
To comply with the Final Privacy Rule, a valid Notice of Privacy Practices: