EHR – Ch #7
Unlock all answers in this set
Unlock answersquestion
The law which strengthened HIPAA privacy and security regulations was: a) American Recovery and Reinvestment Act (ARRA) b) Health Information Technology for Economic and Clinical Health Act (HITECH) c) Meaningful Use (MU) d) Affordable Care Act (ACA)
answer
b) Health Information Technology for Economic and Clinical Health Act (HITECH)
question
HIPAA defines a patient's name, social security number, employer, or medical record/account numbers that tie information to a particular person as: a) protected health information b) privileged health information c) private health information d) confidential health information
answer
a) protected health information
question
Keeping health information to oneself is known as protecting: a) security b) privacy c) confidentiality d) secrecy
answer
c) confidentiality
question
Which of the following is not included in the Notice of Privacy Practices? a) how a patient's health information may be used b) the name of the individual to whom a record was released c) that the patient may request correction or amendment to their health record d) entities to whom a patient's information may be released
answer
b) the name of the individual to whom a record was released
question
E-mails or faxes that are sent and arrive at the wrong location constitute a privacy _____________. a) code b) encryption c) breach d) access
answer
c) breach
question
Blocking access to a facility's computer systems by unauthorized users is accomplished through use of _______________. a) passwords b) special hardware c) encryptor programs d) a firewall
answer
d) a firewall
question
Of the following, which password is most secure? a) record b) record58 c) Record**58 d) Record58
answer
c) Record**58
question
Nancy Jackson is the office manager of a medical practice. Each month she reviews a report that shows which staff members viewed, edited, or deleted data on a random selection of patient's records, and whether or not the access or the actions taken were justified. Nancy is performing which function? a) accounting of disclosures b) auditing c) quality review d) quantitative review
answer
b) auditing
question
CPT, which is used to code procedures in an office, is an example of a/an _____________. a) password b) accounting of disclosures c) code set d) storage method
answer
c) code set Coding systems such as ICD-9-CM, ICD-10-CM/PCS, CPT, and HCPCS are all code sets that are required by HIPAA to file claims.
question
In 2004, the ______________, the Healthcare Information and Management Systems Society, and the National Alliance for Health Information Technology organized the Certification Commission for Health Information Technology. a) Centers for Medicare and Medicaid Services b) American Health Information Management Association c) American Medical Information Association d) International Federation of Record Organizations
answer
b) American Health Information Management Association It was the American Health Information Management Association who partnered with the two organizations to form the Certification Commission for Health Information Technology.
question
Each person who has the ability to access a computer software system, for instance PrimeSUITE, is set up within the software and assigned a/an __________________, which is typically based on their name. a) user ID b) password c) PIN d) access code
answer
a) user ID
question
James Philips has asked that certain personnel within the office be prohibited from seeing his health information. This record will be flagged how in PrimeSUITE? a) confidential b) private c) restricted access d) sensitive information
answer
c) restricted access
question
When correcting written documentation in a paper record, it is necessary to: a) black out the incorrect information b) use red ink to rewrite the incorrect information correctly c) cross out the incorrect information with one line, enter the correct information, date and initial the correction d) do nothing, since care may have already been given based on the incorrect information
answer
c) cross out the incorrect information with one line, enter the correct information, date and initial the correction
question
How is a correction made to an electronic health record? a) The incorrect entry is corrected and the original entry is deleted from the database b) The incorrect entry is corrected and the original entry is hidden from view, but is still retrievable c) A second entry is made under the original incorrect entry and d) No change is made, since care may have already been given based on the incorrect information
answer
b) The incorrect entry is corrected and the original entry is hidden from view, but is still retrievable
question
An employee at Memorial Medical Practice released the diagnosis of a patient to the patient's spouse without an authorization. This is known as a/an _________________________. a) accidental disclosure b) privacy disclosure c) breach of confidentiality d) disclaimer
answer
c) breach of confidentiality
question
Lisa Haver is a patient of Dr. Randolph's. You have just opened today's mail and opened a letter from Ms. Haver's attorney because she is involved in a lawsuit regarding an auto accident. What will you do? a) look for a signed authorization in the envelope which authorizes the office to release Lisa Haver's records to the attorney b) print off the record from the EHR system and send to the attorney c) call the patient d) Write back to the attorney stating that your office policy prohibits you from sending records to attorneys
answer
a) look for a signed authorization in the envelope which authorizes the office to release Lisa Haver's records to the attorney The very first step would be to find the signed authorization from the patient. If no authorization was enclosed, then a letter would be sent to the attorney's office requesting one.
question
You are the office manager of Greensburg Medical Center. You have received a letter from one of your patients, Ida Healthway, asking to know the names of all employees and care providers who have accessed her EHR within the last year, since she believes someone has been spreading information about her in the community. You will provide Ms. Healthway with this information, which is known as: a) a patient list b) release logging c) accounting of information disclosures d) information exchange
answer
c) accounting of information disclosures Accounting for disclosures is required by HITECH and must be given to the patient upon request.
question
Some states have a Health Information __________________, funded through the ONC, which allows the sharing of health information for continuity of care purposes. a) Bank b) Exchange c) Listserve d) Entity
answer
b) Exchange Health Information Exchanges can be privately operated or can be state-run with funding by ONC or through the National health Information Exchange.
question
A staff member who monitors existing and new regulations and is the \"go-to\" person should an incident occur is known as the _____________________. a) office manager b) HIM department director c) managing partner d) compliance officer
answer
d) compliance officer
question
In order for the healthcare facility to know what to do in case of a situation that interrupts access to the EHR, a written _______________ should be in place. a) policy b) disaster recovery plan c) compliance plan d) audit trail
answer
b) disaster recovery plan
question
Which of the following may result in the need to deploy the disaster recovery plan? a) A computer hacker has gained access to the database and corrupt files have been found b) Joy Smith, an employee in the office, entered data on the wrong patient c) The IT manager has read that a computer virus has just hit Europe and is expected to hit the United States by end of week d) Dr. Ingram lost his cell phone last week
answer
a) A computer hacker has gained access to the database and corrupt files have been found