chapter 8 law and ethics exam

0.0(0)
studied byStudied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/24

Last updated 10:56 PM on 11/14/24
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

25 Terms

1
New cards

Privilege communication

information held confidential within a protected relationship

2
New cards

Protected health information (PHI)

information containing one or more patient identifers

3
New cards

3 items of patient identifiers

Name, Address, Social security

4
New cards

One can legally release PHI under HIPPA-defined:

Permissions

5
New cards

Information that can be found in the Notice of Privacy Practices is a:

List provided by all covered entities that demonstrates adherence to HIPPA’s privacy practice rules

6
New cards

HIPPA’s security rules derives from which standard?

Standard 3

7
New cards

What is a breach of PHI?

Breach is any unauthorized acquisition, access, use, or disclosure of personal health information which compromises the security or privacy of such information

8
New cards

What is the risk analysis for purposes of protecting PHI?

Risk analysis is when CEs evaluate the likelihood and impact of potential risk to the PHI

9
New cards

The False Claims Act contains which distinguishing provision?

Federal False Claims Act allows individuals to bring civil actions on behalf of the U.S government for false claims made to the federal government, under a provision of the law called qui tam (Latin word meaning “to bring an action for the king and for oneself)

10
New cards

Four HIPPA standards and briefly describe their purpose

Standard 1: Transactions and code sets- for uniformity in reporting

Standard 2- Privacy rule- for protecting PHI during electronic transmission

Standard 3- Security Rule- For securing electronic storage and transmission against

Standard 4- National Identifier Standards- Provide uniform national identifiers for the movement of electronic transactions; the 4 identifiers are provider, health plan, employer, and individual.

11
New cards

How should privacy be maintained with electronic devices?

Use caution when texting, emailing, or posting on social media. Shed all confidential papers. implement strong passwords

12
New cards

What is a covered entity?

Health care providers who conduct administrative and financial transactions in electronic forms, includes: all employees, volunteers, trainees, and all others who are under the control of the entity

13
New cards

Six HIPPA-defined permissions

Disclosures to patients, disclosures to treatment, payment, or health care operations; Disclosures with opportunity to agree or object; some incidental uses and disclosures permitted without authorization; disclosures for public interest and benefit activities; limited data set disclosures

14
New cards

What are the key elements in a Notice of Privacy Practices?

How the CE may use and disclose an individual’s PHI; the patient’s rights with respect to the information and how the patient may exercise those rights, with clear direction on how many patients may complain to the CE; the CE’s legal duties with respect to the information; whom patients can contact further information

15
New cards

How might a health care provider show that their EHR was as safe as possible from a breach?

Documented risk analysis, along with evidence that problem has been fixed

16
New cards

Risk analysis for the security rule is

Requirement for the health care organization

17
New cards

Which of the following constitutes a data breach?

A medical office computer is sold without erasing the hard drive

A hacker accesses a hospital’s list of patients with HIV

A business-use laptop is stolen from a health insurance company executive while she is traveling

18
New cards

A breach of more than ______ records require notification to the media.

500

19
New cards

Medicare Fraud is not easy to estimate. Which of the following does not contribute to the challenge of determining Medicare Fraud?

Fraudulent spending is not easily separated from total health care dollars spent

20
New cards

The criminal healthcare fraud statue provides for:

Making it a criminal offense to defraud any health care benefit program

21
New cards

What is the difference between the federal Anti-Kickback Law and the Stark Law?

Stark Law prohibits physicians or their family members who own healthcare facilities from referring patients to those entities. The Federal Anti-Kickback Law covers activities where one person is paid a fee for referring patients to another entity.

22
New cards

Risk analysis under the security rule is completed by:

The health care organization

23
New cards

When a ___________ of patients records is discovered, the health care organization must notify affected individuals and the health and human services (HHS) agency and possibly the media

Breach

24
New cards

What is a covered entity? A covered entity is any organization that maintains personal health information.

Insurance company rehabilitation facility hospital

25
New cards

Which of the following organizations has the authority to administer the security rule of HIPPA?

Health and human services office of civil rights