chapter 8 law and ethics exam

studied byStudied by 0 people
0.0(0)
Get a hint
Hint

Privilege communication

1 / 24

flashcard set

Earn XP

25 Terms

1

Privilege communication

information held confidential within a protected relationship

New cards
2

Protected health information (PHI)

information containing one or more patient identifers

New cards
3

3 items of patient identifiers

Name, Address, Social security

New cards
4

One can legally release PHI under HIPPA-defined:

Permissions

New cards
5

Information that can be found in the Notice of Privacy Practices is a:

List provided by all covered entities that demonstrates adherence to HIPPA’s privacy practice rules

New cards
6

HIPPA’s security rules derives from which standard?

Standard 3

New cards
7

What is a breach of PHI?

Breach is any unauthorized acquisition, access, use, or disclosure of personal health information which compromises the security or privacy of such information

New cards
8

What is the risk analysis for purposes of protecting PHI?

Risk analysis is when CEs evaluate the likelihood and impact of potential risk to the PHI

New cards
9

The False Claims Act contains which distinguishing provision?

Federal False Claims Act allows individuals to bring civil actions on behalf of the U.S government for false claims made to the federal government, under a provision of the law called qui tam (Latin word meaning “to bring an action for the king and for oneself)

New cards
10

Four HIPPA standards and briefly describe their purpose

Standard 1: Transactions and code sets- for uniformity in reporting

Standard 2- Privacy rule- for protecting PHI during electronic transmission

Standard 3- Security Rule- For securing electronic storage and transmission against

Standard 4- National Identifier Standards- Provide uniform national identifiers for the movement of electronic transactions; the 4 identifiers are provider, health plan, employer, and individual.

New cards
11

How should privacy be maintained with electronic devices?

Use caution when texting, emailing, or posting on social media. Shed all confidential papers. implement strong passwords

New cards
12

What is a covered entity?

Health care providers who conduct administrative and financial transactions in electronic forms, includes: all employees, volunteers, trainees, and all others who are under the control of the entity

New cards
13

Six HIPPA-defined permissions

Disclosures to patients, disclosures to treatment, payment, or health care operations; Disclosures with opportunity to agree or object; some incidental uses and disclosures permitted without authorization; disclosures for public interest and benefit activities; limited data set disclosures

New cards
14

What are the key elements in a Notice of Privacy Practices?

How the CE may use and disclose an individual’s PHI; the patient’s rights with respect to the information and how the patient may exercise those rights, with clear direction on how many patients may complain to the CE; the CE’s legal duties with respect to the information; whom patients can contact further information

New cards
15

How might a health care provider show that their EHR was as safe as possible from a breach?

Documented risk analysis, along with evidence that problem has been fixed

New cards
16

Risk analysis for the security rule is

Requirement for the health care organization

New cards
17

Which of the following constitutes a data breach?

A medical office computer is sold without erasing the hard drive

A hacker accesses a hospital’s list of patients with HIV

A business-use laptop is stolen from a health insurance company executive while she is traveling

New cards
18

A breach of more than ______ records require notification to the media.

500

New cards
19

Medicare Fraud is not easy to estimate. Which of the following does not contribute to the challenge of determining Medicare Fraud?

Fraudulent spending is not easily separated from total health care dollars spent

New cards
20

The criminal healthcare fraud statue provides for:

Making it a criminal offense to defraud any health care benefit program

New cards
21

What is the difference between the federal Anti-Kickback Law and the Stark Law?

Stark Law prohibits physicians or their family members who own healthcare facilities from referring patients to those entities. The Federal Anti-Kickback Law covers activities where one person is paid a fee for referring patients to another entity.

New cards
22

Risk analysis under the security rule is completed by:

The health care organization

New cards
23

When a ___________ of patients records is discovered, the health care organization must notify affected individuals and the health and human services (HHS) agency and possibly the media

Breach

New cards
24

What is a covered entity? A covered entity is any organization that maintains personal health information.

Insurance company rehabilitation facility hospital

New cards
25

Which of the following organizations has the authority to administer the security rule of HIPPA?

Health and human services office of civil rights

New cards

Explore top notes

note Note
studied byStudied by 28 people
... ago
5.0(1)
note Note
studied byStudied by 10 people
... ago
5.0(1)
note Note
studied byStudied by 10 people
... ago
5.0(1)
note Note
studied byStudied by 3 people
... ago
5.0(1)
note Note
studied byStudied by 13 people
... ago
5.0(1)
note Note
studied byStudied by 8 people
... ago
5.0(1)
note Note
studied byStudied by 31 people
... ago
5.0(2)

Explore top flashcards

flashcards Flashcard (255)
studied byStudied by 13 people
... ago
5.0(1)
flashcards Flashcard (56)
studied byStudied by 6 people
... ago
5.0(1)
flashcards Flashcard (20)
studied byStudied by 12 people
... ago
5.0(2)
flashcards Flashcard (38)
studied byStudied by 24 people
... ago
5.0(1)
flashcards Flashcard (72)
studied byStudied by 132 people
... ago
5.0(3)
flashcards Flashcard (87)
studied byStudied by 2 people
... ago
5.0(1)
flashcards Flashcard (96)
studied byStudied by 22 people
... ago
5.0(1)
flashcards Flashcard (485)
studied byStudied by 305 people
... ago
5.0(6)
robot