Health Care > QUESTIONS & ANSWERS > WGU C810 - Exam Study Set 3 Already Passed (All)
WGU C810 - Exam Study Set 3 Already Passed TRUE ✔✔True or false: If a patient requests that his or her name is removed from the hospital directory, the hospital must comply and remove the pati... ent's name. without permission of the patient ✔✔PHI can be used and disclosed ___________________ if the PHI is deidentified. Under HIPAA, deidentification refers to health information that has had identifiers removed so there is not the capability to reasonably identify the individual to which the information belongs. Documentation to release records: Verification: Identification of attorney. ✔✔If an attorney comes in to request medical records for a malpractice case that he or she is assigned to, what documentation requirements are necessary to release the records, and what type of verification should be completed prior to releasing the records? Mitigate transfer accept ✔✔What are the three basic methods to address risk after a HIPAA risk analysis? HIPAA Security Rule ✔✔The ________________ requires an organization to implement a process for regular review of system activity. Implement hardware, software, and such to allow the ability to track and review activity on an information system. Determine which systems produce audit logs ✔✔When establishing an audit and monitoring program, the first step is: Data at rest ✔✔________________ is when the data are in storage within a database or on a server and are no longer being used or access. Data in motion ✔✔_________________ are data in the process of being transmitted from one location to another location such as an e-mail. Modified or deleted files ✔✔Which of the following is a potential impact of a virus getting onto an end-user device? User authentication ✔✔The process of an end user logging into an electronic system using specific credentials defined by the organization is called: Data are in plain text ✔✔____________ data available to anyone who can get access to it and is considered unsecure. Cryptographic key is applied to the data ✔✔____________________ the key is the process that changes the data from plain text to cipher text allowing encryption to occur. Data are in cipher text ✔✔______________ the data are considered unusable, indecipherable, and unreadable. The information is secure. Unique user identification ✔✔Which of the following is an example of a safeguard that can be implemented to protect patient information for health information exchange? - Identifying device ownership - Regular evaluation of mobile devices - Required authorization for mobile technology use ✔✔Best practices for the use of mobile technology include: workforce ✔✔HIPAA defines ________________ as Employees, volunteers, trainees, and other persons whose conduct, in the performance of work for a covered entity or business associate, is under the direct control of such covered entity or business associate, whether or not they are paid by the covered entity or business associate. Upon hire, annual education, periodically throughout the year, and when policies change. ✔✔What is the best timeframe to provide HIPAA education to the workforce? HIPAA Privacy Rule Security Rule Breach Notification Rule ✔✔Under the HIPAA regulations, training of the workforce is defined in which of the following regulations? Enterprise authority that ensures control and accountability for enterprise data. ✔✔Which of the following best describes DG (Data governance) ? Data life cycle management ✔✔Which of the following data management domains would be responsible for establishing standards for data retention and storage? Metadata ✔✔Which of the following is often referred to as "data about data"? Data governance ✔✔Which of the following synchronizes and coordinates all of the data management domains? assessing the ethical use of statistical data ✔✔Which of the following would not be considered a DG (Data governance) function? Desired outcome of implementing a business change ✔✔Which of the following best describes the definition of a business case? Framework ✔✔Which of the following describes a real or conceptual structure that organizes a system or concept? [Show More]
Last updated: 2 years ago
Preview 1 out of 5 pages
Buy this document to get the full access instantly
Instant Download Access after purchase
Buy NowInstant download
We Accept:
WGU C810 BUNDLED EXAMS QUESTIONS AND ANSWERS WITH COMPLETE SOLUTIONS 100% PASS
By Nutmegs 2 years ago
$17
8
Can't find what you want? Try our AI powered Search
Connected school, study & course
About the document
Uploaded On
Jan 30, 2023
Number of pages
5
Written in
This document has been written for:
Uploaded
Jan 30, 2023
Downloads
0
Views
99
In Scholarfriends, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.
We're available through e-mail, Twitter, Facebook, and live chat.
FAQ
Questions? Leave a message!
Copyright © Scholarfriends · High quality services·