WGU C810 - Exam Study Set 3 Already
Passed
TRUE ✔✔True or false:
If a patient requests that his or her name is removed from the hospital directory, the hospital must
comply and remove the patient's name.
without per
...
WGU C810 - Exam Study Set 3 Already
Passed
TRUE ✔✔True or false:
If a patient requests that his or her name is removed from the hospital directory, the hospital must
comply and remove the patient's name.
without permission of the patient ✔✔PHI can be used and disclosed ___________________ if
the PHI is deidentified. Under HIPAA, deidentification refers to health information that has had
identifiers removed so there is not the capability to reasonably identify the individual to which
the information belongs.
Documentation to release records:
Verification: Identification of attorney. ✔✔If an attorney comes in to request medical records for
a malpractice case that he or she is assigned to, what documentation requirements are necessary
to release the records, and what type of verification should be completed prior to releasing the
records?
Mitigate
transfer
accept ✔✔What are the three basic methods to address risk after a HIPAA risk analysis?
HIPAA Security Rule ✔✔The ________________ requires an organization to implement a
process for regular review of system activity. Implement hardware, software, and such to allow
the ability to track and review activity on an information system.
Determine which systems produce audit logs ✔✔When establishing an audit and monitoring
program, the first step is:
Data at rest ✔✔________________ is when the data are in storage within a database or on a
server and are no longer being used or access.
Data in motion ✔✔_________________ are data in the process of being transmitted from one
location to another location such as an e-mail.
Modified or deleted files ✔✔Which of the following is a potential impact of a virus getting onto
an end-user device?
User authentication ✔✔The process of an end user logging into an electronic system using
specific credentials defined by the organization is called:
Data are in plain text ✔✔____________ data available to anyone who can get access to it and is
considered unsecure.
Cryptographic key is applied to the data ✔✔____________________ the key is the process that
changes the data from plain text to cipher text allowing encryption to occur.
Data are in cipher text ✔✔______________ the data are considered unusable, indecipherable,
and unreadable. The information is secure.
Unique user identification ✔✔Which of the following is an example of a safeguard that can be
implemented to protect patient information for health information exchange?
- Identifying device ownership
- Regular evaluation of mobile devices
- Required authorization for mobile technology use ✔✔Best practices for the use of mobile
technology include:
workforce ✔✔HIPAA defines ________________ as Employees, volunteers, trainees, and other
persons whose conduct, in the performance of work for a covered entity or business associate, is
under the direct control of such covered entity or business associate, whether or not they are paid
by the covered entity or business associate.
Upon hire, annual education, periodically throughout the year, and when policies change.
✔✔What is the best timeframe to provide HIPAA education to the workforce?
HIPAA Privacy Rule
Security Rule
Breach Notification Rule ✔✔Under the HIPAA regulations, training of the workforce is defined
in which of the following regulations?
Enterprise authority that ensures control and accountability for enterprise data. ✔✔Which of the
following best describes DG (Data governance) ?
Data life cycle management ✔✔Which of the following data management domains would be
responsible for establishing standards for data retention and storage?
Metadata ✔✔Which of the following is often referred to as "data about data"?
Data governance ✔✔Which of the following synchronizes and coordinates all of the data
management domains?
assessing the ethical use of statistical data ✔✔Which of the following would not be considered a
DG (Data governance) function?
Desired outcome of implementing a business change ✔✔Which of the following best describes
the definition of a business case?
Framework ✔✔Which of the following describes a real or conceptual structure that organizes a
system or concept?
[Show More]