Health Care > QUESTIONS & ANSWERS > WGU C810 - Exam Study Set 3 Already Passed (All)

WGU C810 - Exam Study Set 3 Already Passed

Document Content and Description Below

WGU C810 - Exam Study Set 3 Already Passed TRUE ✔✔True or false: If a patient requests that his or her name is removed from the hospital directory, the hospital must comply and remove the pati... ent's name. without permission of the patient ✔✔PHI can be used and disclosed ___________________ if the PHI is deidentified. Under HIPAA, deidentification refers to health information that has had identifiers removed so there is not the capability to reasonably identify the individual to which the information belongs. Documentation to release records: Verification: Identification of attorney. ✔✔If an attorney comes in to request medical records for a malpractice case that he or she is assigned to, what documentation requirements are necessary to release the records, and what type of verification should be completed prior to releasing the records? Mitigate transfer accept ✔✔What are the three basic methods to address risk after a HIPAA risk analysis? HIPAA Security Rule ✔✔The ________________ requires an organization to implement a process for regular review of system activity. Implement hardware, software, and such to allow the ability to track and review activity on an information system. Determine which systems produce audit logs ✔✔When establishing an audit and monitoring program, the first step is: Data at rest ✔✔________________ is when the data are in storage within a database or on a server and are no longer being used or access. Data in motion ✔✔_________________ are data in the process of being transmitted from one location to another location such as an e-mail. Modified or deleted files ✔✔Which of the following is a potential impact of a virus getting onto an end-user device? User authentication ✔✔The process of an end user logging into an electronic system using specific credentials defined by the organization is called: Data are in plain text ✔✔____________ data available to anyone who can get access to it and is considered unsecure. Cryptographic key is applied to the data ✔✔____________________ the key is the process that changes the data from plain text to cipher text allowing encryption to occur. Data are in cipher text ✔✔______________ the data are considered unusable, indecipherable, and unreadable. The information is secure. Unique user identification ✔✔Which of the following is an example of a safeguard that can be implemented to protect patient information for health information exchange? - Identifying device ownership - Regular evaluation of mobile devices - Required authorization for mobile technology use ✔✔Best practices for the use of mobile technology include: workforce ✔✔HIPAA defines ________________ as Employees, volunteers, trainees, and other persons whose conduct, in the performance of work for a covered entity or business associate, is under the direct control of such covered entity or business associate, whether or not they are paid by the covered entity or business associate. Upon hire, annual education, periodically throughout the year, and when policies change. ✔✔What is the best timeframe to provide HIPAA education to the workforce? HIPAA Privacy Rule Security Rule Breach Notification Rule ✔✔Under the HIPAA regulations, training of the workforce is defined in which of the following regulations? Enterprise authority that ensures control and accountability for enterprise data. ✔✔Which of the following best describes DG (Data governance) ? Data life cycle management ✔✔Which of the following data management domains would be responsible for establishing standards for data retention and storage? Metadata ✔✔Which of the following is often referred to as "data about data"? Data governance ✔✔Which of the following synchronizes and coordinates all of the data management domains? assessing the ethical use of statistical data ✔✔Which of the following would not be considered a DG (Data governance) function? Desired outcome of implementing a business change ✔✔Which of the following best describes the definition of a business case? Framework ✔✔Which of the following describes a real or conceptual structure that organizes a system or concept? [Show More]

Last updated: 2 years ago

Preview 1 out of 5 pages

Buy Now

Instant download

We Accept:

We Accept
document-preview

Buy this document to get the full access instantly

Instant Download Access after purchase

Buy Now

Instant download

We Accept:

We Accept

Also available in bundle (1)

WGU C810 BUNDLED EXAMS QUESTIONS AND ANSWERS WITH COMPLETE SOLUTIONS 100% PASS

WGU C810 BUNDLED EXAMS QUESTIONS AND ANSWERS WITH COMPLETE SOLUTIONS 100% PASS

By Nutmegs 2 years ago

$17

8  

Reviews( 0 )

$8.00

Buy Now

We Accept:

We Accept

Instant download

Can't find what you want? Try our AI powered Search

99
0

Document information


Connected school, study & course


About the document


Uploaded On

Jan 30, 2023

Number of pages

5

Written in

Seller


seller-icon
Nutmegs

Member since 4 years

620 Documents Sold

Reviews Received
77
14
8
2
21
Additional information

This document has been written for:

Uploaded

Jan 30, 2023

Downloads

 0

Views

 99

Document Keyword Tags


$8.00
What is Scholarfriends

In Scholarfriends, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Scholarfriends · High quality services·