Title 1 of the HIPAA legislation in the United States is about:
A. P1<1 requirements for hospitals and health care providers.
B. Encryption algorithms that must be supported by hospitals and health care providers.
C. Fraud and abuse in the health care system and ways to eliminate the same.
D. Guaranteed health insurance coverage to workers and their families when they change employers.
E. The use of strong authentication technology that must be supported by hospitals and health care providers.
As part of their HIPAA compliance process, a small doctor's office formally puts the office manager in charge of security related issues, This complies with which security rule standard?
A. Security Awareness and Training
B. Security Management Process
C. Access Control
D. Assigned Security Responsibility
E. Security incident Procedures
The Final Privacy Rule requires a covered entity to obtain an individual's prior written authorization to use his or her PHI for marketing purposes except for:
A. Situations where the marketing is for a drug or treatment could improve the health of that individual.
B. Situations where the patient has already signed the covered entity's Notice of Privacy Practices.
C. A face-to-face encounter with the sales person of a company that provides drug samples.
D. A communication involving a promotional gift of nominal value.
E. The situation where the patient has signed the Notice of Privacy Practices of the marketer.
Which of the following is not one of the HIPAA Titles?:
A. Title IX: Employer sponsored group health plans.
B. Title Ill: Tax-related Health Provisions.
C. Title II: Administrative Simplification.
D. Title I: Health Care Insurance Access, Portability, and Renewability.
E. Title V: Revenue Offsets.
This transaction is used to transmit referral transactions between UMOs and other parties:
A. Referral Premium Payment.
B. Health Care Referral Certification and Authorization.
C. First Report of Injury.
D. Health Plan Referral Enrollment and Dis-enrollment.
E. Coordination of Referral Benefits.
Establishing policies and procedures for responding to an emergency or other occurrence that damages systems is an example of
A. Security Awareness and Training
B. Security Incident Procedure
C. Information Access Management
D. Security Management Process
E. Contingency Plan
Encryption is included as an addressable implementation specification under which security rule standard?
A. Information Access Management
B. Security Management Process
C. Evaluation
D. Transmission Security
E. Device and Media Controls
Which of the following is example of "Payment" as defined in the HIPAA regulations?
A. Annual Audits
B. Claims Management
C. Salary disbursement to the workforce having direct treatment relationships.
D. Life Insurance underwriting
E. Cash given to the pharmacist for the purchase of an over-the-counter drug medicine