Question: Which of the following actions is NOT acceptable when working with PHI on the computer?
Answer Choices:
Using a unique password
Sharing your password
Logging off before leaving your workstation
Encrypting emails containing PHI
Answer: Sharing your password
Question: I have reviewed and understand the HIPAA privacy rules restricting use and disclosure of protected health information. I further understand that I am required to comply with the HIPAA rules and that my compliance with them is a condition of my employment, enrollment or affiliation with the University of Kentucky. I understand that failure to follow the HIPAA rules may result in disciplinary action, including termination of my employment, enrollment or affiliation at the University.
Answer Choices:
True
False
Answer: True
Question: If you intentionally violate any of the provisions of the HIPAA law after receiving this training, you will NOT be covered by the University’s liability insurance and therefore will be personally responsible for any fines, penalties or imprisonment.
Answer Choices:
True
False
Answer: True
Question: All information regarding any individual’s health care is confidential and must not be shared with anyone who does not have a legitimate need to know.
Answer Choices:
True
False
Answer: True
Question: Which of the following items of information are considered PHI (Protected Health Information) when combined with information about an individual’s health history, whether in the past or present?
Answer Choices:
Name
Social Security number
Date of birth
Full face photograph
All of the above are considered PHI
Answer: All of the above are considered PHI
Question: If you have access to written or electronic confidential health information, you may be asked as a condition of your affiliation with the University of Kentucky to sign a confidentiality agreement.
Answer Choices:
True
False
Answer: True
Question: Which of the following actions is NOT acceptable when working with PHI on the computer?
Answer Choices:
Using a unique password
Sharing your password only with those whom you work or study
Logging out when leaving a shared workstation
Ensure that your computer is facing away from the public view
None are acceptable
Answer: Sharing your password only with those whom you work or study
Question: The University of Kentucky is required to monitor itself for compliance with HIPAA regulations. Therefore periodic audits will be done of computer access to health information and observations of interactions of those involved in working with health information.
Answer Choices:
True
False
Answer: True
Question: Social cognitive theory says that learning is a behavior change and always represented in behavior.
Answer Choices:
True
False
Answer: False
Question: Which of the following items of information are considered PHI (Protected Health Information) when combined with information about an individual’s health history, whether in the past or present?
Answer Choices:
Name
Social Security number
Date of birth
Full face photograph
All of the above are considered PHI
Answer: All of the above are considered PHI
Question: HIPAA protects an individual’s health information in which of the following forms?
Answer Choices:
Electronic
Paper
Spoken
All of the above
Answer: All of the above