Question: Which of the following actions is NOT acceptable when working with PHI on the computer?

Answer Choices:
Using a unique password
Sharing your password
Logging off before leaving your workstation
Encrypting emails containing PHI

Answer: Sharing your password

 

Question: I have reviewed and understand the HIPAA privacy rules restricting use and disclosure of protected health information. I further understand that I am required to comply with the HIPAA rules and that my compliance with them is a condition of my employment, enrollment or affiliation with the University of Kentucky. I understand that failure to follow the HIPAA rules may result in disciplinary action, including termination of my employment, enrollment or affiliation at the University.

Answer Choices:
True
False

Answer: True

 

Question: If you intentionally violate any of the provisions of the HIPAA law after receiving this training, you will NOT be covered by the University’s liability insurance and therefore will be personally responsible for any fines, penalties or imprisonment.

Answer Choices:
True
False

Answer: True

 

Question: All information regarding any individual’s health care is confidential and must not be shared with anyone who does not have a legitimate need to know.

Answer Choices:
True
False

Answer: True

 

Question: Which of the following items of information are considered PHI (Protected Health Information) when combined with information about an individual’s health history, whether in the past or present?

Answer Choices:
Name
Social Security number
Date of birth
Full face photograph
All of the above are considered PHI

Answer: All of the above are considered PHI

 

Question: If you have access to written or electronic confidential health information, you may be asked as a condition of your affiliation with the University of Kentucky to sign a confidentiality agreement.

Answer Choices:
True
False

Answer: True

 

Question: Which of the following actions is NOT acceptable when working with PHI on the computer?

Answer Choices:
Using a unique password
Sharing your password only with those whom you work or study
Logging out when leaving a shared workstation
Ensure that your computer is facing away from the public view
None are acceptable

Answer: Sharing your password only with those whom you work or study

 

Question: The University of Kentucky is required to monitor itself for compliance with HIPAA regulations. Therefore periodic audits will be done of computer access to health information and observations of interactions of those involved in working with health information.

Answer Choices:
True
False

Answer: True

 

Question: Social cognitive theory says that learning is a behavior change and always represented in behavior.

Answer Choices:
True
False

Answer: False

 

Question: Which of the following items of information are considered PHI (Protected Health Information) when combined with information about an individual’s health history, whether in the past or present?

Answer Choices:
Name
Social Security number
Date of birth
Full face photograph
All of the above are considered PHI

Answer: All of the above are considered PHI

 

Question: HIPAA protects an individual’s health information in which of the following forms?

Answer Choices:
Electronic
Paper
Spoken
All of the above

Answer: All of the above