EHR - Ch #7

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following may result in the need to deploy the disaster recovery plan? a) A computer hacker has gained access to the database and corrupt files have been found b) Joy Smith, an employee in the office, entered data on the wrong patient c) The IT manager has read that a computer virus has just hit Europe and is expected to hit the United States by end of week d) Dr. Ingram lost his cell phone last week

a) A computer hacker has gained access to the database and corrupt files have been found

Lisa Haver is a patient of Dr. Randolph's. You have just opened today's mail and opened a letter from Ms. Haver's attorney because she is involved in a lawsuit regarding an auto accident. What will you do? a) look for a signed authorization in the envelope which authorizes the office to release Lisa Haver's records to the attorney b) print off the record from the EHR system and send to the attorney c) call the patient d) Write back to the attorney stating that your office policy prohibits you from sending records to attorneys

a) look for a signed authorization in the envelope which authorizes the office to release Lisa Haver's records to the attorney The very first step would be to find the signed authorization from the patient. If no authorization was enclosed, then a letter would be sent to the attorney's office requesting one.

HIPAA defines a patient's name, social security number, employer, or medical record/account numbers that tie information to a particular person as: a) protected health information b) privileged health information c) private health information d) confidential health information

a) protected health information

Each person who has the ability to access a computer software system, for instance PrimeSUITE, is set up within the software and assigned a/an __________________, which is typically based on their name. a) user ID b) password c) PIN d) access code

a) user ID

In 2004, the ______________, the Healthcare Information and Management Systems Society, and the National Alliance for Health Information Technology organized the Certification Commission for Health Information Technology. a) Centers for Medicare and Medicaid Services b) American Health Information Management Association c) American Medical Information Association d) International Federation of Record Organizations

b) American Health Information Management Association It was the American Health Information Management Association who partnered with the two organizations to form the Certification Commission for Health Information Technology.

Some states have a Health Information __________________, funded through the ONC, which allows the sharing of health information for continuity of care purposes. a) Bank b) Exchange c) Listserve d) Entity

b) Exchange Health Information Exchanges can be privately operated or can be state-run with funding by ONC or through the National health Information Exchange.

The law which strengthened HIPAA privacy and security regulations was: a) American Recovery and Reinvestment Act (ARRA) b) Health Information Technology for Economic and Clinical Health Act (HITECH) c) Meaningful Use (MU) d) Affordable Care Act (ACA)

b) Health Information Technology for Economic and Clinical Health Act (HITECH)

How is a correction made to an electronic health record? a) The incorrect entry is corrected and the original entry is deleted from the database b) The incorrect entry is corrected and the original entry is hidden from view, but is still retrievable c) A second entry is made under the original incorrect entry and d) No change is made, since care may have already been given based on the incorrect information

b) The incorrect entry is corrected and the original entry is hidden from view, but is still retrievable

Nancy Jackson is the office manager of a medical practice. Each month she reviews a report that shows which staff members viewed, edited, or deleted data on a random selection of patient's records, and whether or not the access or the actions taken were justified. Nancy is performing which function? a) accounting of disclosures b) auditing c) quality review d) quantitative review

b) auditing

In order for the healthcare facility to know what to do in case of a situation that interrupts access to the EHR, a written _______________ should be in place. a) policy b) disaster recovery plan c) compliance plan d) audit trail

b) disaster recovery plan

Which of the following is not included in the Notice of Privacy Practices? a) how a patient's health information may be used b) the name of the individual to whom a record was released c) that the patient may request correction or amendment to their health record d) entities to whom a patient's information may be released

b) the name of the individual to whom a record was released

Of the following, which password is most secure? a) record b) record58 c) Record**58 d) Record58

c) Record**58

You are the office manager of Greensburg Medical Center. You have received a letter from one of your patients, Ida Healthway, asking to know the names of all employees and care providers who have accessed her EHR within the last year, since she believes someone has been spreading information about her in the community. You will provide Ms. Healthway with this information, which is known as: a) a patient list b) release logging c) accounting of information disclosures d) information exchange

c) accounting of information disclosures Accounting for disclosures is required by HITECH and must be given to the patient upon request.

E-mails or faxes that are sent and arrive at the wrong location constitute a privacy _____________. a) code b) encryption c) breach d) access

c) breach

An employee at Memorial Medical Practice released the diagnosis of a patient to the patient's spouse without an authorization. This is known as a/an _________________________. a) accidental disclosure b) privacy disclosure c) breach of confidentiality d) disclaimer

c) breach of confidentiality

CPT, which is used to code procedures in an office, is an example of a/an _____________. a) password b) accounting of disclosures c) code set d) storage method

c) code set Coding systems such as ICD-9-CM, ICD-10-CM/PCS, CPT, and HCPCS are all code sets that are required by HIPAA to file claims.

Keeping health information to oneself is known as protecting: a) security b) privacy c) confidentiality d) secrecy

c) confidentiality

When correcting written documentation in a paper record, it is necessary to: a) black out the incorrect information b) use red ink to rewrite the incorrect information correctly c) cross out the incorrect information with one line, enter the correct information, date and initial the correction d) do nothing, since care may have already been given based on the incorrect information

c) cross out the incorrect information with one line, enter the correct information, date and initial the correction

James Philips has asked that certain personnel within the office be prohibited from seeing his health information. This record will be flagged how in PrimeSUITE? a) confidential b) private c) restricted access d) sensitive information

c) restricted access

Blocking access to a facility's computer systems by unauthorized users is accomplished through use of _______________. a) passwords b) special hardware c) encryptor programs d) a firewall

d) a firewall

A staff member who monitors existing and new regulations and is the "go-to" person should an incident occur is known as the _____________________. a) office manager b) HIM department director c) managing partner d) compliance officer

d) compliance officer


Conjuntos de estudio relacionados

Topic 1.5 Ratification of the U.S. Constitution (CON-1)

View Set

Preventing and Controlling The Transmission of Infectious Agents

View Set

Chapter #4 Body Tissues and Membranes, Chapter#5 The Integumentary System

View Set

Ch. 23 Adult Women and Men Community Final

View Set

MasteringBio: Ch. 4 Core Content

View Set

Anatomy and Pathophysiology Chapter 4

View Set

Chapter 32 - Hypertension (Med Surg) EAQ's

View Set

Osha Walking Working Surfaces 90%

View Set