Mod 10

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

A covered entity must act on a request for accounting disclosures no later than _____ days after its receipt and within ______ days of extension, as long as it notifies the individual in writing of the reasons for the delay and when the accounting will be made available. a. 60, 30 b. 45, 60 c. 30, 60 d. 45, 30

A

A health care organization's compliance plans should not only focus on regulatory compliance, but also have a: a. coding compliance program that prevents fraudulent coding and billing. b. substantial program that increases the availability of clinical data. c. component that increases the security of medical records. d. strong personnel component that reduces the rapid turnover of nursing personnel.

A

A valid authorization for release of information contains: a. all of these answers apply. b. the name of the hospital or provider who is releasing the medical information. c. the name, agency, or institution to which the information is to be provided. d. the date and signature of the patient or the patient's authorized representative.

A

According to the American Reinvestment Recovery Act, all of the following are elements of a compliance report relating to privacy and security of health information with the exception of: a. the number of audits that are anticipated to be performed. b. the number of compliance reviews conducted and the outcome. c. the number of complaints resolved informally. d. the number of complaints.

A

All of the following may present challenges to informed consent EXCEPT: a. the treating physician obtained the patient's signature. b. the consent was written in a language that the patient could not understand. c. the risks and benefits of the proposed treatment or procedure were not disclosed. d. the patient was not permitted an opportunity to ask questions.

A

An interning medical student at the Goodwill Community Hospital accessed several patients' files to obtain their names, DOB, and Social Security numbers, which were used to impersonate patients and file claims with multiple insurance companies in hopes of receiving payment to cover the remaining tuition fees for medical school. This act can be best categorized as: a. medical identity theft. b. spoliation. c. a negligent act. d. defamation of character.

A

Darling v. Charleston Community Memorial Hospital is considered one of the benchmark cases in health care because it was with this case that the doctrine of _______________ was eliminated for nonprofit hospitals. a. charitable immunity b. contributory negligence c. professional negligence d. corporate negligence

A

HIPAA requires that certain covered entities provide every patient a Notice of Privacy Practices that sets forth all of the following EXCEPT: a. covered entities provide every patient with its annual business report. b. patient's rights regarding the covered entities' uses and disclosures. c. how covered entities may use and disclose PHI. d. covered entities' obligations for protecting the patient's PHI.

A

In which type of facility does the Privacy Act of 1974 permit patients to request amendments to their medical record? a. Department of Defense health care facility b. private proprietary health care facility c. mental health and chemical dependency facility d. university-based teaching facility

A

Mandatory reporting requirements for vital statistics generally: a. do not require authorization by the patient. b. require authorization by the payer. c. do not apply to health care facilities. d. require authorization by the physician.

A

Many states have recognized a minor's right to seek treatment without parental consent in all of the following situations EXCEPT a(n): a. minor seeking treatment for breast reduction. b. minor seeking treatment for a sexually transmitted disease. c. minor seeking treatment for alcohol and substance abuse. d. emancipated minor seeking treatment for breast enlargement.

A

The HITECH breach notification requirement is significant and different from any other requirements in the past because it: a. places organizations on the radar of regulatory agencies and in the media spotlight. b. suspends the responsible entity from being able to disclose PHI for a specific period of time. c. requires the entity responsible to pay monetary damages to those affected by the breach. d. requires the CEO of the entity responsible to serve jail time.

A

The legislation that required all federally funded facilities to inform patients of their rights under state law to accept or refuse medical treatment is known as: a. Patient Self-Determination Act. b. advance directives. c. living wills. d. durable power of attorney.

A

The minimum record retention period for patients who are minors is: a. age of majority plus the statute of limitations. b. 5 years past treatment. c. 2 years past treatment. d. age of majority.

A

What advice should be given to a physician who has informed you that she recently discovered that a significant portion of a discharge summary she dictated last month was left out? a. Dictate the portion omitted with the heading "Discharge Summary—Addendum" and make a reference to the addendum with a note that is dated and signed on the initial Discharge Summary (e.g., "9/1/17-See Addendum to Discharge Summary"—Signature). b. Redictate the discharge summary and replace the old one with the new one. c. Inform the physician that nothing can be done about the situation. d. Squeeze in the information omitted by writing in available spaces such as the top, bottom, and side margins.

A

Which of the following is an example of the breach of confidentiality? a. staff members discussing patients' information in the elevator b. the hospital operator paging code blue in room 3 north c. a nurse speaking with the physician in the patient's room d. the admission clerk verifying over the phone that the patient is in-house

A

Which two theories of negligence are used to hold health care facilities accountable for the actions of its employees? a. respondent superior and corporate negligence b. invasion of privacy and fraud c. defamation and fraud d. assault and battery

A

Who of the following who are permitted to have access to patient health records and information without the patient authorization as part of their training program? a. all of these answers apply b. HIM students c. nursing students d. medical students

A

Historically, individually identifiable information for deceased individuals regardless of the time of death was covered under the HIPAA Privacy Rule. However, under the HITECH, individually identifiable information for deceased individuals is no longer covered after _____ years. a. 40 b. 50 c. 60 d. 30

B

An improper disclosure of patient information to unauthorized individuals, agencies, or news media may be considered a(n): a. defamation. b. invasion of privacy. c. slander. d. libel.

B

In general, which of the following statements is correct? a. When federal and state laws conflict, valid state laws supersede federal laws. b. When federal and state laws conflict, valid federal laws supersede state laws. c. When federal and state laws conflict, valid corporate policies supersede federal and state laws. d. When federal and state laws conflict, valid local laws supersede federal and state laws.

B

In which of the following circumstances would release of information without the patient's authorization be permissible? a. release to worker's compensation agency b. release to insurance companies for marketing purposes c. release to a hiring agency d. release to an attorney

B

The proper method for correcting a documentation error in a paper medical record is for the author to: a. draw an "X" through the incorrect documentation. b. draw a single line through the incorrect information, date, and initial the change. c. white it out, date, and initial the change. d. remove the form from the chart and add a revised form.

B

Which of the following health care systems have to comply with the requirements of the Freedom of Information Act? a. private hospitals b. veterans' hospitals c. single-day surgery clinics d. physicians' offices

B

Which of the following would be an inappropriate procedure for the custodian of the medical record to perform prior to taking a medical record from a health care facility to court? a. Number each page of the record in ink. b. Prepare an itemized list of sheets contained in the medical record. c. Remove any information that might prove detrimental to the hospital or physician. d. Document in the file folder the total number of pages in the record.

B

A medical malpractice claim involving a wrong-site surgery was heard in a higher court, which resulted in the health care facility's requirement to pay the plaintiff $1 million in damages. A similar case with similar elements was also heard in a lower court, and thus the lower court followed the lead of the higher court in deciding the outcome of the case. The term that most appropriately describes the action of the lower court is: a. res judicata. b. writ of certiorari. c. stare decisis. d. res ipsa loquitor.

C

All of the following are examples of intentional torts EXCEPT a. assault and battery. b. invasion of privacy. c. misfeasance. d. defamation of character.

C

As a general rule, a person making a report in good faith and under statutory command (e.g., on child abuse, communicable diseases, births, and deaths) is: a. not protected from liability claims. b. subject to penalties imposed by federal law. c. protected. d. subject to penalties imposed by state law.

C

Centric Medical Center established a business associate agreement with Quenlinks Solutions to provide mobile devices for their physicians and nurses to enter patient information into the organization's EHR in real-time. Which of the following should be considered as a best practice for the use of mobile technology in this given scenario? a. identification of device ownership b. required authorization for mobile technology use c. all of these answers apply d. safeguards and techniques for adequate protection of ePHI

C

HIM personnel charged with the responsibility of bringing a medical record to court would ordinarily do so in answer to a: a. personal subpoena. b. deposition. c. subpoena duces tecum. d. judgment.

C

HIM professionals have a duty to maintain health information that complies with: a. federal statutes. b. accreditation standards. c. all of these answers apply. d. state statutes.

C

In ensuring security compliance, the Department of Health and Human Services has a seven-step guide to implementing a security management process. All of the following are steps within this processes EXCEPT: a. develop an action plan. b. manage and mitigate risks. c. develop a contingency plan. d. lead your culture, select your team, and learn.

C

When substituting a photocopy of the original record in response to legal process, which of the following can be helpful in convincing the court to accept the photocopy as a true and exact copy of the original? a. consent from the patient b. correspondence from the attending physician c. certificate of authentication d. consent from the hospital administrator

C

Which of the following is needed when a physician conducts an invasive procedure? a. general consent b. advanced directive c. informed consent d. living will

C

While performing routine quantitative analysis of a record, a medical record employee finds an incident report in the record. The employee brings this to the attention of her supervisor. Which best practice should the supervisor follow to deal with this situation? a. Remove the incident report and have nursing personnel transfer all documentation from the report to the medical record. b. Tell the employee to leave the report in the record. c. Refer this record to the risk manager for further review and removal of the incident report. d. Remove the incident report and send it to the patient.

C

Who decides whether all or portions of the medical record will be received in evidence in a court of law? a. defendant b. subpoenaing attorney c. presiding judge/court d. clerk of the court

C

Willful disregard of a subpoena is considered: a. contributory negligence. b. breach of contract. c. contempt of court. d. abuse of process.

C

A written consent from the patient is required from which of the following entities in order to learn a patient's HIV status? a. health care workers responsible for treating the patient b. Centers for Disease Control c. attending physician d. the patient's employer

D

All of the following are elements of a contract EXCEPT: a. offer/communication. b. price/consideration. c. acceptance. d. duty.

D

Dr. Sam Vineyard improperly performed a knee replacement surgery, which caused the patient to develop an infection that lead to the amputation of the leg and thigh. The best term to describe the action performed is: a. malpractice. b. nonfeasance. c. malfeasance. d. misfeasance.

D

Elements of a breach notification should include all of the following EXCEPT: a. a description of what occurred, including the date of the breach and the date the breach was discovered. b. steps individuals should take in order to protect themselves. c. what the entity is doing to investigate, mitigate, and prevent future occurrences. d. the name of the individual within the entity responsible for the breach so that a civil claim can be filed against the individual.

D

In electronic health records, authentication may be achieved by: a. verbal statement. b. digital signature, handwritten signature, and verbal statement. c. handwritten signature. d. digital signature.

D

The ideal consent for medical treatment obtained by the physician is: a. verbal. b. implied. c. expressed. d. informed.

D

Under which category of law would Marleana Harrison bring a cause of action against Dr. Billy Ray for disclosing information regarding her previous physical examination to his wife, Jana Ray, who is Ms. Harrison's hairstylist? a. administrative law b. procedural law c. criminal law d. private law

D

What type of testimony is inappropriate for a health information manager serving as custodian of the record when he or she is called to be a witness in court? a. whether the medical record was made in the usual course of business b. title and position held in the health care facility c. whether the record is in the practitioner's possession d. interpretation of documentation in the record

D

When a health information professional (record custodian) brings the medical record to court in response to a subpoena duces tecum, it is his or her responsibility to: a. present the case favorably for the patient involved. b. explain details of the medical treatment given to the patient. c. leave the original record in the possession of the plaintiff's attorney. d. confirm whether or not the record is complete, accurate, and made in the ordinary course of business.

D

Which of the following agencies is empowered to implement the law governing Medicare and Medicaid? a. Joint Commission b. Department of Health and Human Services c. Institutes of Health d. Centers for Medicare and Medicaid Services (CMS)

D

Which of the following is considered confidential information if the patient is seeking treatment in a substance abuse facility? a. patient's prognosis b. patient's diagnosis c. patient's name d. all of these answers apply

D

Which of the following measures should a health care facility incorporate into its institution-wide security plan to protect the confidentiality of the patient record? a. use of unique computer passwords, key cares, or biometric identification b. all of these answers apply. c. locked access to data processing and record areas d. verification of employee identification

D

The family of Mr. Kent filed a wrongful death lawsuit against Pier Memorial Hospital 10 years after the procedure was performed. In order to avoid the risk of Mr. Kent's electronic medical record being destroyed, a _______ was ordered by the court. a. legal hold b. subpoena duces tecum c. spoliation hold d. restitution waiver

a


संबंधित स्टडी सेट्स

Lesson 5 Estructura 5.3 Ser and estar

View Set

Finals HCI : Evaluation Techniques

View Set

Business Ethics Chapters 1-3 by CAR

View Set

Chapter 9: Implementing Information Security

View Set

Med Surge Chap 65 Degenerative Neuro

View Set

Chapter 4: Beat Subdivisions and Syncopation

View Set