HIT 102 chapter 2 assignment

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the following statements define authorization?

A document signed by a patient to permit release of medical information

Select all that apply Who has the authority to authorize the release of a patient's medical information to anyone not directly involved in their care? (Select all that apply.)

A legally appointed representative The patient

A code of conduct for the members of a practice would cover which of the following? (Select all that apply.)

A policy to encourage employees to report compliance concerns to the compliance officer Procedures for ensuring compliance with laws relating to referrals Provisions for discussing compliance during performance reviews

The health system reform legislation that offers improved insurance coverage and other benefits is abbreviated as _____.

ACA

What must patients sign for use and disclosure of PHI for any reason other than TPO?

An authorization

Match the statutes or acts to their descriptions.

Antikickback statute---Makes it illegal to knowingly offer incentives referring patients for services that are paid by government healthcare programs Self-referral prohibition---Makes it illegal for physicians or their immediate family members to have financial relationships with clinics to which they refer their patients Sarbanes-Oxley Act of 2002---Requires publicly traded corporations to attest that their financial management is sound, which applies to for-profit healthcare companies

According to the OIG, voluntary compliance plans should contain which of the following? (Select all that apply.)

Appointment of a compliance officer Training Consistent written policies and procedures Appointment of a compliance committee

Which of the following tasks are outlined in compliance plans?

Audit and monitor compliance with government regulations

The main federal government agency responsible for healthcare is the _____.

Centers for Medicare and Medicaid Services

are companies that help providers handle electronic transactions.

Clearinghouses

Which of the following is included in the OIG compliance plan?

Communication

Which of the following applies to the role of the Department of Justice with regards to HIPAA?

Criminal violations of HIPAA privacy standards are prosecuted by the DOJ.

Which federal government department prosecutes criminal violations of HIPAA privacy standards?

Department of Justice

What information must be included on an authorization to release information? (Select all that apply.)

Description of the information to be disclosed Name of the person authorized to disclose the information Expiration date Name of the people to whom the disclosure is being made Purpose of the disclosure

Which of the following is an example of healthcare fraud?

Double billing a procedure that was performed once

Match the acronyms to their descriptions.

EMR--- Computerized records of one physician's encounters with a patient over the time; they are the physician's legal record of patient care. PHR---Private, secure electronic files that are created, maintained, and controlled by patients EHR---Computerized lifelong healthcare records

________are computerized records of one physician's encounters with a patient over time that are the physician's legal record of patient care.

EMRs, EMR, or Electronic medical records

__ is a method of converting a message into encoded text.

Encryption

Select all that apply Which of the following are examples of activities performed by CMS to ensure the quality of healthcare?

Evaluating the quality of healthcare services and facilities Researching the effectiveness of healthcare management Regulating lab testing Preventing discrimination based on health status

Which of the following examples constitute claims fraud?

Falsely reporting charges to payers Overcharging for services Failure to provide complete services under a contract Billing for services not performed

Which of the following is the agency that governs emergency guidance for release of information?

HHS

A covered entity is an organization that electronically transmits any information that is protected under _____.

HIPAA

Under ______ , a code set is any group of codes used for encoding data elements.

HIPAA

The law regulating the use and disclosure of patients' protected health information is called the _____.

HIPAA Privacy Rule

The _____ is a law that requires covered entities to establish safeguards to protect health information.

HIPAA Security Rule

The law promoting the adoption and use of health information technology is abbreviated as _____.

HITECH

Which of the following are covered entities that must follow HIPAA rules? (Select all that apply.)

Healthcare providers Health plans Clearinghouses

What is the purpose of healthcare fraud and abuse laws?

Help to control cheating in the healthcare system

Which of the following are true of the HITECH Act? (Select all that apply.)

It guides the use of federal stimulus money. It promotes the adoption of meaningful use of health information technology. It addresses privacy and security concerns associated with the electronic transmission of health information.

Which of the following are true of the federal False Claims Act? (Select all that apply.)

It protects relators against employer retaliation. It prohibits making fraudulent claims. It encourages reporting suspected fraud and abuse.

What must a covered entity do when a breach of unsecured PHI is discovered?

Notify the individuals whose information has been suspected of being disclosed

is the abbreviation for the government agency that prosecutes and investigates healthcare fraud?

OIG

The government agency that prosecutes and investigates healthcare fraud is the _____.

Office of the Inspector General

The _____ Rule contains regulations that enhance patient's privacy protections, and improved rights for patients top their health information.

Omnibus

Individually identifiable health information transmitted or maintained by electronic media is called _____.

PHI

What does the HIPAA Security Rule establish safeguards to protect?

PHI

Select all that apply Which of the following is documented in the patient's chart?

Patient's name Encounter date Diagnosis Plan of care

The HIPAA Standards for Privacy of Individually Identifiable Health Information Rule is also know as HIPAA _______ Rule

Privacy

Which of the following are parts of the Omnibus Rule? (Select all that apply.)

Prohibiting health plans from disclosing genetic information for determining insurance coverage Increasing civil monetary penalties for violations Restating the standards for reporting breaches Strengthening previous HIPAA/HITECH rules

Which of the following is a term used to describe whistle-blower cases?

Qui tam

Which of the following are examples of fraudulent or abusive billing acts? (Select all that apply.)

Reporting services at a higher level than were carried out Performing procedures that are not medically necessary Intentionally billing for services that were not performed or documented

After discovery of a breach of unsecured PHI, how long does a covered entity have to notify the individual(s) who would be affected?

Sixty days

Which of the following is a part of a patient's PHI?

Social security number Address Name

rules make it illegal for physicians to have financial relationships with clinics for the purpose of self referrals.

Stark

Select all that apply Which of the following are true of state regulations in healthcare?

States can restrict price increases on premiums. State laws ensure the solvency of insurance companies and managed care organizations. State commissioners of insurance investigate consumer complaints.

HIPAA Electronic Health Care Transactions and Code Sets is abbreviated as

TCS

Which of the following are rules governing the electronic exchange of health information?

TCS

Which of the following are among the five provisions (titles) of HIPAA?

Tax-Related Health Provisions Revenue Offsets Healthcare Access, Portability and Renewability Preventing Healthcare Fraud and Abuse Application and Enforcement of Group Health Plan Requirements

The revenue cycle explains how using EHRs is integrated with practice management programs as what process is performed?

Ten-step billing process

Who has the authority to authorize the release of a patient's medical information to anyone not directly involved in their care? (Select all that apply.)

The patient A legally appointed representative

Who has ownership of the actual progress notes, reports, and other clinical materials in a medical record?

The provider who created them

Select all that apply Which of the following describe the purposes of medical records? (Select all that apply.)

They help make accurate diagnoses. They trace the course of patients' care.

Match the HIPAA provisions (titles) to their descriptions.

Title I---Healthcare Access, Portability and Renewability Title II---Preventing Healthcare Fraud and Abuse; Administrative Simplification Title III---Tax-Related Health Provisions Title IV---Application and Enforcement of Group Health Plan Requirements Title V---Revenue Offsets

In which circumstances might CEs disclose PHI without the patient's consent?

To grant public health authorities access to PHI necessary to carry out their public health mission To prevent or lessen a serious threat to the health and safety of the public To treat the patient or another patient

Which of the following guidelines are helpful in conducting physician training classes? (Select all that apply.)

Use examples and facts. Explain the purpose of compliance. Develop a procedure for sharing information between trainings. Keep the presentations brief. Be straightforward in presentations.

How are the HIPAA transactions standards labeled?

With a number and a name

Select the HIPAA transaction number for referral certification and authorization.

X12 278

A network that shares responsibility for managing the quality and cost of care provided to a group of patients is called a(n) _____.

accountable care organization

The purpose of _______ logs is to record who has accessed or tried to access information.

activity

The purpose of ________ logs is to record who has accessed or tried to access information.

activity

When states ensure the solvency of insurance companies, it means the companies will _____.

be able to pay the enrollees' claims

An impermissible use or disclosure of PHI that could pose a risk to the affected person is called a(n) _____.

breach

It is considered _____ when an EHR system can provide access to the latest medical research on approved medical websites to assist with medical decision making.

clinical decision support

An alphabetic and/or numeric representation of data is called a(n) _____.

code set

A(n) ______ plan is a medical practice's written plan for complying with regulations.

compliance

To maintain _____, physicians should be regularly trained and updated in coding and regulatory matters.

compliance

The practice's code of ______. covers compliance in referral arrangements, and employee performance compliance.

conduct

An intentional deceptive act to obtain a benefit is called

fraud

In the United States, an estimated $50 billion are lost annually in healthcare as a result of ____.

fraud

A person's Social Security number is an example of a(n)

identifier

A(n) _____ is a file containing the documentation of a patient's medical history and related information.

medical record

State-specified performance measures for the delivery of healthcare are called _____.

medical standards of care

The revenue cycle merges the patient's ____________. documentation and financial/billing information in the chart.

medical, clinical, or health

Role-based access into computer records means that _____.

only those who need the information can see it

An example of confidential authentication information used to access EHR/PMP is a(n) _____.

password

Encounters take place between _____.

patients and healthcare providers

management programs encrypt data between the office and the Internet.

practice

A person who makes an accusation of fraud or abuse is called a(n) _____.

relator

The cycle that explains how using EHRs is integrated with practice management programs is called the _____ cycle.

revenue

The Employer Identification Number is also called the _____.

tax identification number

A requirement of any compliance plan includes ongoing _______

training

An electronic exchange of healthcare information is called a(n) _____.

transaction

Covered entities are those that _____.

transmit any health information in electronic form

Unprotected health information that is not secured through the use of technologies or methods that HHS has specified is called _____ PHI.

unsecured


Set pelajaran terkait

CH 5 - Accounting for Inventories

View Set

Chapter 6 Quiz: Input and Output

View Set

AP GEO Chap. 10 Key Issue 3: Where Is Agriculture Distributed?

View Set

English 1A-End of Semester Test: South Carolina English 1A

View Set