Hipaa Regulations Override Any State Laws
30 community-sourced questions and answers. Free — no login.
In a hospital, the obligation to maintain confidentiality applies to _____.
All medical and personal information
HIPAA regulations override any state laws which demand stricter privacy.
False
In a conversation, enough information to identify patients may be revealed, even if patient names are not used.
True
Among the permitted disclosures that do not require patient permission are reporting:
All of the above
Which of the following are types of data security safeguards?
All of the above
Of the following types of conversations about patients, the one(s) that constitute(s) a violation of patient privacy is:
All of the above
The _______________ is responsible to see that all healthcare workers are familiar with HIPAA and its privacy rule, and familiar with all the policies and procedures used to guard protected health information in the facility.
Privacy officer
The coming of computers in medicine has ______.
Created new dangers for breach of confidentiality
The issue of "healthcare portability" focused on protecting healthcare coverage for employees who change jobs and allowing them to carry their existing plans with them.
True
Title I of HIPAA covers:
All of the above
The Privacy rule states that protected health information can be data that is written, spoken, or in electronic form.
True
At the extreme, anyone caught selling private health care information can be fined up to:
$250,000 and 10 years in prison
In an open computer network such as the internet, HIPAA requires the use of _____. In a closed system such as a local area network, HIPAA allows _____ as controls.
Data encryption; Sign-on codes and passwords
One exception to confidentiality is ____.
A gunshot wound
The term "ICD-10-CM" refers to 10th Independent Categorization of disease factors.
False
The Department of Health and Human Services considers the HIPAA security standards to be a maximum standard
False
The goal of your organization's information security program is to protect the confidentiality, integrity, and availability of each patient's health information.
True
The ____(Fill in the blank) ____ is a unique ten-digit alphanumeric.
National provider identifier NPI
The standardization of all codes has begun to make the electronic transfer of healthcare data:
Smoother and more accurate
One of the requirements of the Security Rule is to:
Protect against all reasonably anticipated threats or hazards to the security of electronic protected health information
The most common privacy violations were impermissible disclosures to unauthorized persons, often in casual conversation.
True
One good rule to prevent unauthorized access to computer data is to ____.
Blank the screen or turn off the computer when you leave it
The security rule deals specifically with protecting ___(fill in the blank)__ data.
Electronic
The Administrative Safeguards are largely handled by a facility's __________.
Administrators and privacy officer
As the first incremental step in healthcare reform, Congress passed the HIPAA act in:
1996
In general, information about a patient can be shared _____ .
When it is directly related to treatment
In general, a written HIPAA privacy notice contains:
All of the above
Title I promotes renewability of coverage by prohibiting employee health plans from denying coverage to new employees based on all but which of the following?
Medical inaccuracies
The privacy and data security portions of the Health Insurance Portability and Accountability Act (HIPAA) was passed _____.
In 1996
Technical Safeguards are used to protect information through the use of which of the following?
Encryption and Authentication programs.
Looking for a different version?
CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").
Search all study materials