Nau Bloodborne Pathogen Training
48 community-sourced questions and answers. Free — no login.
MODULE 1
module 1 of this ƒu©king trash
protected health information includes which of the following
all of the above
when can a family member or close personal friend act as a representative of the patient
they have legal authority to act on behalf of the patient
a business associate is
all of the above
what could happen if you violate hipaa laws
all of the above
your responsibility for confidentiality ends with your time with this employer, preceptor site, and/or volunteer site
false
which of the following does "minimum necessary" not apply to
all of the above
MODULE 2
report the breach to the privacy officer
if a breach involved your supervisor and you weren't comfortable speaking to them about it, you should
false
there are limits on the proper use or disclosure of patient information for the purpose of treatment
the university privacy officer
to whom must you report a privacy or security breach
false
a patient has to authorize the disclosure of their information to their health plan
false
hipaa prevents us from complying with legal mandated disclosures of information. for example, in the case of abuse
false
a patient has to authorize disclosure of information to law enforcement agencies
true
a patient can request that a particular service not be billed to their insurance company
always report breaches to your supervisor or privacy officer
when are you required to report a breach
true
a breach is the unauthorized acquisition, access, use, or disclosure of the PHI which compromises the privacy or security of such information
false
the organization can penalize you for reporting a breach
all of the above
MODULE 3
false
the Notice of Privacy Practices does which of the following
all of the above
a patient has to be given a notice one ach visit prior to medical treatment
true
we don't require authorization for the use and disclosure of information for which of the following
true
a patient has to sign the acknowledgement or a staff remember must document why the patient did not sign
true
a patient can restrict use and disclosure of their protected health information but we are not required to agree with the request
true
MODULE 4
false
the authorization a patient signs has to specify the information an purpose of the disclosure
true
the authorization has to identify who will use or receive this information
false
the patient has to authorize disclosure of information to his or her self
false
psychotherapy notes require an authorization for release
true
MODULE 5
true
all uses and disclosures have to be included in an accounting
true
disclosures of the patients health plan have to be included in an accounting
true
authorized disclosures do not have to be included in an accounting
true
disclosures to police and law enforcement agencies have to be include in accounting
true
MODULE 6
true
a patient can examine his or her medical chart or other information we keep
true
a patient can obtain a copy of information in his or her medical chart
true
patient have to request information from their records in writing
false
corrections in patient information have to be transmitted to past recipients of the incorrect information
Hep c HIV Hep b
MODULE 7
all of the above
every time you leave your workstation, even for a moment, you should lock your workstation
true
the accidental destruction of information is a security problem
all of the above
the most serious threat to security is failure to follow the policies and procedures that have been designed to safeguard the security of information and is the leading cause of security breaches
hep b
antivirus software should always be turned off
never recapping a needle
you are liable for what is done on the system under your sign-on and password
true
BLOOD BORNE PATHOGEN
false but should be true smh
which of the following infectious agents are blood borne pathogens
true
the definition of other potentially infectious materials (OPIM) is
all of the above
Looking for a different version?
CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").
Search all study materials