Health & SafetyAnswer Key

Under Hipaa A Person Or Entity That Provides Services

15 community-sourced questions and answers. Free — no login.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
QUESTION 1

T/F? Under HIPAA, a person or entity that provides services to a CE that do not involve the use or disclosure of PHI would be considered a BA.

ANSWER

False

QUESTION 2

Do Betty's actions in this scenario constitute a HIPAA Privacy rule violation?

ANSWER

Yes because John is not a physician and therefore not entitled to review any medical files

QUESTION 3

A friend of Phillip Livingston, a military service member who is being treated for a broken leg at Valley Forge MTF, asked what room Phillip is in so that he can visit. Which of the following is required?

ANSWER

The patient must be given an opportunity to agree or object to the use or disclosure

QUESTION 4

The Chief Medical Officer for Valley Forge MTF utilizing PHI is conducting a monthly physician peer review operations exercise. Which of the following is required?

ANSWER

Neither an authorization nor an opportunity to agree or object is required

QUESTION 5

Abigail Adams is a TRICARE beneficiary and patient at Valley Forge MTF and is applying for Sun Life Insurance. Sun Life has requested some of Abigail's medical records in order to evaluate her application. Which of the following is required?

ANSWER

An authorization is required

QUESTION 6

Dr. Jefferson sends a patient's medical record to the surgeons office in support of a referral for treatment he made for the patient. Which of the following is required?

ANSWER

Neither an authorization nor an opportunity to agree or object is required

QUESTION 7

Valley Forge MTF discloses a patient's information in response to a request from HHS in the investigation of a patient complaint. Which of the following is required?

ANSWER

Neither an authorization nor an opportunity to agree or object is required

QUESTION 8

Did Valley Forge MTF handle George's request appropriately?

ANSWER

No, because the MTF is required to respond to George in writing, providing an accounting of certain disclosures going back 6 years from the date of the request

QUESTION 9

How should John advise the staff member to proceed?

ANSWER

Both B and C

QUESTION 10

Was this a violation of HIPAA security safeguards?

ANSWER

Yes

QUESTION 11

What enforcement actions may occur based on Janet's conduct?

ANSWER

All the above

QUESTION 12

How should John respond?

ANSWER

Yes. Privacy Act Statements and a SORN should both be considered prior to initiating the research project

QUESTION 13

Major Edmund Randolph, an active member of the United States Air Force, recently discovered through a publicnotice that his PII is being maintained by the federal government in a system of records. Because Major Randolph isvery diligent about safeguarding his personal information and is aware of how this information could bevulnerable, he is interested in obtaining a copy and reviewing them for accuracy. Is Major Randolph able to obtain acopy of his records from the system of records and request changes to ensure that they are accurate?

ANSWER

Yes, Major Randolph is able to request to inspect and copy his records and can request an amendment to correct inaccurate information.

QUESTION 14

George is reminded of a conversation he overheard between two co-workers who were contemplating selling some old Valley Forge MTF computers instead of disposing of them through the MTF's IT department. With reason to believe Alexander is telling the truth as to the computers and PHI in his possession, what is the appropriate course of action for George?

ANSWER

George should immediately report the possible breach to his supervisor and assist in providing any relevant information for purposes of the investigation

QUESTION 15

Is Carla's time saving measure appropriate provided she only sends unencrypted emails on occasion?

ANSWER

No, because unencrypted emails containing PHI or PII may be intercepted and result in unauthorized access

Looking for a different version?

CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").

Search all study materials