
Security & HIPAA
Quiz by Nicole Talarico
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
- Q1
The goals of HIPAA include the following : Reducing the costs associated with the administration of health care & securing the privacy of the individual healthcare information
truefalseTrue or False30s - Q2
Below is the definition PHI/ PII?
All individually identifiable health information is protected under the HIPAA Privacy Rule. Protected Health Information, or PHI, includes any data that may be used to identify the individual associated with health information. Another term to be familiar with is personally Identifiable Information, or PII, refers to information used to uniquely identity an individual, either alone or combined with other sources
truefalseTrue or False30s - Q3
True or False, we are permitted to provide brokers with member specific information upon request
falsetrueTrue or False30s - Q4
True or False, when sending an email internally or externally it’s permitted to include PHI in the subject line of an email
falsetrueTrue or False30s - Q5
1. True or False, all of the following are considered “security” best practices (True)
· Use a Password Protected Screen Saver.
· Log off and shut down your PC at the end ofthe day.
· Secure sensitive files when leaving the workarea.
· Store confidential information in a securearea
· You should always lock your workstation whennot in use
truefalseTrue or False30s - Q6
What should you do with documents that contain PHI?
Secure sensitive papers and software under lock and key. If working onsite, shred all paper documents containing protected health or confidential information on-site or place them in on-site locked recycle bins.
Throw away in bathroom garbage
Bring home to throw out
Leave on my desk
30s - Q7
1. How do you lock your computer when not in use?
Tell your friend to turn it off
You don't need to lock it, it locks on its own
Use the CTRL, ALT, DELETE keys simultaneously to lock your computer. Use procedure whenever you leave your terminal. To re-gain access, simply enter your personal password.
Turn it off
30s - Q8
In regard to Password Best Practices, which of the following statements is false?
Use a different password for every account; don’t use the same password at work and at home.
Corporate passwords should NOT contain your user account name or parts of your full name that exceed two consecutive characters.
Corporate passwords should contain your user account name or parts of your full name that exceed two consecutive characters
Avoid using personal information in your password. For example, if your dog is named Sherman, do not include “Sherman” in any of your passwords. The same goes for your sports teams and kids’ names.
30s