placeholder image to represent content

Security & HIPAA

Quiz by Nicole Talarico

Our brand new solo games combine with your quiz, on the same screen

Correct quiz answers unlock more play!

New Quizalize solo game modes
8 questions
Show answers
  • Q1

    The goals of HIPAA include the following : Reducing the costs associated with the administration of health care &  securing the privacy of the individual healthcare information

    true
    false
    True or False
    30s
  • Q2

    Below is the  definition PHI/ PII?

    All individually identifiable health information is protected under the HIPAA Privacy Rule. Protected Health Information, or PHI, includes any data that may be used to identify the individual associated with health information. Another term to be familiar with is personally Identifiable Information, or PII, refers to information used to uniquely identity an individual, either alone or combined with other sources

    true
    false
    True or False
    30s
  • Q3

    True or False, we are permitted to provide brokers with member specific information upon request

    false
    true
    True or False
    30s
  • Q4

    True or False, when sending an email internally or externally it’s permitted to include PHI in the subject line of an email

    false
    true
    True or False
    30s
  • Q5

    1.    True or False, all of the following are considered “security” best practices (True)

     

    ·       Use a Password Protected Screen Saver.

    ·       Log off and shut down your PC at the end ofthe day.

    ·       Secure sensitive files when leaving the workarea.

    ·       Store confidential information in a securearea

    ·       You should always lock your workstation whennot in use

    true
    false
    True or False
    30s
  • Q6

    What should you do with documents that contain PHI?

    Secure sensitive papers and software under lock and key.  If working onsite, shred all paper documents containing protected health or confidential information on-site or place them in on-site locked recycle bins.

    Throw away in bathroom garbage 

    Bring home to throw out

    Leave on my desk

    30s
  • Q7

    1.    How do you lock your computer when not in use?

    Tell your friend to turn it off

    You don't need to lock it, it locks on its own

    Use the CTRL, ALT, DELETE keys simultaneously to lock your computer. Use procedure whenever you leave your terminal. To re-gain access, simply enter your personal password.

    Turn it off

    30s
  • Q8

    In regard to Password Best Practices, which of the following statements is false?

    Use a different password for every account; don’t use the same password at work and at home.

    Corporate passwords should NOT contain your user account name or parts of your full name that exceed two consecutive characters.

    Corporate passwords should contain your user account name or parts of your full name that exceed two consecutive characters

    Avoid using personal information in your password. For example, if your dog is named Sherman, do not include “Sherman” in any of your passwords. The same goes for your sports teams and kids’ names.

    30s

Teachers give this quiz to your class