<< Prev Question Next Question >>

Question 9/90

A doctor sends patient records to another company for data entry services. A bonded delivery service is used for the transfer. The records are returned to the doctor after entry is complete, using the same delivery service. The entry facility and the network they use are secure. The doctor is named as his own Privacy Officer in written policies. The doctor has written procedures for this process and all involved parties are documented as having been trained in them The doctor does not have written authorizations to disclose Protected Health Information (PHI). Is the doctor in violation of the Privacy Rule?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (90q)
Question 1: An Electronic Medical Record (EMR):...
Question 2: Select the correct statement regarding the Notice of Privacy...
Question 3: Select the correct statement regarding the administrative re...
Question 4: Select the FALSE statement regarding the administrative requ...
Question 5: The Health Care Claim Status Response (277) can be used in a...
Question 6: Security reminders, using an anti-virus program on workstati...
Question 7: The security standard that has the objective of implementing...
Question 8: A covered entity' that fails to implement the HIPAA Privacy ...
Question 9: A doctor sends patient records to another company for data e...
Question 10: This transaction, which is not a HIPAA standard, may be used...
Question 11: In an emergency treatment situation, a health care provider:...
Question 12: When PHI is sent or received over an electronic network ther...
Question 13: This code set is used to describe or identity radiological p...
Question 14: Which of the following is a required implementation specific...
Question 15: This transaction is the response to a Health Care Claim (837...
Question 16: The code set that must be used to describe or identify outpa...
Question 17: Which one of the following is a required implementation spec...
Question 18: Physical access to workstations such as, whether or not pati...
Question 19: Policies requiring workforce members to constantly run an up...
Question 20: A business associate:
Question 21: Some of the information that an authorization must include i...
Question 22: This transaction type is a "response" transaction that may i...
Question 23: A grouping of functional groups, delimited by a header/trail...
Question 24: Title 1 of the HIPAA legislation in the United States is abo...
Question 25: The code set that must be used to describe or identify denti...
Question 26: Select the FALSE statement regarding the responsibilities of...
Question 27: The State of Nebraska's Medicaid Program has decided to impl...
Question 28: Information in this transaction is generated by the payer's ...
Question 29: The National Provider File (NPF) includes information such a...
Question 30: HIPAA establishes a civil monetary penalty for violation of ...
Question 31: The objective of this HIPAA security standard is to implemen...
Question 32: Patient identifiable information may include:...
Question 33: This transaction is typically used in two modes: update and ...
Question 34: This security standard requires that the covered entity esta...
Question 35: The key objective of a contingency plan is that the entity m...
Question 36: When submitting a Health Care Claim Status Request, it is im...
Question 37: Select the correct statement regarding code sets and identif...
Question 38: This rule covers the policies and procedures that must be in...
Question 39: This code set describes drugs:
Question 40: A provider is in compliance with the Privacy Rule. She has a...
Question 41: The Security Rule requires that the covered entity identifie...
Question 42: Formal, documented instructions for reporting security breac...
Question 43: Select the correct statement regarding the definition of the...
Question 44: As part of their HIPAA compliance process, a small doctor's ...
Question 45: The National Provider Identifier (NPI) will eventually repla...
Question 46: A covered entity that fails to implement the HIPAA Privacy R...
Question 47: The Security Incident Procedures standard requires just one ...
Question 48: Select the best statement regarding the definition of the te...
Question 49: The Data Backup Plan is part of which Security Standard?...
Question 50: ANSI X12 specifies the use of a (an):...
Question 51: The office manager of a small doctor's office wants to donat...
Question 52: Select the best statement regarding the definition of protec...
Question 53: Which one of the following security standards is part of Tec...
Question 54: Within the context of a transaction set, the fields that com...
Question 55: The National Provider Identifier (NPI) will eventually repla...
Question 56: To comply with the Final Privacy Rule, a valid Notice of Pri...
Question 57: Which of the following is example of "Payment" as defined in...
Question 58: Select the correct statement regarding the responsibilities ...
Question 59: The objective of this document is to safeguard the premises ...
Question 60: Which of the following is NOT a HIPAA national health care i...
Question 61: HIPAA Security standards are designed to be:...
Question 62: The Final Privacy Rule requires a covered entity to obtain a...
Question 63: An Electronic Medical Record (EMR):...
Question 64: Select the FALSE statement regarding code sets and identifie...
Question 65: Select the best example of a business associate (if they had...
Question 66: Individually identifiable health information (IIHI) includes...
Question 67: A key date in the transaction rule timeline is:...
Question 68: The implementation specifications for this HIPAA security st...
Question 69: One mandatory requirement for the Notice of Privacy Practice...
Question 70: The transaction number assigned to the Payment Order/Remitta...
Question 71: Signed authorization forms must be retained:...
Question 72: A business associate must agree to:...
Question 73: Select the FALSE statement regarding the X12N Implementation...
Question 74: Select the correct statement regarding the requirements of H...
Question 75: Which of the following is example of "Payment" as defined in...
Question 76: A pharmacist is approached by an individual and asked a ques...
Question 77: Select the best statement regarding de-identified informatio...
Question 78: Workstation Use falls under which Security Rule area?...
Question 79: Which HIPAA Title is fueling initiatives within organization...
Question 80: Select the correct statement regarding the requirements for ...
Question 81: In terms of Security, the best definition of "Access Control...
Question 82: Dr. Jones, a practicing dentist, has decided to directly imp...
Question 83: This security rule standard requires policies and procedures...
Question 84: Which of the following is NOT a correct statement regarding ...
Question 85: Use or disclosure of Protected Health Information (PHI) for ...
Question 86: Within the context of a transaction set, the fields that com...
Question 87: Select the best statement regarding the definition of a busi...
Question 88: Select the best statement regarding organized health care ar...
Question 89: Select the FALSE statement regarding violations of the HIPAA...
Question 90: This is a documented and routinely updated plan to create an...