1- __________ is an individual's constitutional right to be left alone and to limit access to his or her health care information.
2- __________ relies on trust that information shared with a health care provider during the course of treatment will be used only for its intended purpose and not disclosed otherwise.
3- Which of the following is NOT one of the key sources regarding legal protection of an individual's health information?
4- Which law was written specifically to protect patient confidentiality only in federally operated health care facilities, such as Veterans Administration hospitals, Indian Health service facilities, and military health care organizations?
5- Which HIPAA rule was added as part of the HITECT Act in 2009?
6- Which of the following elements is NOT required on a valid release of information form?
7- Which of the following is a standard of the HIPAA Security Administrative Safeguards?
8- Which standard related to the HIPAA Security Physical safeguards requires the CE to implement policies and procedures for the movement of hardware and electronic media that contain ePHI into and out of the facility and within a facility?
9- Which of the following is NOT a specification of the access control standard related to the HIPAA Security Technical Safeguards?
10- If a breach of unsecured protected health information occurs, all of the following should be notified except:
11- __________ is a general term for software that is written to "infect" and subsequently harm a computer system.
12- __________ are a type of virus specifically designed to look like a safe program.
13- According to the text, what is the primary challenge of developing an effective security program in a health care organization?
14- All of the following are components that should be addressed in anorganization's security action plan except:
15- According to the text, what is the cause of 41% of all data breaches?
16- __________ protect systems that utilize the Internet from intrusions and threats from outside sources.
17- Which of the following is NOT characteristic of a strong password?
18- Which of the following is an action taken to limit network access?
19- Which of the following is NOT a component of the NIST cybersecurity framework?
20- Which of the following is NOT one of the five concurrent and continuous functions the Framework Core?
Powered by Issa Aldababseh