Screen 44
Introduction 97_C_43 |
The Knowledge Check consists of 10 questions. You must score 80% or higher to successfully complete this course. When you are ready, click the Knowledge Check button to begin. |
Screen 45
Question 1: Scenario 98_C_44 |
Which of the following are examples of HIPAA privacy violations? Check all that apply. |
Screen 45
Question 1: Options 99_C_44 |
[1] Providing a Health Care Provider with patient information for treatment purposes. [2] Providing an incorrect ID card to a patient. [3] Discussing patient information with a friend at lunch. [4] Sending PHI via encrypted email to an authorized recipient. |
Screen 45
Question 1: Feedback 100_C_44 |
Information may be securely disclosed to Health Care Providers providing treatment and to authorized recipients. It’s not okay to discuss Protected Health Information with an unauthorized recipient. Always verify the recipient of PHI before disclosing any information or patient ID cards. For more information about the correct answer, see Section 2.1, What is Protected Health Information? |
Screen 45
Question 2: Scenario 101_C_44 |
To what extent can you use, access, and disclose PHI? |
Screen 45
Question 2: Options 102_C_44 |
[1] The minimum degree necessary required for payment and healthcare operations. [2] To the minimum degree necessary to ensure a profit for our organization. [3] Generally, if you can access PHI, you can use it. [4] All of the above. |
Screen 45
Question 2: Feedback 103_C_44 |
The minimum necessary standard requires that PHI accessed, used, or disclosed is limited to the minimum amount necessary for the intended purpose, with the exception of treatment. For more information about the correct answer, see Section 3.2, Minimum Necessary Standard. |
Screen 45
Question 3: Scenario 104_C_44 |
You receive a document containing an individual’s name, address, e-mail address, device implant date, and model and serial number of device. Which of the information is considered PHI? |
Screen 45
Question 3: Options 105_C_44 |
[1] Device implant date. [2] Model and serial number of device. [3] All of the information is PHI. [4] None of the information is PHI. [5] Name, address, and e-mail address. |
Screen 45
Question 3: Feedback 106_C_44 |
An individual’s name, address, e-mail address, device implant date, and model and serial number of device are all considered PHI. For more information about the correct answer, see Section 2.1, What is Protected Health Information? |
Screen 45
Question 4: Scenario 107_C_44 |
You receive a call regarding a privacy concern. What should you do? |
Screen 45
Question 4: Options 108_C_44 |
[1] Try to resolve the situation. [2] Direct the concern to your local Privacy Steward or the Privacy Office. [3] Determine if it’s a valid concern and then report it to the appropriate department. [4] Nothing. Privacy concerns are a normal part of our business. |
Screen 45
Question 4: Feedback 109_C_44 |
If a privacy concern is received, you should direct the concern to your local Privacy Steward or Abbott’s Privacy Office as soon as possible. For more information about the correct answer, see Section 4.4, Reporting Your Concerns. |
Screen 45
Question 5: Scenario 110_C_44 |
What’s your responsibility in protecting PHI? Check all that apply. |
Screen 45
Question 5: Options 111_C_44 |
[1] To know and follow our organization’s HIPAA security and privacy policies for safeguarding PHI. [2] To know what PHI is and report all violations to the Privacy Office. [3] None. I don’t ever work with PHI. |
Screen 45
Question 5: Feedback 112_C_44 |
All Abbott personnel have a responsibility to protect PHI. Understanding and following Abbott’s HIPAA privacy and security policies help to safeguard an individual’s personal information. For more information about the correct answer, see Section 2.2, Understanding Your Responsibilities. |
Screen 45
Question 6: Scenario 113_C_44 |
When you comply with HIPAA, you support an individual’s right to determine who can access their PHI and ensure that PHI is only provided to authorized recipients. Check all that apply. |
Screen 45
Question 6: Options 114_C_44 |
[1] Abbott will verify the identity of an authorized recipient before disclosing PHI. [2] Individuals have legal rights regarding who can access their PHI. [3] Abbott has the final say in who can access our patients and customer’s PHI. |
Screen 45
Question 6: Feedback 115_C_44 |
When you comply with HIPAA, you support an individual’s right to determine who can access their PHI and ensure that PHI is only provided to authorized recipients. For more information about the correct answer, see Section 2.3, Individuals have Rights. |
Screen 45
Question 7: Scenario 116_C_44 |
Under HIPAA rules, an individual has the right to request which of the following: |
Screen 45
Question 7: Options 117_C_44 |
[1] A copy of their health record. [2] Corrections to their health record. [3] Restrictions on the disclosure of their PHI. [4] All of the above. |
Screen 45
Question 7: Feedback 118_C_44 |
An individual has the right to request a copy of their health record, corrections to their record, and restrictions on the disclosure of their PHI. For more information about the correct answer, see Section 2.3, Individuals have Rights. |
Screen 45
Question 8: Scenario 119_C_44 |
You are only responsible for securing electronic forms of PHI. |
Screen 45
Question 8: Options 120_C_44 |
[1] True. Having conversations about PHI is just part of our business and requires no security controls. [2] False. Reasonable safeguards need to be taken to secure all PHI, regardless of form. |
Screen 45
Question 8: Feedback 121_C_44 |
All forms of PHI require that you follow Abbott’s practices for safeguarding PHI. For more information about the correct answer, see Section 4.2, Securing PHI. |
Screen 45
Question 9: Scenario 122_C_44 |
As you scan your badge to enter a restricted area, a coworker approaches you and asks you to hold the door. Should you let them follow you in? |
Screen 45
Question 9: Options 123_C_44 |
[1] Yes, as long as you’re sure she works at Abbott. [2] Yes, as long as she says she’s authorized to work in that area. [3] Yes, as long as she has an employee badge. [4] No, all employees need to scan their badges to enter a restricted area. |
Screen 45
Question 9: Feedback 124_C_44 |
Regardless of the individual, or their level of authority, Abbott requires all employees use their badge when entering a restricted area. For more information about the correct answer, see Section 4.3, Potential Violations & Consequences. |
Screen 45
Question 10: Scenario 125_C_44 |
Most states have created their own medical privacy laws. Does this mean they are exempt from complying with HIPAA? Check all that apply. |
Screen 45
Question 10: Options 126_C_44 |
[1] Yes. HIPAA only applies if a state does not have privacy laws aimed at protecting PHI. [2] No. HIPAA applies to all states, regardless of whether they have medical privacy laws that are separate from HIPAA. |
Screen 45
Question 10: Feedback 127_C_44 |
HIPAA applies to all states. However, the general standard is that if a state’s law is more protective of individual’s PHI, companies are required to adhere to both HIPAA and the state’s additional requirements. For more information about the correct answer, see Section 2.4, State-Specific Privacy Laws. All questions remain unanswered |
Screen 46
Overall Feedback 128_C_45 |
No results are available, as you have not completed the Knowledge Check. Congratulations! You have successfully passed the Knowledge Check and completed the course. Please review your results below by clicking on each question. Once you are done, you must click the EXIT [X] icon in the course title bar before closing your browser window or browser tab. Sorry, you did not pass the Knowledge Check. Take a few minutes to review your results below by clicking on each question. When you are done, click the Retake Knowledge Check button. |