100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
RHIA Domain 2 Exam | Questions And Answers Latest {} A+ Graded | 100% Verified $13.48   Add to cart

Exam (elaborations)

RHIA Domain 2 Exam | Questions And Answers Latest {} A+ Graded | 100% Verified

 4 views  0 purchase
  • Course
  • Top Academic Resources 2024/2025
  • Institution
  • Top Academic Resources 2024/2025

RHIA Domain 2 Exam | Questions And Answers Latest {} A+ Graded | 100% Verified

Preview 3 out of 19  pages

  • August 25, 2024
  • 19
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • Top Academic Resources 2024/2025
  • Top Academic Resources 2024/2025
avatar-seller
oneclass
RHIA Domain 2 Exam | Questions And Answers Latest {2024- 2025} A+ Graded | 100%
Verified




One best practice to follow in order to establish safeguards for the security and confidentiality of a
patient's information when a person makes a request for his or her records in person is to



- refer the requester to the facility's attorney.

- charge an exorbitant fee.

- ask the requester for identification and the request in writing.

- refuse the request. - ask the requester for identification and the request in writing.



Before an employee can be given access to the EHR, someone has to determine what the employee is
allowed to have access to. What is this known as?



- authentication

- workforce clearance procedure

- authorization

- health care clearinghouse - workforce clearance procedure



Which of the following is an example of a security incident?



- A handheld device was left unattended on the crash cart in the hall for 10 minutes.

- An employee took home a laptop with unsecured PHI.

- A hacker accessed PHI from off site.

- Temporary employees were not given individual passwords. - A hacker accessed PHI from off site.



HIM personnel charged with the responsibility of bringing a medical record to court would ordinarily do
so in answer to a



- deposition.

,- personal subpoena.

- judgment.

- subpoena duces tecum. - subpoena duces tecum.



Substance abuse records cannot be redisclosed by a receiving facility to another health care facility
unless the



- physician signs the DNR form.

- patient expires at the receiving facility.

- patient gives written consent.

- charge nurse signs the release form. - patient gives written consent.



John is a 45-year-old male who is mentally retarded. Who can authorize release of his health record?



- John

- legal guardian

- John's sister

- executive of his will - legal guardian.



Your facility is archiving scanned records for long-term storage on optical disk. The Disaster Recovery
Committee has recommended that copies of the disks be stored



- in a separate department within the facility.

- in a locked file maintained in the administrative offices.

- at a remote location.

- in a clinic on the hospital campus. - at a remote location.



Which of the following health care systems have to comply with the requirements of the Freedom of
Information Act?

, - physicians' offices

- veterans' hospitals

- private hospitals

- single-day surgery clinics - veterans' hopsitals



A valid authorization for the disclosure of health information should not be



- dated prior to discharge of the patient.

- in writing.

- signed by the patient.

- addressed to the health care provider. - dated prior to discharge of the patient.



The proper method for correcting a documentation error in a medical record is for the author to



- white it out, date, and initial the change.

- draw an "X" through the incorrect documentation.

- draw a single line through the incorrect information, date, and initial the change.

- remove the form from the chart and add a revised form. - draw a single line through the incorrect
information, date, and initial the change.



The HIM director received an e-mail from the technology support services department about her e-mail
being full and asking for her password. The director contacted tech support and it was confirmed that
their department did not send this e-mail. This is an example of what type of malware?

- phishing

- spyware

- denial of service

- virus - phishing.



A mechanism to ensure that PHI has not been altered or destroyed inappropriately has been
established. This process is called

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller oneclass. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $13.48. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

67866 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$13.48
  • (0)
  Add to cart