100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
HCCA - CHC 2 Study Questions and answers $7.99   Add to cart

Exam (elaborations)

HCCA - CHC 2 Study Questions and answers

 8 views  0 purchase
  • Course
  • HCCA - CHCP
  • Institution
  • HCCA - CHCP

HCCA - CHC 2 Study Questions and answers True or False: The ACA requires that all providers adopt a compliance plan as a condition of enrollment with Medicare, Medicaid, and Children's Health Insurance Program (CHIP).True ref. ACA section 6102 According to HHS-OIG - what are thr...

[Show more]

Preview 2 out of 5  pages

  • October 16, 2024
  • 5
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • HCCA - CHCP
  • HCCA - CHCP
avatar-seller
WorkAce
HCCA - CHCP: Breach Notification
questions and answers
Which rule requires HHS to issue interim final regulations for breach
notification?✔✔- Health Information Technology for
Economic and Clinical Health (HITECH) Act as Title XIII
of Division A and Title IV of Division B of the American Recovery and Reinvestment
Act of 2009 (ARRA) (Pub. L. 111-5). Subtitle D of the HITECH Act (the Act), entitled
''Privacy,'' among other provisions

Which government agency handles Personal Health Records (PHR)?✔✔FTC

Access✔✔ability or means necessary to read,
write, modify, communicate, or otherwise use data/information.

Authorized Person✔✔individual authorized by the entity or the entity's Business
Associate
to acquire, access, or use Protected Health Information ("PHI") that is within the
individual's scope of employment

Limited Data Set.✔✔PHI that excludes 16 specific
identifiers as defined in the HIPAA Privacy Rule, but includes:
- zip codes
- geographical codes
- dates of birth
- other date information
- any other
code.

Organized Healthcare Arrangement✔✔A clinically integrated care setting in which
individuals typically receive health care from more than one provider

Unauthorized✔✔An impermissible use or disclosure
of PHI under the HIPAA Privacy Rule

Unauthorized Access✔✔inappropriate viewing of a patient's medical or financial
information
without a direct need for diagnosis, treatment, payment, or other lawful use.

Unsecured Protected Health Information✔✔PHI that is not secured through the use
of a technology or methodology that renders PHI "unusable, unreadable, or
indecipherable to unauthorized"
- encryption

, _ destruction

Protected Health Information ("PHI")✔✔Individually identifiable health information
that is
(i) transmitted by electronic media
(ii) maintained in any medium such as magnetic tape, disc, optical file
(iii) transmitted or maintained in any other form or medium
(including but not necessarily
limited to paper, voice, Internet, or facsimile).

Workforce Member✔✔Employees, volunteers, students, medical residents, trainees,
and other
persons whose conduct, in the performance of work for an entity, is under the direct
control of the entity, whether or not they are paid by the
entity

Breach (as defined in HITECH 164.402✔✔The acquisition, access, use, or
disclosure of protected health information in a manner not permitted
under subpart E of this part which compromises the security or privacy of the
protected health information

Harm✔✔means poses a significant risk of financial, reputational, or other harm to the
individual.

PHI identifiers✔✔• Name
• Date of Birth or any other date smaller than a year
• Any elements of dates smaller than a year (i.e., date of admission, discharge,
death, etc.)
• Zip Code
• Medical Record Number
• Device Identification Numbers
• Social Security Number
• Any geographic subdivision smaller than a state
• Phone Numbers
• Fax Numbers
• E-mail Addresses
• Health Plan Beneficiary Number
• Any other Account Number
• Certificate/License Numbers
• Vehicle Identifiers
• WEB URLs
• Internet IP Address Numbers
• Full face photographs or comparable images
• Biometric Identifiers (fingerprint, voice prints,
retina scan, etc.)
• Any other unique number, characteristic or code

Unsecured Protected Health Information✔✔health information that is not rendered

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller WorkAce. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $7.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

83637 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$7.99
  • (0)
  Add to cart