Starting from:

$2.90

BUSI 302 Chapter 8 Reading Assignment solutions complete answers

BUSI 302 Chapter 8 Reading Assignment solutions complete answers 

 

Suits brought under the False Claims Act are most often related to these industries?

 

All     are required to post and distribute an NPP.

 

Under HIPAA disclosure to patients, what must be included when talking to the patient?

 

What forms of PHI are protected under HIPAA's Standard 2?

 

What are some examples of maintaining confidentiality?

 

What are some examples of what can happen when a physician gives out privileged information?

 

The U.S. Supreme Court has drawn the right to privacy from        different Amendments to the Constitution.

 

Which amendment states that Congress cannot prohibit or abridge free speech?

 

The Third Amendment protects which of the following types of privacy?

 

Which amendment gives people the right to secure their persons, houses, papers, and effects against unreasonable searches and seizures?

 

The Fifth Amendment not only discusses the Miranda warning but also requires what to occur as it relates to the law?

 

Which of the following is true regarding privacy and the U.S. Constitution?

 

Which of the following protects against government discrimination based on religion?

 

What is the philosophy that provides rights under the Fourteenth Amendment?

 

Which amendment says that soldiers cannot be quartered in private homes without the consent of the owner?

 

Concern about        has led to the enactment of federal and state laws regarding personal data.

 

What do people have a right to be secure in when considering the Fourth Amendment?

 

Which amendment offers the right to remain silent when arrested (Miranda rights)?

 

What must be offered when collecting data about a patient?

 

HIPAA provides for what type of sanctions for violation of the law?

 

What is the Amendment that speaks to providing rights for citizens that are at least equal to those in the U.S. Constitution?

 

Who governs the collection, storage, transmission, and disclosure of patient information?

 

Who must authorize the release of personal information when an organization is collecting data?

 

What law, passed in 1996, specifically deals with the privacy of the medical record?

 

All states have laws governing the        of medical records but laws vary greatly from state to state.

 

What law guarantees that workers who change jobs can obtain health care insurance?

 

If a state has privacy laws that are stricter than HIPAA privacy standards, the state laws take precedence under which concept?

 

Physicians and other health care professionals have an ethical and legal duty to safeguard a patient’s        and maintain       .

 

Examples of privileged communication include which of the following?

 

Which of the following are legally required disclosures?

 

Match each of the Federal Privacy Laws with its purpose.

 

What does privileged communication refer to?

 

How can privileged communication statutes vary?

 

What are ways to protect confidential information when using a fax machine?

 

Which of the following is a violation of confidentiality?

 

       may be waived in specific circumstances.

 

What precautions should be taken when using a photocopier?

 

Match the HIPAA standard on the left with the correct description on the right.

 

What is information that contains one or more patient identifiers called?

 

Which of the following are examples of when confidentiality can be waived?

 

What does de-identify mean?

 

To avoid technology threats to confidential information, which of the following are good practices to follow when using computers?

 

How many standards are contained within HIPAA’s provisions?

 

HIPAA’s Standard 2 says that protected health information (PHI) must be protected against              .

 

Which of the following are considered to be patient identifiers?

 

What are health care providers who conduct administrative and financial transactions in electronic form called?

 

What is another name for HIPAA’s Standard 2?

 

In addition to health care professionals, who else must comply with HIPAA's Privacy Rule in a health care setting?

 

If PHI is sent outside a health care facility for legitimate business or health care reasons it has been       .

 

Protected health information includes the documentation of the        of health care.

 

Under the disclosure to patients, what must be included when talking to the patient?

 

Which of the following are considered covered entities?

 

What is a legal reason for each use and disclosure called as it relates to the Privacy Rule?

 

HIPAA        that PHI be disclosed to any patient who asks to see his or her own medical records unless there is a belief that it will do harm to the patient.  

 

PHI disclosures for which of these purposes require written authorization?

 

How can the uses and disclosures with opportunity to agree or object permission be obtained under HIPAA?

 

Which of the following clarifies when disclosures are permitted without authorization from patients?

 

Disclosure under treatment, payment, and health care operations is permitted for which of the following reasons?

 

Which of the following will allow disclosure under the public interest and benefit activities permission?

 

What HIPAA permission includes that covered entities generally may make uses and disclosures if it is determined to be in the best interest of the individual in an emergency situation?

 

An example of incidental use and disclosure of PHI is when clinics ask patients to              . 

 

What is protected health information from which certain patient identifiers have been removed called?

 

Which HIPAA permission allows the use and disclosure of protected health information without an individual's authorization or permission for 12 national priority purposes?

 

What are patients' rights under the HIPAA Privacy Rule?

 

What must a Notice of Privacy Practices include?

 

Provided the recipient enters into an agreement promising specific safeguards for PHI, in what instances can a limited data set be used and disclosed?

 

What did all public and private health care providers have to adopt and demonstrate in order to keep their existing Medicare and Medicaid reimbursement levels? 

 

Under the HIPAA Privacy Rule, which of the following does not require documentation?

 

What must a covered entity provide clear direction on in their Notice of Privacy Practices?

 

Who enforces the Security Rule?

 

The Security Rule requires all covered entities to do which of the following?

 

What changes did the American Recovery and Reinvestment Act make to HIPAA? 

 

In order to be HIPAA compliant, in a disaster, where should data be stored?

 

The Security Rule        the protections set forth in the Privacy Rule.

 

What is it called when covered entities evaluate the likelihood and impact of potential risks to the PHI?

 

In order for both public and private health care providers to be eligible to keep their existing Medicare and Medicaid reimbursement levels, they need to adequately demonstrate               of an EMR.

 

A covered entity is not HIPAA-compliant if it has not taken basic steps to prepare for       . 

 

What other entity does the HITECH Rule specify that breaches may be reported to in addition to the Department of Health and Human Services?

 

When was the HHS Office of Civil Rights (OCR) first charged with maintaining a database of PHI breaches and investigating these matters?

 

What is the name of a section of the American Recovery and Reinvestment Act that strengthened certain HIPAA privacy and security provisions?

 

In 2007, a(n)               Strike Force was established to combine the resources of federal, state, and local law enforcement to prevent and combat health care fraud, waste, and abuse.

 

Covered entities will perform               to verify how well security measures are working as required by the HIPAA Security Rule.

 

Individuals who bring civil actions on behalf of the U.S. government for false claims are commonly known as              .

 

Which government entity maintains a database of all PHI breaches?

 

Most recoveries secured by the False Claims Act relate to        and        fraud.

 

Which of the following agencies announced they were working with a variety of state departments of health to address patient harm and ensure continuity of care for patients impacted by the law enforcement operations from a raid in 2019? 

 

What act allows for individuals to bring civil actions on behalf of the U.S. government for false claims made to the federal government?

 

In August 2016, the Department of Justice proposed a new rule to         the percentage share that a whistle-blower may receive in a qui tam case.

 

How does the HITECH Rule strengthen privacy and security?

 

Which of the following actions are prohibited by the Federal False Claims Act?

 

What law prohibits knowingly and willfully receiving or paying anything of value to influence the referral of federal health care program business?

 

Which of the following are questions used to determine if the Stark Law has been violated?

 

During fiscal year 2018, the Justice Department secured $2.8 billion in settlements and judgments from cases involving fraud under which legislation?

 

Which of the following are true of the Stark Law?

 

Which areas do Strike Force teams operate?

 

What are the penalties for violation of the Federal Anti-Kickback Law?

 

What law prohibits physicians or their family members who own health care facilities from referring patients to those entities if the federal government, under Medicare or Medicaid, will pay for treatment?

 

What is a U.S. Code that prohibits fraud against any health care benefit program?

 

Which law states that referrals can come from anyone, exceptions are voluntary safe harbors, and intent must be proven?

 

The HHS Office of Inspector General is required to impose exclusions from participation in all federal health care programs on health care suppliers or providers who have been convicted of what crimes?

 

The Criminal Health Care Fraud Statute prohibits knowingly and willfully executing, or attempting to execute what types of scheme?

 

 

Privacy means freedom from which of the following?

          

Which of the following protects against government discrimination based on religion?

          

Collection, storage, transmission, and disclosure of patient information is governed by

          

 

State preemption means that when

 

A _____ is the transmission of information between two parties to carry out financial or administrative activities.

          

Which of the following are parts of the four standards outlined in HIPAA’s provisions?

          

What is a section of the United States Code that prohibits fraud against any health care benefit program?

          

Why are Medicare fraud statistics from prior years not always reliable?

          

In which year was the Office of the Inspector General charged with fighting waste, fraud, and abuse in Medicare, Medicaid, and more that 300 federally funded programs?

          

According to the Criminal Health Care Fraud Statute, the federal government may impose exclusions from participation in all federal health care programs on providers and suppliers who have been convicted of

          

Which of the following are reasons that Medicare fraud is not easy to estimate?

          

EMRs allow health care providers in one facility to

          

What is a comprehensive record that focuses on the total health of a patient and travels with the patient?

          

What are benefits of an EHR?

          

Lack of compliance with HIPAA security measures can lead to what types of punishment?

          

Any hardware, software, or both designed to prevent unauthorized persons from accessing electronic information in called a(n)

 

What should be installed on computers and updated regularly?

 

The training of all employees in proper computer use should be

 

When purchasing new medical computer software or other medical products, it is important to meet _____ security rules.

 

ProPublica estimates that breaches of patient data have cost the health care industry

 

The HITECH Rule strengthens privacy and security by

 

The Patient Protection and Affordable Care Act of 2010 has features intended to give consumers more rights. According to the act, insurance companies must

 

The Patient Protection and Affordable Care Act of 2010 has certain provisions that give health care consumers more rights. To whom do these provisions apply?

 

Information that contains one or more patient identifiers is called

 

Disclosure under treatment, payment, and health care operations (TPO) is permitted for which of the following reasons?

 

The uses and disclosures with opportunity to agree or object permission can be obtained by

 

A radiologist calls the primary care provider who ordered a test to ask if there is a suspicion of tuberculosis. This is an example of which of the following?

 

Limited data sets can be used and disclosed for

 

Health care providers and clearinghouses that transmit HIPAA transactions electronically and must comply with HIPAA standards and rules are called

 

If an individual is in an emergency situation, covered entities generally may make uses and disclosures if it is determined to be in the best interest of the individual. This is part of what HIPAA permission?

 

De-identify means to

 

The American Recovery and Reinvestment Act made changes to HIPAA that include

 

In order to keep their Medicare and Medicaid reimbursement levels, all public and private health care providers had to adopt and demonstrate the use of

 

What is a reason under HIPAA for disclosing patient information?

 

The idea that if certain rights are not explicitly mentioned in the Constitution, it does not mean that they do not exist pertains to what amendment?     

 

 

More products