HIPPA Training HIPPA TrainingClick here to download the Training document. After reading the document, please begin the test below:Staff Name* First Last Staff Email* HIPPA Training Test1: Among other things, the Health Insurance Portability and Accountability Act (HIPAA) contained provisions to expand the availability of health care insurance coverage.TrueFalse2: The HIPAA privacy rules that have been promulgated needed to be implemented by covered entities by April 14, 2003.TrueFalse3: HIPAA privacy rules are always followed even if the state's law is more stringent.TrueFalse4: The ability to store patient health information electronically has dramatically increased the need for privacy rules.TrueFalse5: Health care providers, health plans, health care clearing houses and business associates are all considered covered entities under HIPAA and subject to all its rules and regulations.TrueFalse6: Information that is created by an entity, including paper, electronic, videotapes, photos, is referred to as protected health information (PHI).TrueFalse7: The ‘minimum necessary rule’ means that only necessary information should be shared even if the patient has given authorization.TrueFalse8: Patients have the right to know what disclosures have been made and are entitled to receive a free accounting every 12 months.TrueFalse9: According to HIPAA, employees are responsible for getting training about privacy rules on their own; the employing agency is not mandated to provide training.TrueFalse10: All agencies covered by HIPAA must appoint a privacy officer and establish an internal compliance process to assure that patient rights are not being violated.TrueFalse11: New changes to HIPAA were implemented in 2013.TrueFalse12: CMS has promulgated rules regarding how information must be coded for billing submission to Medicare and Medicaid.TrueFalse13. Identification of what is ‘at risk’ in the following. Circle appropriate answers below:File Cabinets containing charts will be protected by:a. Locked office/locked cabinetsb. Sign on cabinet.c. Fingerprintsd. Not applicable14. Discarded PHI Papers and forms will be protected by:a. Placing them in the dumpsterb. Putting them in a paper bag and then in the garbagec. Using a shredderd. Burning them15. Faxed copies of information will be protected by:a. Placing them in the dumpsterb. Putting them in a paper bag and then in the garbagec. Using a shredderd. Burning them16. Previously scanned documents will be protected by:a. Placing them in the dumpsterb. Putting them in a paper bag and then in the garbagec. Using a shredderd. Burning them17. Inactive Patient Charts will be protected by:a. Discarding them in the trashb. Storage/Computer Back-upc. Burning themd. Storing them in the Administrator’s home18. Obsolete Patient Schedules will be protected by:a. Placing them in the dumpsterb. Putting them in a paper bag and then in the garbagec. Burning themd. Shredder19. Obsolete Patient Routing Slips will be protected by:a. Placing them in the dumpsterb. Putting them in a paper bag and then in the garbagec. Using a shredderd. Burning them20. Employee Workstations will be protected by:a. Closing your computer at nightb. Passwordc. Giving your supervisor access to your computerd. None of the above21. Electronic Claim Submission will be protected by:a. Router and Firewallb. Closing the program when not in usec. Storing the program in the Administrator’s homed. Not Applicable22. Our Internal Database will be protected by:a. Closing the program when not in useb. Daily Back-upc. Storing the program in the Administrator’s homed. Not Applicable23. Our Internet Server will be protected by:a. Router and Firewallb. Closing the program when not in usec. Storing the program in the Administrator’s homed. Not Applicable24. Daily Data Back-up will be protected by:a. Automaticallyb. Each individual worker25. Doctor’s Smart Phone Patient Info will be protected by:a. Automaticallyb. Office Managerc. Physiciand. Not Applicable26. Our Telephone Answering System will be protected by:a. Internal Phone Systemb. Each individual staff memberc. Office Managerd. Not applicable27. Our electronic confirmation service will be protected by:a. Administratorb. Service Providerc. Office Managerd. Not applicable28. Emailing Patient Information will be protected by:a. Internet Providerb. Administratorc. Encryptiond. Not Applicable29. Receiving Emailed Patient Information will be protected by:a. Internet Providerb. Administratorc. Encryptiond. Not Applicable30. Digital x-ray transmission will be protected by:a. Internet Providerb. Administratorc. Encryptiond. Not Applicable