This transaction supports multiple functions. These functions include: telling a bank to move money OR telling a bank to move money while sending remittance information:
This Security Standard addresses the proper functions to be performed on a specific workstation as well as the physical attributes of its surroundings.
A business associate must agree to:
This rule covers the policies and procedures that must be in place to ensure that the patients' health information is respected and their rights upheld:
As defined in the HIPAA regulations, a group of logically related data in units is called a:
Formal, documented instructions for reporting security breaches are referred to as:
Select the correct statement regarding the administrative requirements of the HIPAA privacy rule.
Select the correct statement regarding code sets and identifiers.
Select the correct statement regarding the 834 - Benefit Enrollment and Maintenance transaction.
This transaction type may be used in three ways:
1) Reply to a Health Care Claim Status Request.
2) Unsolicited notification of a health care claim status.
3) Request for additional information about a health care claim.
This is a documented and routinely updated plan to create and maintain, for a specific period of time, retrievable copies of information:
A hospital is preparing a file of treatment information for the state of California. This file is to be sent to external medical researchers. The hospital has removed SSN, name, phone and other information that specifically identifies an individual. However, there may still be data in the file that potentially could identify the individual. Can the hospital claim "safe harbor" and release the file to the researchers?
Select the FALSE statement regarding the responsibilities of providers with direct treatment relationships under HIPAA's privacy rule.
HIPAA establishes a civil monetary penalty for violation of the Administrative Simplification provisions. The penalty may not be more than:
The implementation specifications for this HIPAA security standard (within Technical Safeguards) must support emergency access and unique user identification:
Select the correct statement regarding the requirements for oral communication in the HIPAA regulations.
This HIPAA security area addresses the use of locks, keys and procedures used to control access to computer systems:
This transaction is the response to a Health Care Claim (837):
The Privacy Rule gives patients the following right:
Which of the following is NOT a HIPAA national health care identifier?
Which one of the following implementation specifications is associated with the Facility Access Control standard?
In addition to code sets, HIPAA transactions also contain:
In terms of Security, the best definition of "Access Control" is:
As part of their HIPAA compliance process, a small doctor's office formally puts the office manager in charge of security related issues. This complies with which security rule standard?