Filters
Question type

Study Flashcards

The ACA requires the adoption of __________ for each of the HIPAA Standard transactions.


A) codes sets
B) operating rules
C) encryption
D) minimum data set

E) A) and C)
F) None of the above

Correct Answer

verifed

verified

In qui tam, or whistleblower, cases the person who makes the accusation of suspected fraud is called the


A) detector.
B) relator.
C) provider.
D) respondeat superior.

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

The __________ make(s) it illegal to knowingly offer incentives to induce referrals.


A) Sarbanes-Oxley
B) antikickback statute
C) FCA
D) Stark rules

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

Under which act can a patient restrict the access of health plans to their medical records if they pay for the service in full at the time of visit?


A) HITECH
B) ARRA
C) HIPAA
D) HIE

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Under the HITECH Act, unprotected health information that is not secured through the use of technologies or methods that HHS has specified is referred to as


A) medical records.
B) PHI.
C) documentation.
D) unsecured PHI.

E) C) and D)
F) None of the above

Correct Answer

verifed

verified

__________ is the activity of copying files to another medium so that they will be preserved in case the originals are no longer available.


A) Critical data recovery
B) Backing up
C) Antivirus software programs
D) Encrypting

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

What group is charged with detecting health care fraud and abuse?


A) ACA
B) OIG
C) RCA
D) CMS

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

The electronic equivalent of a business document is called a(n)


A) meaningful use
B) audit
C) electronic data interchange
D) transaction

E) B) and C)
F) All of the above

Correct Answer

verifed

verified

According to the OIG compliance plans should contain how many elements?


A) nine
B) five
C) seven
D) eleven

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

Disclosure of which of the following conditions requires a specific authorization from the patient other than for TPO?


A) HIV status
B) otitis media
C) Alzheimer's disease
D) pharyngitis

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

An important part of a compliance plan is a commitment to keep both physicians and medical office staff current by providing


A) ongoing training on coding and billing.
B) OIG Fraud Advisories.
C) practice work plans.
D) external audits.

E) A) and B)
F) B) and D)

Correct Answer

verifed

verified

The HIPAA rules for protecting patients' health information are in the


A) Electronic Transaction Rule.
B) Privacy Rule.
C) Code Sets Rule.
D) Security Rule.

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

The minimum necessary standard means to


A) take reasonable safeguards to protect PHI.
B) complete the general business management functions.
C) release partial patient record to the hospital that requests it.
D) provide minimum care.

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

__________ is deception with intent to benefit from the behavior.


A) Abuse
B) Kick backs
C) Fraud
D) Self-referrals

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

Which of the following laws prohibits submitting a fraudulent claim?


A) FCA
B) HIPAA
C) OIG
D) HITECH

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

Which of the following is America's "law office"?


A) OIG
B) HIPAA
C) DOJ
D) FCA

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

__________ is the process of encoding information in such a way that only the person (or computer) with the key can decode it.


A) Encryption
B) Meaningful use
C) Fraud
D) Code set

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

When protected health information is shared, which of the following should be observed?


A) code set
B) informed consent
C) encryption
D) minimum necessary standard

E) C) and D)
F) All of the above

Correct Answer

verifed

verified

Which of the following require(s) CEs to establish safeguards to protect PHI?


A) HIPAA Privacy Rule
B) HIPAA Security Rule
C) Health Insurance Portability and Accountability Act of 1996 (HIPAA)
D) HIPAA Electronic Transactions and Code Sets

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

Which of the following are organizations that work for covered entities but are not themselves covered entities?


A) health plans
B) electronic data interchanges
C) clearinghouses
D) business associates

E) B) and D)
F) All of the above

Correct Answer

verifed

verified

Showing 61 - 80 of 97

Related Exams

Show Answer