Question 1
What must a facility do to comply with the category of using
health information through the Joint Commission information management
accreditation standards?
Ensure that knowledge-based information resources are
available
Maintain accurate health information
Create a plan for managing information
Protect the privacy of health information
Unsaved change Moving to the next question prevents changes
to this answer.
Question 2
Which type of assessment is required by both the HIPAA
security rule and meaningful use to identify gaps and weaknesses that could
lead to security breaches?
Technical
Risk
Threat
Vulnerability
Question 3
Which function is included in mHealth applications?
Connect to a physician for treatment
Send prescriptions to the patient’s pharmacy
Transfer entire records to other providers
Request a change in provider
Question 4
Which action to avoid fraud and abuse is recommended by the
Centers for Medicare and Medicaid Services toolkit?
Purchasing a system that incorporates anti-fraud features
Showing what and when something in an EHR is modified, not
the person when doing audits
Running audit logs during high traffic times
Training only key informatics personnel regarding risks
associated with EHRs
Question 5
An important aspect of the HITECH act is the inclusion of:
Requirements for privacy breaches
Guidelines for social media
Handling of lab and diagnostic testing
Provisions for financial security
