Presentation is loading. Please wait.

Presentation is loading. Please wait.

Jeopardy $100 Access Controls EmailFaxing My Workstation Pot Luck $200 $300 $400 $500 $400 $300 $200 $100 $500 $400 $300 $200 $100 $500 $400 $300 $200.

Similar presentations


Presentation on theme: "Jeopardy $100 Access Controls EmailFaxing My Workstation Pot Luck $200 $300 $400 $500 $400 $300 $200 $100 $500 $400 $300 $200 $100 $500 $400 $300 $200."— Presentation transcript:

1 Jeopardy $100 Access Controls EmailFaxing My Workstation Pot Luck $200 $300 $400 $500 $400 $300 $200 $100 $500 $400 $300 $200 $100 $500 $400 $300 $200 $100 $500 $400 $300 $200 $100 Final Jeopardy Final Jeopardy

2 1 - $100 Access to the following areas must be restricted: Access to the following areas must be restricted: A.Client Area B.Employee Area C.Medical Records D.All of the above.

3 1 - $200 Which of the following statements are true? Which of the following statements are true? A.Employees and Visitors must wear a badge while on TPOCC property. B.It is okay to lend your badge to someone who needs access to the building. C.If I lose my badge, my identity must be verified and I must obtain a Visitor’s Badge to wear while on TPOCC property. D.A and C.

4 1 - $300 PHI is very valuable, what does TPOCC do to ensure that in an Emergency, information is secured? PHI is very valuable, what does TPOCC do to ensure that in an Emergency, information is secured? A.TPOCC has a Business Continuity Plan. B.The Business Continuity Plan addresses events that may damage electronic data such as a fire or flood. C.TPOCC can conduct daily operations in “Emergency Operation Mode”. D.All of the Above.

5 1 - $400 Who can access the Medical Records Department? Who can access the Medical Records Department? A.All Team Leads, Program Directors and Medical Records staff. B.All Doctors, Program Directors and Medical Records staff. C.The Medical Team. D.The Medical Records staff.

6 1 - $500 My Access in the Electronic Medical Record may be limited to: My Access in the Electronic Medical Record may be limited to: A.The Clients on my assigned Team. B.The areas of the EMR I need to do my job. C.My job role and/or Credential. D.All of the Above.

7 2 - $100 Which of the following is true about e-mail at TPOCC? Which of the following is true about e-mail at TPOCC? A.E-mail users have an obligation to use e-mail appropriately, effectively, and efficiently. B.E-mail can be forwarded, printed and stored by others, so extreme discretion must be used when using e-mail. C.It is okay to forward e-mail and copy many people to make sure communication is smooth. D.A and B.

8 2 - $200 If e-mail is used for communication of sensitive material, the following safeguards must by taken: If e-mail is used for communication of sensitive material, the following safeguards must by taken: A.The subject line should reference that this is sensitive information. B.I must use my company e-mail account only as it is encrypted and secure. C.A disclaimer must be included within all e-mail signatures in Outlook. D.All of the above.

9 2 - $300 If an e-mail is misdirected to an unintended recipient, the sender must take the following action: If an e-mail is misdirected to an unintended recipient, the sender must take the following action: A.Attempt to reach the unintended recipient by phone, and ask them to delete the misdirected e-mail. B.As long as the disclaimer is attached, nothing further needs to be done. C.A and B D.A. If unable to reach by phone, send an e-mail with the subject “Misdirected E-Mail” and request the e- mail be deleted.

10 2 - $400 When using e-mail: When using e-mail: A.It is okay to print and file emails with PHI in my unlocked desk drawer. B.It should be used as a business tool. C.It is okay to forward e-mail to my Gmail or other personal email account. D.None of the above.

11 2 - $500 The following is an unfortunate result of e-mail leaking into the wrong hands: The following is an unfortunate result of e-mail leaking into the wrong hands: A.The PHI can be used for fraud. B.The PHI can be used for identity theft. C.The PHI may fall into the hands of someone who does not have “need to know” access to the information. D.All of the above.

12 3 - $100 Faxing information should only be done when: Faxing information should only be done when: A.The original record or mail-delivered copy will not meet the needs for TPO. B.Urgent information, such as an approval for services is needed. C.Authorization to release the information has been obtained and signed.

13 3 - $200 When faxing information, use the following guideline when deciding what information to fax. When faxing information, use the following guideline when deciding what information to fax. A.Fax only the information you obtained authorization for. B.Certain information such as Therapy notes, HIV test results and Alcohol and Drug Abuse Records may not be released without specific written Client authorization unless required by law. C.Fax whatever the person requests. D.A and B.

14 3 - $300 What must accompany all fax transmissions containing PHI? What must accompany all fax transmissions containing PHI? A.An official TPOCC fax cover letter. B.A stamp on each page indicating that the documents are confidential. C.A and B are required. D.None of the above.

15 3 - $400 To confirm a Fax was sent successfully: To confirm a Fax was sent successfully: A.Call the person to see if it was received. B.Obtain and keep a copy of the fax transmittal and fax confirmation sheet. C.A or B. D.All of the above.

16 3 - $500 Which of the following statements are true regarding faxes that are received? Which of the following statements are true regarding faxes that are received? A. If the intended receiver is not TPOCC, follow the instructions to destroy the information and notify the sender of the error. B. Fax machines are located in secure areas and faxed information should be removed immediately. C. Not everyone is authorized to use the fax machines at TPOCC. D. All of the above!

17 4 - $100 What is the command to lock a workstation when leaving it unattended? What is the command to lock a workstation when leaving it unattended? A.Press the “lock workstation” key on the keyboard. B.Press Control + Alt + Delete on the keyboard. C.Press the Windows + L key on the keyboard. D.B or C.

18 4 - $200 Which of the following is part of the Procedure for storage of information? Which of the following is part of the Procedure for storage of information? A.Company information must be stored on the TPOCC secure networks. B.It is okay to use a flash drive to store PHI. C.It is okay to load games and music to the TPOCC secure network. D.I can upload software anytime I want to my workstation.

19 4 - $300 The EMR password requirements include: The EMR password requirements include: A. All lower case letters and two whole numbers. B. Can be easy to remember like your birthday or pet’s name. C. Passwords must include three of four requirements: lower case letter, upper case letter, a number or a special character. D. They must be 20 characters long.

20 4 - $400 Fill in the blanks: _____________ controls what you see in Credible, _____________ controls your scope of practice or what you are able to do in Credible. Fill in the blanks: _____________ controls what you see in Credible, _____________ controls your scope of practice or what you are able to do in Credible. A.Forms, Attachments B.Program, Team C.Security, Credentials D.None of the above.

21 4 - $500 What is the automatic log-off time for inactive workstations? What is the automatic log-off time for inactive workstations? A.15 minutes. B.One hour. C.30 minutes. D.It depends on your access.

22 5 - $100 Physical access to our facilities is restricted by: Physical access to our facilities is restricted by: A.Locks and alarms. B.On-Site Security. C.Signs indicating restricted areas. D.A and C.

23 5 - $200 TPOCC has which additional Physical Access Controls in place to protect PHI: TPOCC has which additional Physical Access Controls in place to protect PHI: A.Computer Network Firewalls and Virus Detection. B.Property control tags on all TPOCC equipment. C.Redundancy, backup and security systems in place to prevent data loss. D.All of the above.

24 5 - $300 Which of the following statements are true about offsite access? Which of the following statements are true about offsite access? A.Offsite use includes use of the EMR at school, a Client home or an Employee working from home. B.Employees who work offsite must be approved by their Program Director to do so. C.Employees must review and sign the acknowledgement of offsite best practices. D.All of the above.

25 5 - $400 There are additional Policies and Procedures that I need to be aware of such as: There are additional Policies and Procedures that I need to be aware of such as: A.Transport of Paper Records B.Retention and Destruction of Records C.Neither A nor B D.There are additions and updates that I need to be aware of!

26 5 - $500 What is the term for an accidental or intentional leak of PHI? What is the term for an accidental or intentional leak of PHI? A. Meaningful Use B. TPO C. Breach D. Disclosure


Download ppt "Jeopardy $100 Access Controls EmailFaxing My Workstation Pot Luck $200 $300 $400 $500 $400 $300 $200 $100 $500 $400 $300 $200 $100 $500 $400 $300 $200."

Similar presentations


Ads by Google