Quiz for HIPAA Training - University of South Florida

advertisement
Information Security HIPAA Training Completion Form
Name: ___________________________________ Email: ____________________ Department: _________
Signature: _______________________________________________ Date: _______________
FIRST – please complete this 12-item training content quiz (CIRCLE THE CORRECT ANSWER). You
can refer back to the training slides if you aren’t sure about an answer.
1. To maintain the security of your network password, you
should:
a. keep it with your computer or laptop in case you forget it
b. never share it with anyone, including co-workers and family
members
c. use a simple password such as the name of your pet
d. email it to yourself so that you don't forget it.
7. Assuming you had access to protected health information,
which of the following is not considered protected health
information:
a. a mental health client's name
b. a Social Security number
c. a medical record number
d. a de-identified data set
2. Using the recommended rules for passwords, which example
of a password is the most secure?
a. fmhi4
b. pgsFM2a&
c. CFSFMHI
d. computer1
8. Protected Health Information does not need protection if it
is:
a. contained in an e-mail message
b. obtained verbally through a conversation
c. in hand written notes
d. None of the above (i.e., it must be protected in all of the above)
3. USF computers and the USF network may be used:
a. for operating a personal business not related to work.
b. only during regular business hours
c. only to conduct activities related to the mission and purposes
of USF.
d. for any reasonable purpose, as long as it is not illegal
9. Which of the following is NOT required documentation to
become an "authorized user" for protected health data:
a. a certificate indicating completion of the USF on-line
training.
b. a certificate indicating completion of HIPAA training.
c. a signed Data Confidentiality Agreement with the source of the
data.
d. an email from you to your Chair or Supervisor promising
confidentiality.
4. Most computer viruses:
a. enter a computer or a network through file downloads or a
transfer from a floppy disk
b. are special parts of programs that enhance the performance of a
computer
c. completely destroy your computer’s hard drive
d. are curable by taking antibiotics
5. All e-mail messages at USF may be monitored and can be
released under a public records request to the University.
a. True
b. False
6. To enhance the security of sensitive data at USF, the IT
department:
a. obtains background reports from the Florida Department of
Law Enforcement on all USF employees who have
network access
b. has installed small hidden video cameras at each entrance to
USF
c. systematically monitors the USF network for intrusions,
security incidents and inappropriate activity
d. All of the above
10. A “data custodian” is someone who:
a. monitors network activity for USF IT
b. is responsible for developing a data use agreement with a data
source and approves the scientific use of the data
c. “cleans up” data before it is made available for general use
d. is the liaison for USF IT with the University physical plant
staff
11. If you have data that are no longer needed, you should:
a. determine whether the data may be destroyed or deleted
pursuant to data use agreements before doing anything
b. maintain documentation on file for any data that is removed
and/or moved to a secure storage area
c. notify the Associate Dean for Information Services
d. Both a and b
12. It is acceptable to discard printed data in the recycle bins as
long as a large X is put on each page.
a. True
b. False
SECOND – Please send a paper copy of this form completed to the: USF IT HIPAA Security Office, SVC
4010. This will satisfy the training requirement for network access and using sensitive data at USF. Your
participation in the basic training is now complete. Thank you!
Download