1. Liability is

    A) the legal responsibility of competent adults for their own acts.

    Feedback: We are all responsible for our acts and liability is not limited to employment.
  2. We are responsible for our actions, or our failure to act, under

    C) the reasonable person standard.

    Feedback: The reasonable person standard states that we may be held liable if someone is injured because we failed to perform an act that a reasonable person in similar circumstances would perform or not perform.
  3. A means of establishing a standard of care in a trial is called

    A) expert testimony.

    Feedback: A standard of care is established by an expert testifying as to the standard.
  4. The criteria by which our actions in a given situation are judged competent or incompetent are called

    A) liability.
  5. The increasing number of HIV/AIDS patients led to increased concern over the ethical and legal implications concerning

    B) privacy.

    Feedback: Because of the contagious nature of HIV, there are always concerns about protecting the patient's privacy.
  6. When a defendant is found guilty of a tort, the plaintiff is awarded compensation based upon

    D) all of the above

    Feedback: The courts will look at the extent of injuries, loss of income, and mental anguish in determining general compensatory damages.
  7. Those damages awarded by the court to punish the defendant are called

    D) punitive.

    Feedback: Punitive damages are awarded when the intent is to punish the defendant for their acts.
  8. In the _________ phase of a lawsuit, subpoenas are issued.

    B) pre-trial discovery

    Feedback: Subpoenas are issued in the beginning or pre-trial discovery phase to make sure that all witnesses are called.
  9. Statutes of limitations may apply to

    B) medical malpractice claims.

    Feedback: Every state has a statute of limitations for the filing of medical malpractice claims. The time period may differ in each state.
  10. Suppose a person causes injury to another person in an automobile accident and a lawsuit ensues. The person who caused the accident is called the

    A) tortfeasor.

    Feedback: The technical term, tortfeasor is used to describe the person who committed the bad act.
  11. One of the most common occurrences for marking the beginning of the statutory period for medical malpractice includes the

    A) day the alleged negligent act was committed.
  12. A defense that alleges the defendant did no wrong is called

    A) denial.

    Feedback: A denial defense claims that there was not malpractice.
  13. When damages are apportioned according to the degree a plaintiff contributed to his or her injury, this is called

    D) contributory negligence.

    Feedback: A contributory negligence defense assumes that actions of the patient contributed to or was the sole cause of the injury.
  14. The _________ is the time limit for filing a lawsuit.

    D) statue of limitations

    Feedback: The statute of limitations provides a time frame for the filinga lawsuit. Each state may have a different time frame.
  15. Medical malpractice insurance that covers the insured only for those claims made while the policy is in force is called

    B) claims made coverage.
  16. Tom is a nurse in an internal medicine practice. The physician he works for often refers patients to Dr. Hazelwood, a local cardiologist. Tom learns from a friend at the local hospital that Dr. Hazelwood has several malpractice claims filed against him. Tom should

    A) keep the information to himself.

    Feedback: Tom must be careful in relaying information that may or may not be accurate. He may want to quietly mention what he has heard to his supervising physician so that if there are real problems, the physician can check into it.
  17. To correct any error discovered after a patient's medical records has been filed

    B) draw a line through the mistake, insert the correction, label it as a correction, initial, and date it.

    Feedback: Standard practice in written medical records require acknowledgement of the error.
  18. Requests for information coming into the medical office from insurance companies or other sources should

    A) list the purpose for which the data will be used.

    Feedback: Requests for records should always list the reason the information is being requested. Most facilities have patients sign a general release form so that the patient does not have to sign a release form each and every time an insurance company requests information. Also, most insurance companies have a general release signed by the patient.
  19. Consent is unnecessary

    B) in emergency situations

    Feedback: A presenting emergency situation is the only time consent is not required. Consent in other cases may need to be given by the guardian ofthe patient.
  20. Patients' medical records

    B) should not be released to a third party without written permission.

    Feedback: Medical records should never be released without the patient's permission unless there is a subpoena.
  21. The law that effectively waives consent in medical emergencies is the

    B) Good Samaritan Act.

    Feedback: Good Samaritan is a term used to describe a person who does a good deed. The assumption is that in responding to an emergency, the need for consent is not necessary.
  22. Under the doctrine of professional discretion a physician

    B) may determine that the patient may not even see their own records.
  23. The Health Insurance Portability and Accountability Act (HIPAA)

    C) mandates certain standards for electronic transmission and storage of healthcare information.
  24. Alicia's computer monitor is easily viewed by patients as the patient is sitting at her station. She notices that a patient is making an intent effort to read the information on the computer screen. That information is actually about another patient that Alicia had just talked with. What should Alicia do?

    B) Politely excuse herself and fix the computer so no information is on the screen.
  25. Standard 3, the Privacy Rule, states that

    C) policies and procedures must be in place to protect unauthorized viewers from accessing PHI.

    Feedback: Standard 3 requires that policies and procedures be in place. There is no requirement for passwords for individual records or reporting of security breaches.
  26. A Notice of Privacy Practices (NPP) is a document that every

    C) patient is asked to read and sign.
  27. The Food and Drug Administration (FDA) is entitled to PHI when

    D) all of the above
  28. Protected psychotherapy notes include

    D) none of the above
  29. The person most likely to handle the problem of a computer hacker (an unauthorized person) that is able to access and download information about patients is the

    C) security officer.
  30. You could unintentionally expose content on your personal computer or your employer's system network by

    D) all of the above
  31. Which of the following are the privacy officer's responsibilities?

    D) all of the above
  32. Which of the following is not a violation of HIPAA's privacy rule?
    A)You call across a crowded waiting room to tell a patient that he has forgotten his prescription for dilantin, a drug used to control seizures.
    B)You are a medical assistant for a physician's private practice, and you tell a friend, who is a bank teller, that a mutual friend has seen your
    employer and is pregnant.
    C)A telephone caller identifies himself as an insurance plan representative and requests PHI. You do not know the caller, but you comply.
    D)all of the above
    D)all of the above
Card Set