• Menu
  • Skip to right header navigation
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

Juniper a program of Trellis

Creating a Healthier Minnesota

Header Right

1-855-215-2174
  • ABOUT
  • OUR TEAM
  • HIPAA
  • Contact Us
  • YOURJUNIPER.ORG
  • Search
  • About
  • Our Team
  • Juniper Classes
  • Being a Provider
  • Planning Classes
  • Recruiting and Supporting Leaders
  • Filling Classes
  • Holding Classes
  • Index
    • Being a Provider
    • Juniper Provider Communications
    • Planning Classes
    • Recruiting and Supporting Leaders
    • Filling Classes
    • Holding Classes
  • NO|FALLS
    Minnesota
  • JUNIPER
    CLASSES
  • CLASS
    MATERIALS
  • USER GUIDE

HIPAA-Compliance Certification

Please complete this form to certify that you have completed the HIPAA-compliance training.

  • Certification Questions

    Please answer the following questions to complete your certification.
  • What should you tell an individual who asks for information about HIPAA or his or her privacy rights?
  • B is Correct! Reason. HIPAA’s privacy rule requires organizations that handle PHI to provide patients with a notice explaining their rights and how the organization may use their PHI. Anyone—even people whoa re not currently patients—may receive a copy of this notice.

  • Incorrect! B. is the correct answer. Reason. HIPAA’s privacy rule requires organizations that handle PHI to provide patients with a notice explaining their rights and how the organization may use their PHI. Anyone—even people whoa re not currently patients—may receive a copy of this notice.

  • Physical security includes which of the following?
  • D. is Correct! Reason. Physical security involves common-sense steps to safeguard information from physical threats (e.g., theft). These steps include locking doors and desks, making sure that those around you cannot easily view PHI, and storing computer equipment safely and securely.

  • Incorrect! D. is the correct answer. Reason. Physical security involves common-sense steps to safeguard information from physical threats (e.g., theft). These steps include locking doors and desks, making sure that those around you cannot easily view PHI, and storing computer equipment safely and securely./p>

  • When discussing PHI, try to:
  • D. is Correct! Reason. Even if your discussions of PHI are legitimate, acknowledge that others may be able to hear the conversation. When discussing patients, think to yourself, “Who else can hear?” and adjust your behavior based on the answer.

  • Incorrect! D. is the correct answer. Reason. Even if your discussions of PHI are legitimate, acknowledge that others may be able to hear the conversation. When discussing patients, think to yourself, “Who else can hear?” and adjust your behavior based on the answer./p>

  • Who must be trained about HIPAA?
  • D. is Correct! Reason. HIPAA requires that both covered entities and business associates provide HIPAA training to members of their workforce who handle PHI. This means that even business associates — and any of their subcontractors — must have training. Basically, anyone who comes into contact with protected health information (PHI) must be trained.

  • Incorrect! D. is the correct answer. Reason. HIPAA requires that both covered entities and business associates provide HIPAA training to members of their workforce who handle PHI.  This means that even business associates — and any of their subcontractors — must have training.  Basically, anyone who comes into contact with protected health information (PHI) must be trained./p>

  • If you encounter a possible breach of PHI, what steps should you take?
  • B. is Correct! Reason. If unencrypted PHI has been lost, stolen, improperly accessed, inadvertently sent to the wrong individual, or unauthorized viewing of PHI has occurred, you must keep documentation regarding the potential breach and contact Juniper’s Data Privacy Officer at DataComplianceOfficer@yourjuniper.org. It is also advised you inform your immediate supervisor.

  • Incorrect! B. is the correct answer. Reason. If unencrypted PHI has been lost, stolen, improperly accessed, inadvertently sent to the wrong individual, or unauthorized viewing of PHI has occurred, you must keep documentation regarding the potential breach and contact Juniper’s Data Privacy Officer at DataComplianceOfficer@yourjuniper.org. It is also advised you inform your immediate supervisor./p>

  • This field is for validation purposes and should be left unchanged.

Primary Sidebar

Footer

  • yourjuniper.org
  • About
  • Our Team
  • Contact Us
  • Media
  • Login
Contact Us
Email us
1-855-215-2174

Stay Connected! Email Sign-Up

Juniper is a program of Trellis. © 2025 Trellis · Log in

Notifications