HIPAA-Compliance Certification Please complete this form to certify that you have completed the HIPAA-compliance training. Name* First Last Email* Organization* What county do you reside in?*AitkinAnokaBeckerBeltramiBentonBig StoneBlue EarthBrownCarltonCarverCassChippewaChisagoClayClearwaterCookCottonwoodCrow WingDakotaDodgeDouglasFaribaultFillmoreFreebornGoodhueGrantHennepinHoustonHubbardIsantiItascaJacksonKanabecKandiyohiKittsonKoochichingLac Qui ParleLakeLake Of The WoodLe SueurLincolnLyonMahnomenMarshallMartinMcLeodMeekerMille LacsMorrisonMowerMurrayNicolletNoblesNormanOlmstedOtter TailPenningtonPinePipestonePolkPopeRamseyRed LakeRedwoodRenvilleRiceRockRoseauSt. LouisScottSherburneSibleyStearnsSteeleStevensSwiftToddTraverseWabashaWadenaWasecaWashingtonWatonwanWilkinWinonaWrightYellow MedicineCertification* I certify that I have viewed the entire HIPAA compliance video.Certification QuestionsPlease answer the following questions to complete your certification.Question 1*What should you tell an individual who asks for information about HIPAA or his or her privacy rights? A. Explain the organization’s HIPAA privacy policies. B. Give copies of the organization’s notice of privacy practices and tell the individual to direct further questions to the privacy officer. C. Ask whether the individual is a current participant. For current participants only, supply a copy of the notice of privacy practices. B is Correct! Reason. HIPAA’s privacy rule requires organizations that handle PHI to provide patients with a notice explaining their rights and how the organization may use their PHI. Anyone—even people whoa re not currently patients—may receive a copy of this notice.Incorrect! B. is the correct answer. Reason. HIPAA’s privacy rule requires organizations that handle PHI to provide patients with a notice explaining their rights and how the organization may use their PHI. Anyone—even people whoa re not currently patients—may receive a copy of this notice. Question 2*Physical security includes which of the following? A. Locking doors and desks B. Keeping PHI out of view of those around you C. Storing computer equipment safely D. All of the above D. is Correct! Reason. Physical security involves common-sense steps to safeguard information from physical threats (e.g., theft). These steps include locking doors and desks, making sure that those around you cannot easily view PHI, and storing computer equipment safely and securely.Incorrect! D. is the correct answer. Reason. Physical security involves common-sense steps to safeguard information from physical threats (e.g., theft). These steps include locking doors and desks, making sure that those around you cannot easily view PHI, and storing computer equipment safely and securely./p>Question 3*When discussing PHI, try to: A. Lower your voice B. Use nongenetic terms C. Move to a more private area D. Both a. and c D. is Correct! Reason. Even if your discussions of PHI are legitimate, acknowledge that others may be able to hear the conversation. When discussing patients, think to yourself, “Who else can hear?” and adjust your behavior based on the answer.Incorrect! D. is the correct answer. Reason. Even if your discussions of PHI are legitimate, acknowledge that others may be able to hear the conversation. When discussing patients, think to yourself, “Who else can hear?” and adjust your behavior based on the answer./p>Question 4*Who must be trained about HIPAA? A. No one needs to be trained about HIPAA B. Casual employees and volunteers do not need to be trained about HIPAA C. Contract staff do not need to be trained about HIPAA D. Everyone who is part of the Juniper Network and handles PHI associated with a Juniper program, including unpaid volunteers, and contractors, must be trained or show documentation of training about HIPAA. D. is Correct! Reason. HIPAA requires that both covered entities and business associates provide HIPAA training to members of their workforce who handle PHI. This means that even business associates — and any of their subcontractors — must have training. Basically, anyone who comes into contact with protected health information (PHI) must be trained.Incorrect! D. is the correct answer. Reason. HIPAA requires that both covered entities and business associates provide HIPAA training to members of their workforce who handle PHI. This means that even business associates — and any of their subcontractors — must have training. Basically, anyone who comes into contact with protected health information (PHI) must be trained./p>Question 5*If you encounter a possible breach of PHI, what steps should you take? A. Discard documentation regarding the potential breach and tell your immediate supervisor only. B. Keep documentation regarding the potential breach, inform your immediate supervisor, contact Juniper’s Data Privacy officer at DataComplianceOfficer@yourjuniper.org C. Keep documentation regarding the potential breach, inform your immediate supervisor only. D. None of the above. B. is Correct! Reason. If unencrypted PHI has been lost, stolen, improperly accessed, inadvertently sent to the wrong individual, or unauthorized viewing of PHI has occurred, you must keep documentation regarding the potential breach and contact Juniper’s Data Privacy Officer at DataComplianceOfficer@yourjuniper.org. It is also advised you inform your immediate supervisor.Incorrect! B. is the correct answer. Reason. If unencrypted PHI has been lost, stolen, improperly accessed, inadvertently sent to the wrong individual, or unauthorized viewing of PHI has occurred, you must keep documentation regarding the potential breach and contact Juniper’s Data Privacy Officer at DataComplianceOfficer@yourjuniper.org. It is also advised you inform your immediate supervisor./p>NameThis field is for validation purposes and should be left unchanged. Δ