• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/22

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

22 Cards in this Set

  • Front
  • Back

States and ___ statutes are passed by legislative bodies

Federal
A term which describes an individual's right to keep health care information from being disclosed to others
Privacy
The threat of excessive awards in medical liability cases has increased providers' liability insurance premiums, resulting in _____ health care costs
Increased
What is the legal newspaper published daily by the National Archives and Records Administration of the Federal government
The Federal Register
As part of the administrative simplification provision of HIPAA, which of the following unique identifiers is assigned to third-party payers
PlanId
Information that is converted to a secure language format for electronic transmission is what kind of data
Encrypted
In 1863 the _____ Claims Act was originally passed
False
The safekeeping of patient information by controlling access to hard-copy and computerized records is a form of ______ management
Security
The purpose of the NCCI is to reduce Medicare program
Expenditures
What method is the best way to verify the identity of a caller requesting medical information
Callback
Which federal legislation was enacted in 1995 to restrict the referral of patients to organizations in which providers have financial interest? _____ II Laws
Stark
Case law is based on court decisions that establish precedent and is also called _____ law
Common
When a Medicare provider commits fraud, which entity conducts the investigation?
OIG
Discussing patient health care information with unauthorized sources and result in a ____ of confidentiality
Breach
Undated signed forms are assumed to be valid until revoked by the patient or ____
Guardian
Excessive charges for services, equipment, or supplies is an example of _____
abuse
The recognized difference between fraud and abuse is ____
Intent
Testimony under oath taken outside of the court
Deposition
A term which describes guidelines written by administrative agencies, such as CMS, that are based on laws passed by legislative bodies
Regulations
Which block on the CMS-1500 claim form is used for the patient's signature for release of medical information
Twelve
When a patient's signs a release of medical information at a physician's office, that release is generally considered to be valid _____ year from the date entered on the form
One

An organization that contracts with CMS to process fee-for-service health care claims and perform program integrity tasks for Medicare Parts A and B is called Medicare _______________

Administrative Contractor