The Security Rule allows covered entities and business associates to take into account: {Ans: All of the above}Which of the following is NOT an example of physical security? {Ans: Data encryption}The five titles under HIPAA fall logically into which two major categories: {Ans: Administrative Simplification and Insurance Reform}What does PHI stand for? {Ans: Protected Health Information}An authorization is required for which of the following? {Ans: Non-routine disclosures}De-Identification refers to ensuring that all of the individually identifiable information is identified and included in any HIPAA standard transaction. {Ans: False}Of the following, which are implications of non-compliance with HIPAA? {Ans: All of the above}Which of the following are requirements associated with the Notice of Privacy Practices? {Ans: All of the above}The HIPAA Security Rule is a technology neutral, federally mandated "floor" of protection whose primary objective is to protect the confidentiality, integrity, and availability of individually identifiable health information in electronic form when it is stored, maintained, or transmitted. {Ans: True}Which of the following statements is accurate regarding the "Minimum Necessary" rule in the HIPAA regulations? {Ans: Covered entities and business associated are required to limit the use or disclosure or PHI