Hipaa Test Online Free

Hipaa Test Online Free

9 – 50 Questions 12 min
This HIPAA quiz targets the Privacy Rule, Security Rule, and Breach Notification Rule decisions that happen in EHR screens, phone calls, faxes, and hallway conversations involving PHI. Reinforcing these federal HHS OCR standards is mandatory training because small shortcuts can become reportable breaches, patient harm, operational downtime, and enforcement actions including corrective action plans and civil penalties.
Choose quiz length
1Which of the following is protected health information (PHI) under HIPAA?
2Using a shared “front desk” login for the EHR violates HIPAA Security Rule accountability expectations.

True / False

3A caller asks for a patient’s lab results and says they are the patient’s spouse. What is the best next step before sharing PHI?
4You need to send a referral packet containing PHI to another clinic. Which approach is most appropriate?
5A manager asks you to export “all patient visit summaries this month” for a quick operational review. What is the best HIPAA-aligned response?
6A patient asks you to send their medical record electronically to an email address they provide. What is the most appropriate approach?
7Taking a patient photo on a personal phone and later deleting it can still create HIPAA risk.

True / False

8You realize you emailed PHI to the wrong external address. Arrange the actions in the best order.

Put in order

1Report immediately through the privacy/security incident process
2Follow the organization’s mitigation and risk assessment steps
3Preserve evidence (screenshots, email headers)
4Document key details (what, when, whose PHI, to whom)
5Stop further disclosure if possible (e.g., halt/recall per policy)
9You arrive to relieve a colleague and find an EHR session open to multiple patient charts at a busy nurses’ station. What should you do first?
10You need to fax PHI to another facility. Arrange the steps to reduce HIPAA risk.

Put in order

1Send the fax to the confirmed number
2Confirm the recipient’s fax number from a trusted source
3Verify successful transmission/confirmation
4Prepare a fax cover sheet with confidentiality notice
5Secure or dispose of printed PHI per policy
11When reporting a potential HIPAA incident internally, which detail is most important to include?
12Select all that apply: which controls support HIPAA Security Rule accountability for EHR access?

Select all that apply

13A consultant asks you to text wound photos to your personal phone and include the full medication list. Select all that apply.

Select all that apply

14You are asked to build a report for appointment reminder calls. Arrange the steps to apply “minimum necessary.”

Put in order

1Define the purpose of the report (what decision/task it supports)
2Store/share the report only through approved methods and only as long as needed
3Select only the fields needed (e.g., name, date/time, phone number)
4Apply filters to limit to the relevant date range and clinic
5Validate the output for accuracy and over-inclusion
15You discover a referral packet was faxed to the wrong number, and the unintended recipient says they deleted it. What should you do next?
16A patient asks for an electronic copy of records to be sent to an address they provide, but staff prefer printing because it feels “safer.” What should you do?
17A caller asks you to send PHI to a fax number “listed in the patient’s old note.” What is the safest next step?
18Select all that apply: which factors are commonly used in a HIPAA breach risk assessment?

Select all that apply

19An IT vendor asks for a spreadsheet with patient names, MRNs, and diagnoses to “test an interface.” What is the best response?
20An adult child calls demanding diagnosis and lab values, saying “the patient already agreed.” Arrange your best response steps in order.

Put in order

1If not authorized, explain you cannot release PHI and offer acceptable alternatives
2If authorization is confirmed, disclose only the minimum necessary for the request
3Document the call, verification outcome, and any disclosures
4Verify the caller’s identity using approved identifiers
5Check the chart/policy for documented authorization or personal representative status
21Under HIPAA, a patient can direct a covered entity to send a copy of their records to a third party they designate.

True / False

22A specialist requests wound photos and “the full med list” via personal text. What should you do?
23A person calls requesting PHI for a patient. Select all that apply: which are appropriate verification practices?

Select all that apply

Disclaimer

This quiz is for educational purposes only. It does not replace official safety training, certification, or regulatory compliance programs.

High-Risk HIPAA Mistakes in EHR, Phone, Fax, and “Quick” Messages

Most HIPAA failures aren’t malicious—they’re routine workflow decisions made without pausing to confirm purpose, minimum necessary, identity/authority, and secure channel. Use the patterns below to spot what the quiz is designed to catch before it becomes an incident.

Over-accessing PHI (minimum necessary failures)

  • Mistake: Opening a full chart (or printing/exporting entire visit summaries) when only one data element is needed for the task.
    Avoid it: Narrow by role, timeframe, patient, and data fields; stop “just in case” access and document why you accessed what you accessed.
  • Mistake: Sharing a full schedule or census list for a single follow-up call.
    Avoid it: Generate purpose-limited reports (one patient, one clinic day, one service line) and remove nonessential identifiers.

Confusing “permitted” with “unrestricted” disclosure

  • Mistake: Treating Treatment/Payment/Health Care Operations (TPO) as a blanket permission to disclose any PHI to any internal staff member.
    Avoid it: Confirm the recipient’s need-to-know and share only what supports the specific treatment or operational purpose.
  • Mistake: Discussing PHI in semi-public areas (elevators, nurses’ stations, lobbies) because “everyone here is staff.”
    Avoid it: Lower your voice, move to a private space when possible, and avoid patient names when they aren’t necessary to communicate safely.

Weak identity verification before releasing PHI

  • Mistake: Disclosing results to a caller who “sounds like family” or claims to be a physician’s office without verification.
    Avoid it: Use your organization’s approved identifiers and call-back procedures (trusted directory, verified number, documented authorization when required).

Uncontrolled tools: texting, photos, email, fax

  • Mistake: Sending PHI using personal SMS/consumer messaging, personal email, or storing wound photos on a personal phone.
    Avoid it: Use only organization-approved secure platforms; prevent auto-backups to personal cloud services; share the minimum necessary clinical content.
  • Mistake: Faxing to an old number or skipping a cover sheet/confirmation.
    Avoid it: Verify the destination each time, use cover sheets, confirm successful transmission, and retrieve faxes promptly.

Breaking accountability controls and delaying reporting

  • Mistake: Shared logins, badge sharing, unattended unlocked sessions, or “I’ll report it after I fix it.”
    Avoid it: Keep access unique and auditable, lock screens every time you step away, and report suspected incidents immediately so risk assessment and notification decisions can start on time.

HIPAA Decision Drills: Permissible Disclosures, Secure Handling, and Breach Triage

Use these short prompts the way you’d use a pre-flight checklist: identify the rule that applies, then choose the lowest-risk action that still supports care and operations. For each drill, state what you would do now, what you would document, and who you would notify internally.

Privacy Rule: disclosure judgment calls

  • Family member on the phone: An adult child requests lab results and says, “My mom told me to call.” Decide: What verification steps do you use, what details (if any) can you share, and how do you handle a patient who previously asked for “no disclosures to family”?
  • Front-desk request: A clinician asks you to print “everything from the last year” before a same-day visit. Decide: What is minimum necessary for the immediate purpose, and what alternatives avoid broad printing?
  • Consult request: A specialist asks for the full med list plus unrelated prior notes “for context.” Decide: What information is actually needed for the consult question, and how do you limit the disclosure while still supporting treatment?

Security Rule: safeguards in real workflow

  • Open workstation during a rapid response: You arrive to relieve a colleague and find an EHR session open to multiple charts at a busy nurses’ station. Decide: What immediate step protects PHI without disrupting care, and what follow-up coaching/reporting is appropriate?
  • Wound photo request by text: A provider asks you to text wound photos to their personal number “because the app is slow.” Decide: Which approved channel to use, what identifiers to exclude if possible, and how you prevent local device storage and auto-backup.
  • Removable media: A coworker copies a patient list to a USB drive to “finish at home.” Decide: What policy/safeguards should apply (encryption, authorization, tracking), and what is the safer workflow?

Breach response: triage and timing

  • Misdirected email: A discharge summary is emailed to the wrong external address, and you receive a delivery confirmation. Decide: What information do you gather immediately (what was sent, to whom, whether opened), what mitigation attempts are appropriate, and when you escalate to privacy/security?
  • Paper PHI left behind: You find a printed face sheet in a public waiting area. Decide: How you secure the document, how you determine exposure, and what you document for the incident assessment.

Authoritative HIPAA References (HHS OCR, ONC, and NIST)

Use these primary sources to confirm definitions, exceptions, and required steps when a workflow decision involves PHI/ePHI.

HIPAA Quiz FAQs: Minimum Necessary, TPO, and Breach Timelines

When does the HIPAA “minimum necessary” standard apply in real work?

Apply minimum necessary when you are using PHI, disclosing PHI, or requesting PHI for a purpose that does not require the full record. Common triggers include scheduling, referrals, quality work, audits, and administrative coordination. It is not a license to browse the chart; the quiz will expect you to limit both what you access and what you share to what the task requires.

Is “treatment” the same as “any internal sharing is fine”?

No. Treatment disclosures are broadly permitted, but you still need to share with the right person for the right clinical purpose and avoid dumping unrelated history “because it might matter.” A useful quiz habit is to name the clinical question (e.g., anticoagulation status for a procedure) and send only the elements that answer it. For broader compliance context beyond HIPAA, pair this with Free Healthcare Compliance Training.

Can I give PHI to a family member over the phone if they say the patient approved it?

Only after you follow your organization’s verification and authorization workflow. The safest approach is to (1) verify the caller’s identity, (2) confirm the patient’s preferences/any restrictions in the record, and (3) limit details to what the patient agreed to share. If the patient is not present or is unable to agree, disclosures to people involved in care may still be possible in some situations, but the quiz will expect you to use documented policy and professional judgment—not assumptions.

Do wound photos, screenshots, and “quick texts” count as PHI?

Yes if they can identify the patient directly (name, MRN, face) or indirectly (unique circumstance combined with date/location). The risk is often where the image lands: personal camera roll, automatic cloud backup, shared message threads, or an unapproved app. In quiz scenarios, the best answer usually combines an approved secure channel, minimum necessary content (crop/avoid identifiers where possible), and clear deletion/retention handling per policy.

What’s the timeline for HIPAA breach notification that people miss?

HIPAA requires notification to affected individuals without unreasonable delay and no later than 60 days after discovery of a breach of unsecured PHI, with additional reporting obligations to HHS and, for larger events, to the media. The quiz focuses on what you control: report suspected incidents immediately through your internal process so the organization can complete the risk assessment, mitigation, and required notifications on time.

Does HIPAA apply to students, temps, and vendors who “aren’t employees”?

Often, yes. Many organizations treat employees, volunteers, trainees, and other supervised personnel as part of the workforce for HIPAA purposes, meaning they must follow the same access, disclosure, and safeguard rules. Vendors who handle PHI for functions like billing, IT, transcription, or shredding may be business associates and should be covered by appropriate contracting and security expectations. In quiz items, assume that “not an employee” does not equal “free to share PHI.”