1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rainbow [258]
3 years ago
8

An investigator obtains consent and HIPAA authorization from subjects to review their medical records and HIV status. He plans t

o go back to the medical record, so the HIV status information is stored along with subject identifiers in a database that he keeps on his laptop computer. His laptop is stolen. This incident constitutes:
a. A FERPA violation
b. A HIPAA violation
c. An invasion of privacy
d. A breach of confidentiality
Computers and Technology
1 answer:
sertanlavr [38]3 years ago
8 0

Answer:  d)A breach of confidentiality

Explanation: Breach of confidentiality is the situation in which the confidential information kept by an authorized individual get leaked to public or any third party without the acknowledgement of the authorized party.The stolen laptop is disclosing the confidential information to third party without the consent of investigator.

Other options are incorrect because FERPA violation is the violation of the family education  rights and privacy act ,HIPPA violation is breaking rule of health insurance portability and accountability act and privacy invasion refers to intrusion in any individual's private or personal life.Thus, the correct option is option(d)

You might be interested in
What is blockchain? How it works? I heard bitcoin uses it.
igor_vitrenko [27]
Https://www.toptal.com/bitcoin/blockchain-technology-powering-bitcoin
i dont have the time to read it right now, but i was able to find you this link that should hopefully help- you out!
6 0
4 years ago
How to scan a screenshot on Brainly?
yulyashka [42]

Answer:

You go to the option that says "snap to solve" an that's it

5 0
3 years ago
Read 2 more answers
What is the computer that is connected to a<br> server
sergiy2304 [10]

Answer:

peripheral device network connection

5 0
3 years ago
Read 2 more answers
All of these valid ways to earn money in microworkers except
vovikov84 [41]

Answer:

yes u are trus

Explanation:

mark me as brainliest hehe

8 0
3 years ago
Is it possible to code your own game and if so then where should I go to learn and how to publish it?
const2013 [10]

Answer:

Yes there is

Explanation:

It is scratch a coding game to do almost anything you can also code flappybird

Hope this helps.

Have fun with scratch

4 0
2 years ago
Read 2 more answers
Other questions:
  • Give the difference betewen recursion and interation in C. Sight what are the advantages and their disadvantages?
    7·1 answer
  • Technically
    12·1 answer
  • If you wish to sign out of your Microsoft account, tap or click ____ on the ribbon to open the Backstage view and then tap or cl
    10·1 answer
  • An administrator is helping a user connect a smartphone to a tablet via Bluetooth. What should the administrator do first?
    6·1 answer
  • Which graphic file format is used for commercial purposes.
    10·1 answer
  • Explain the evolution of programming language​
    15·1 answer
  • Four examples of computer virus​
    10·1 answer
  • ¿por que hay peligros en internet?
    11·1 answer
  • Algorithm to eat orange<br><br>​
    10·2 answers
  • Write algorithm and flowchart for the following<br>a.find the sum and average of any four numbers ​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!