1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rainbow [258]
3 years ago
8

An investigator obtains consent and HIPAA authorization from subjects to review their medical records and HIV status. He plans t

o go back to the medical record, so the HIV status information is stored along with subject identifiers in a database that he keeps on his laptop computer. His laptop is stolen. This incident constitutes:
a. A FERPA violation
b. A HIPAA violation
c. An invasion of privacy
d. A breach of confidentiality
Computers and Technology
1 answer:
sertanlavr [38]3 years ago
8 0

Answer:  d)A breach of confidentiality

Explanation: Breach of confidentiality is the situation in which the confidential information kept by an authorized individual get leaked to public or any third party without the acknowledgement of the authorized party.The stolen laptop is disclosing the confidential information to third party without the consent of investigator.

Other options are incorrect because FERPA violation is the violation of the family education  rights and privacy act ,HIPPA violation is breaking rule of health insurance portability and accountability act and privacy invasion refers to intrusion in any individual's private or personal life.Thus, the correct option is option(d)

You might be interested in
Is there such a thing as an ethical reason for unauthorized access into a computer system?
Anastaziya [24]
Of course there is. On a simple level, consider a parent trying to locate their missing child. Someone might break into their social media accounts to see if there are messages that might help determine their whereabouts.

Consider a website hosting inappropriate pictures of children. Breaking into the server hosting the files and removing them is 100% ethical. 

I'm sure you can think of more examples. 
7 0
3 years ago
One way to prepare for filing the PROFILE is to:
kozerog [31]
I think I am not sure that it is probably b
8 0
3 years ago
Read 2 more answers
A wide variety of "apps" are available to customize devices. Which category of app does word processing software fall into? Ente
kkurt [141]
 word processing falls into the productivity education application.
6 0
3 years ago
Imagine that you are a professional white hat hacker, testing a company’s system to make sure they are ready for attacks. What m
liberstina [14]

Answer:

A white hat hacker, or ethical hacker, uses penetration testing techniques to test an organization's information technology

Explanation:

3 0
2 years ago
How many instructions can the microprocessor execute each second if the assembly line is present?
SpyIntel [72]

The instructions that he microprocessor can execute each second if the assembly line is present will be depending on the workload and the architecture’s core because it is all depending on the speed of the CPU and the multiplier that it acquires.

3 0
3 years ago
Other questions:
  • A geologist is part of what career feild
    6·1 answer
  • What are some consequences of internet addiction​
    9·1 answer
  • Discuss trends in cellular data transmission speeds
    15·2 answers
  • The order of precedence is very important when building formulas in Excel. Which of the following formulas will produce 778 as t
    11·1 answer
  • Declare an ArrayList of Strings. Add eight names to the collection. Output the Strings onto the console using the enhanced for l
    9·1 answer
  • Identify similarities and differences of hibiscus leaves <br>​
    14·1 answer
  • Kellyn needs to move Slide 8 of his presentation up so that it becomes Slide 6. What best describes how he can do this using the
    11·2 answers
  • Computing devices translate digital to analog information in order to process the information
    12·1 answer
  • The __________ statement allows you to check for
    7·1 answer
  • The scope of a temporary table is limited to what?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!