Which of the following is NOT true about using mobile devices to access protected health information (PHI)?
a. The device itself should be password protected.
b. The device's software should be password protected.
c. These devices are good for long-term storage of PHI.
d. Data transfers must be encrypted.
c
You might also like to view...
How does cryptography provide confidentiality of information?
What will be an ideal response?
Controlled substances have been categorized according to their potential for ____________________ and their ____________________ abilities
Fill in the blank(s) with correct word
Two means of measuring the amount of medication to be administered are by:
A) weight and volume B) color and odor C) volume and color D) odor and weight
An isotonic contraction of the muscle is one that ________________
a. produces no movement at the joint b. produces movement at the joint c. Neither answer is correct.