Although Roberta had signed a form preventing her doctor from sharing her personal medical records with the company she worked for, she later discovered that the doctor's office had, in fact, shared her data with her health insurance provider and her employer, which caused her to be terminated.? Because the doctor's practice violated its own privacy policy, she was able to file a lawsuit under the ________.

A. ?Health Insurance Portability and Accountability Act
B. ?Health and Medical Records Privacy Act
C. ?Gramm-Leach-Bliley Act
D. none of these answers


Answer: A

Computer Science & Information Technology

You might also like to view...

Which of the following statements is false?

a. Each function should perform a single, well-defined task. b. The following code calls function square twice. We’ve replaced each of the output values with ???. The first call produces the int value 49 and the second call produces the int value 6: In [1]: def square(number): ...: """Calculate the square of number.""" ...: return number ** 2 ...: In [2]: square(7) Out[2]: ??? In [3]: square(2.5) Out[3]: ??? c. The statements defining a function are written only once, but may be called “to do their job” from many points in a program and as often as you like. d. Calling square with a non-numeric argument like 'hello' causes a TypeError because the exponentiation operator (**) works only with numeric values.

Computer Science & Information Technology

A bubble sort is more efficient than a selection sort because only one swap is made in each pass.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A hyperlink is a ____ in an e-mail message or on a Web page that, when clicked, directs you to another document or Web site.

A. word B. phrase C. symbol D. any of the above

Computer Science & Information Technology

Theft of information, use of a computer to commit sabotage or embezzlement, and fraudulent use of a computer are examples of ____.

A. waste of resources B. piracy C. viruses D. computer crimes

Computer Science & Information Technology