SOLUTIONS
1. What legislation protects against the interception of electronic
communications such as telephone wiretaps?
Freedom of Information Act
Wiretap Act or ECPA
Digital Millennium Copyright Act
Communications Decency Act
2. Describe the role of the urgent care facility in managing patient medical
information.
The urgent care facility collects patient information but does not
verify it.
The urgent care facility is responsible for billing and insurance
claims only.
The urgent care facility only provides treatment and does not
manage medical records.
The urgent care facility is responsible for ensuring the accuracy
of the patient's medical information stored in the EMR.
3. What is the definition of relativism?
Being applicable to a particular matter
The doctrine that knowledge, truth, and morality exist in relation
to culture, society, or historical context
Germane to the topic being considered
Being closely connected or appropriate to what is being done or
,considered
, 4. Describe how electronic health records improve patient care.
EHRs improve patient care by reducing the number of patients
seen.
EHRs improve patient care by providing quick access to patient
health information.
EHRs improve patient care by increasing paperwork.
EHRs improve patient care by eliminating the need for doctors.
5. A regulation that protects the personal data and privacy of EU citizens
passed in 2016.
Organization for Economic Co-Operation and Development
(OECD)
Council of Europe Convention of Cybercrime
The General Data Protection Regulation (GDPR)
Data Protection Directive (DPP)
6. If a financial institution fails to comply with the provisions of the Gramm-
Leach-Bliley Act, what potential consequence might it face?
Legal penalties and fines
Expansion of services offered
Reduction in operational costs
Increased customer loyalty
7. Discuss how bring your own device policies can lead to security
vulnerabilities in small- and medium-sized businesses.
Bring your own device policies eliminate the need for
cybersecurity measures.
Bring your own device policies enhance security by allowing
employees to use familiar devices.