0
[{"id":35017,"quiz_id":"3183","answer_id":null,"answerType_id":"0","created_at":"2016-02-20 14:11:16","updated_at":"2016-02-20 14:27:15","questionName":"The Privacy and Security portions seek to guard Protected Health Information (PHI) from unauthorized use or disclosure.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":0,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35028,"quiz_id":"3183","answer_id":null,"answerType_id":"0","created_at":"2016-02-20 14:19:42","updated_at":"2016-02-20 14:27:15","questionName":"Requires financial institutions to protect the confidentiality and integrity of consumer financial information. Forced them to notify consumers of their privacy practices.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":5,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35024,"quiz_id":"3183","answer_id":null,"answerType_id":"0","created_at":"2016-02-20 14:14:39","updated_at":"2016-02-20 14:27:15","questionName":"Attacks on protected computers, which include government and financial computers as well as those engaged in foreign or interstate commerce, which resulted in $5000 in damages during one year, were criminalized by this law.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":2,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35031,"quiz_id":"3183","answer_id":null,"answerType_id":"0","created_at":"2016-02-20 14:21:19","updated_at":"2016-02-20 14:27:15","questionName":"Requires organizations experiencing a personal data breach to notify them of the potential disclosure.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":6,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35027,"quiz_id":"3183","answer_id":null,"answerType_id":"0","created_at":"2016-02-20 14:18:08","updated_at":"2016-02-20 14:27:15","questionName":"Expanded law enforcement electronic monitoring capabilities. Provided broader coverage for wiretaps. Allowed for search and seizure without requiring immediate disclosure. Generally lessened the judicial oversight required of law enforcement as related to electronic monitoring.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":4,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35025,"quiz_id":"3183","answer_id":null,"answerType_id":"0","created_at":"2016-02-20 14:16:34","updated_at":"2016-02-20 14:27:15","questionName":"This law brings similar search and seizure protection to non-telephony electronic communications that were afforded to telephone communications. Effectively, it protects electronic communications from warrantless wiretapping.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":3,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35020,"quiz_id":"3183","answer_id":null,"answerType_id":"0","created_at":"2016-02-20 14:12:44","updated_at":"2016-02-20 14:27:15","questionName":"The HIPAA Security Rule provides guidance on safeguards for all except:","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":1,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35032,"quiz_id":"3183","answer_id":null,"answerType_id":"0","created_at":"2016-02-20 14:23:21","updated_at":"2016-02-20 14:27:15","questionName":"Requires financial disclosure, auditor independence, and internal security controls such as a risk assessment.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":7,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null}]