Reference no: EM132304493
Discussion 1
Respond to student ...state tudent your response...100 word min
Reading patient's medical records without authorization comes under HIPAA violation - Unauthorized access of PHI. If I found an employee reading patients details, I will enquire about it, find details that the employee is actually violating rules.
Then, I will immediately report it to concern authorities. If the employee is intentionally reading the details then my delay is enough for that employee to sell patients details in dark market. Therefore, I will inform it as soon as possible.
If the employee is unaware of the violation then it comes under TIER 1 that fine $100 - $50,000 per violation. If it is an intentional violation then it can lead to maximum of $1.5 million per year according to its intensity and negligence.
Reference:
What is a HIPAA Violation? (2018, March 14).
Discussion 2
Respond to student ...state your response...NO REFERENCES, NO CITATIONS... 100 word min
The communication to the email account holders should be very clear that their emails will be read for marketing purposes. This probably would not sit well with the majority of users. Do you think advertising firms take advantage of the 'fine print' that readers probably do not read and understand? Would you consent?
Discussion 3
Respond to student ...state your response...100 word min
When creating a system to target ads based on an email I think about privacy. Today email addresses are important as most anyone with a smartphone has one and has access to an inbox. Email address can now be used to target previous customers and (opted in) contacts through the use of ads and custom audiences. (Finn, 2016).
One example of ad targeting is Google who has been mining email content (scanning email) to target ads. Prior to the actual engagement, this has to be presented in the privacy policy and the user must give consent.
The design should take into consideration the creation of a privacy policy, and explain what will be used, how, and if it will be stored. This is because emails will be scanned to personalize ad targeting. Of the emails that are scanned what is being stored? How secure is it? Does it include any personal information or details? These are some of the questions that should be answered during the design process.
Finn, G. (2016). How to Use Email Addresses for Ad Targeting on Google, Facebook & Twitter. CypressNorth.
Discussion 4
Respond to student ...state your response...100 word min
The company should consider a way to opt-out of receiving future emails from its system if users are not interested. The system design must include a clear and conspicuous mechanism for opting-out of receiving email from the company in the future ("Understanding Email Laws and Regulations", n.d.).
And that mechanism should be easy for an ordinary person to recognize and understand. Besides, the company must honor a recipient's opt-out request within 10 business days and do not charge a fee to opt the users out. Require the recipient to give the company any personally identifying information beyond an email address or make the recipient take any step other than sending a reply email to opt out ("Understanding Email Laws and Regulations", n.d.).
Understanding Email Laws and Regulations. (n.d.).
Sales revenue on physical disc
: What are some problems faced by GameStop store with their sales revenue on physical disc and how other digital platforms can affect them from competing against.
|
List two benefits of the it strategy to use a saas solution
: Identify three things the CIO and his team should look for as they consider which SaaS vendor to select.
|
Evaluate the clustering result using accuracy
: DATA ANALYTICS: BANK MARKETING - Evaluate the clustering result using Accuracy. For PCA, you can generate a scatter plot using the first two components
|
How have they partnered with other local government agencies
: How have they partnered with other local government agencies (i.e., law enforcement, EMS, school district, etc.)? How have they partnered with private.
|
What is a hipaa violation
: Reading patient's medical records without authorization comes under HIPAA violation - Unauthorized access of PHI.
|
The work done by human experts will change going forward
: What are some business problems that AI + Machine Learning paradigm cannot solve? How do you think the work done by human experts will change going forward?
|
Discussing ways to achieve greater balance of power
: Using the U.S. Constitution, library, Internet, or any other available materials, focus your discussion on the following: Discuss 3 ways to achieve greater.
|
Write clearly and concisely about issues in law
: Write clearly and concisely about issues in law and the legal system using proper writing mechanics. Include a brief summary of the case
|
Identify the branch of government that created lower courts
: In this unit, you are studying the judicial branch of government and the rules that apply to all cases that are filed with a court, such as jurisdiction.
|