![]() |
||
| Module 3 Activity: State of Connecticut Case Study — Potential Security Rule Violations Referring to the State of Connecticut case in module 1, which Security Rule violations seem to have potentially occurred? Upon completion of this activity, please close the activity window to return to the course, and then select Next to continue. |
||