Difference between revisions of "North Carolina"
Jump to navigation
Jump to search
(Created page with "{|class="wikitable sortable collapsible" !Name of Article !Specific Clauses or the Law !Scope !Mapping |- |75-66 (Identity Theft Protection Act) |(a) It shall be a viola...") |
(Replaced content with "{|class="wikitable sortable collapsible" !Name of Article !Specific Clauses or the Law !Scope !Mapping |- |Identity Theft Protection Act | |Health/Genetic |§75.66-(...") Tag: Replaced |
||
Line 5: | Line 5: | ||
!Mapping | !Mapping | ||
|- | |- | ||
− | | | + | |[[Identity Theft Protection Act]] |
− | | | + | | |
|Health/Genetic | |Health/Genetic | ||
|§75.66-(a)disclosure | |§75.66-(a)disclosure | ||
|- | |- | ||
− | |N.C. Gen. Stat. §58-2-105 (Confidentiality of Medical and Credentialing Records) | + | |[[N.C. Gen. Stat. §58-2-105]] (Confidentiality of Medical and Credentialing Records) |
− | | | + | | |
− | |||
− | |||
|Health/Genetic | |Health/Genetic | ||
|58-2-105-(a)-breach of confidentiality, (b)-disclosure, (c)-breach of confidentiality | |58-2-105-(a)-breach of confidentiality, (b)-disclosure, (c)-breach of confidentiality | ||
|- | |- | ||
− | |N.C. Gen. Stat. §58-39-45 (Access to Recorded Personal Information) | + | |[[N.C. Gen. Stat. §58-39-45]] (Access to Recorded Personal Information) |
− | | | + | | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
|Health/Genetic | |Health/Genetic | ||
|58-39-45-(a)interrogation, (a)(1)-decisional interference, (a)(2)-exclusion, (a)(3)-identification, disclosure, (a)(4)-exclusion, (f)-aggregation | |58-39-45-(a)interrogation, (a)(1)-decisional interference, (a)(2)-exclusion, (a)(3)-identification, disclosure, (a)(4)-exclusion, (f)-aggregation | ||
|- | |- | ||
− | |N.C. Gen. Stat. §132-1.10 (Social Security Numbers and other Personal Identification Information) | + | |[[N.C. Gen. Stat. §132-1.10]] (Social Security Numbers and other Personal Identification Information) |
− | | | + | | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
|Health/Genetic | |Health/Genetic | ||
|(a)(1)-identification, (a)(2)-surveillance, (a)(3)-insecurity, aggregation, (b)(1)-surveillance, (b)(2)-insecurity, (b)(3)-insecurity, (b)(4)-secondary use, (b)(5)-identification, increased accesibility, (b)(6)-insecurity, (b)(7)-interrogation, (b)(8)- interrogation, (b)(9)-insecurity, (c)(1)-disclosure, (c)(2)-disclosure, (c)(3)-disclosure, (c)(4)-identification, (c)(5)-disclosure, (c)(6)-aggregation, (c)(7)-increased accesibility, (d)-interrogation, (e)-insecurity, (f)-decisional interference, insreased accesibility, (f1)-insecurity, (f2)-breach of confidentiality, (g)(1)(2)-insecurity, identification, disclosure, increased accesibility, (h)-increased accesibility | |(a)(1)-identification, (a)(2)-surveillance, (a)(3)-insecurity, aggregation, (b)(1)-surveillance, (b)(2)-insecurity, (b)(3)-insecurity, (b)(4)-secondary use, (b)(5)-identification, increased accesibility, (b)(6)-insecurity, (b)(7)-interrogation, (b)(8)- interrogation, (b)(9)-insecurity, (c)(1)-disclosure, (c)(2)-disclosure, (c)(3)-disclosure, (c)(4)-identification, (c)(5)-disclosure, (c)(6)-aggregation, (c)(7)-increased accesibility, (d)-interrogation, (e)-insecurity, (f)-decisional interference, insreased accesibility, (f1)-insecurity, (f2)-breach of confidentiality, (g)(1)(2)-insecurity, identification, disclosure, increased accesibility, (h)-increased accesibility | ||
|- | |- | ||
− | |[https://www.ncleg.net/EnactedLegislation/Statutes/PDF/ByArticle/Chapter_90/Article_29.pdf Medical Records (2014)] | + | |[https://www.ncleg.net/EnactedLegislation/Statutes/PDF/ByArticle/Chapter_90/Article_29.pdf Medical Records (2014)] [[Medical Records (2014)]] |
− | + | | | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
|Health | |Health | ||
|§90-411-surveillance, §90-412-a-increased accesibility, b-decisional interference | |§90-411-surveillance, §90-412-a-increased accesibility, b-decisional interference |
Revision as of 07:12, 22 March 2020
Name of Article | Specific Clauses or the Law | Scope | Mapping |
---|---|---|---|
Identity Theft Protection Act | Health/Genetic | §75.66-(a)disclosure | |
N.C. Gen. Stat. §58-2-105 (Confidentiality of Medical and Credentialing Records) | Health/Genetic | 58-2-105-(a)-breach of confidentiality, (b)-disclosure, (c)-breach of confidentiality | |
N.C. Gen. Stat. §58-39-45 (Access to Recorded Personal Information) | Health/Genetic | 58-39-45-(a)interrogation, (a)(1)-decisional interference, (a)(2)-exclusion, (a)(3)-identification, disclosure, (a)(4)-exclusion, (f)-aggregation | |
N.C. Gen. Stat. §132-1.10 (Social Security Numbers and other Personal Identification Information) | Health/Genetic | (a)(1)-identification, (a)(2)-surveillance, (a)(3)-insecurity, aggregation, (b)(1)-surveillance, (b)(2)-insecurity, (b)(3)-insecurity, (b)(4)-secondary use, (b)(5)-identification, increased accesibility, (b)(6)-insecurity, (b)(7)-interrogation, (b)(8)- interrogation, (b)(9)-insecurity, (c)(1)-disclosure, (c)(2)-disclosure, (c)(3)-disclosure, (c)(4)-identification, (c)(5)-disclosure, (c)(6)-aggregation, (c)(7)-increased accesibility, (d)-interrogation, (e)-insecurity, (f)-decisional interference, insreased accesibility, (f1)-insecurity, (f2)-breach of confidentiality, (g)(1)(2)-insecurity, identification, disclosure, increased accesibility, (h)-increased accesibility | |
Medical Records (2014) Medical Records (2014) | Health | §90-411-surveillance, §90-412-a-increased accesibility, b-decisional interference |