Thank you, Madam Speaker. On February 6th I asked a question and I didn’t get a
response, then I asked the same question on
February 13th . Now I’m going to try a third occasion
to ask the same type of question. What question is that? I’ve asked about the protocols to protect people’s privacy under our electronic medical records. Each time I’ve asked about what type of automatic protocol we have in place that informs the administrator of these programs that someone is cybersurfing or sometimes referred to as cyberstalking individuals.
Do we have any automatic protocols that notify the administrator that someone unauthorized to be reviewing these files, albeit they have authorization to work with these files, are peeking and sneaking through individual people’s private information? Thank you. Yes or no?