The purpose of this security rule standard is to implement technical policies and procedures for electronic information systems that maintain electronic PHI, and to allow access only to those persons or software programs that have been granted access rights:
Conducting an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality, integrity, and availability of electronic PHI is: