an employee access PHI on a computer system that does not relate to her job functions. what security mechanism should have been implemented to minimize the security breach
a. access controls
b. audit controls
c. contingency controls
d. security incident controls
Answer: a