answersLogoWhite

0

Information technology and the associated policies and procedures that are used to protect and control access to ePHI

User Avatar

Wiki User

7y ago

What else can I help you with?