The unauthorized acquistion, access, use, or disclosure of unsecured PHI that compromises the security or privacy of the information is called:
O a. Privacy rule
O b. Breach
O c. PHI
O d. Minimum necessary standard
1 answer
b. Breach