The unauthorized acquistion, access, use, or disclosure of unsecured PHI that compromises the security or privacy of the information is called:

O a. Privacy rule
O b. Breach
O c. PHI
O d. Minimum necessary standard

1 answer

b. Breach