Data breach/leak of protected information
Control
Monitor access to systems containing protected health information (i.e., who has access and what is accessed)
Monitor access to systems containing protected health information (i.e., who has access and what is accessed)