Which of the following are methods used to prevent unauthorized access to PHI? (Select TWO).
A.
Make backup hard copies of important medical documents.
B.
Discuss patient’s condition with medical staff.
C.
Copy data to a flash drive.
D.
Follow regulated disposal of PHI documents.
E.
Log off the computer while away.