logo

Which of the following are breach prevention best practices?

A. All of the above

B. Access only the minimum amount of PHI/personally identifiable information (PII) necessary

C. Log off or lock your workstation when it is unattended

D. Promptly retrieve documents containing PHI/PII from the printer

Answer

All the provided options (B, C, D) are considered best practices in breach prevention involving PHI/PII. These include only accessing necessary PHI/PII, securing unattended workstations, and promptly retrieving printed documents containing sensitive information.

Explanation:

The best practices for breach prevention under the given options are in fact all of them. Accessing only the minimum amount of Protected Health Information (PHI) or personally identifiable information (PII) necessary (B) is a proven method of breach control. Additionally, ensuring to logoff or lock your workstation when it's unattended (C) can further prevent unauthorized access to sensitive information. Lastly, promptly retrieving documents containing PHI/PII from the printer (D) prevents inadvertent breaches premised on the physical access of these documents. Hence, practicing all these methods would yield optimal prevention of data breaches, especially concerning PHI/PII.

Get Expert Solution