Answered

Which of the following regulates the methods used to ensure the security of a person's PHI by systems that receive, maintain, or send PHI?