Anyone who has Access to Electronic Protected Health Information (ePHI) will:  1. Ensure the confidentiality, integrity and availability of all ePHI it creates, receives, maintains or transmits 2. Protect against any reasonably anticipated threats or hazards to the security or integrity of ePHI 3. Protect against any reasonably anticipated uses or disclosures of ePHI 4. Ensure compliance by its Continue Reading