Permissions granted in an electronic health record system involve _____.
A) Authenticating individual entries made in the EHR
B) Ensuring that people are who they say they are
C) Levels of access granted to an operating system
D) Preventing malicious attempts to destroy health data
Question 2
Authentication of an electronic health record _____.
A) Ensures that people are who they say they are
B) Is accomplished by a method to prevent eavesdropping
C) Refers to the level of access to an operating system
D) Prevents malicious attempts to damage healthcare data