1. Provide an assessment of the vulnerability for multiple locations in the health care system.
2. Discuss the potential harm that can result from authorized individuals accessing patient information.
3. Explain the impact if an unauthorized person gains access to the electronic health care system.
4. Discuss potential legal cases that may ensue if data is accessed from outside the health care network.
5. Identify regulations health care facilities must follow to help protect patient information.