This training describes the Security Rule, including risks to handling ePHI; administrative, physical, and technical safeguards to protect it; and use of mobile devices and social media related to PHI. The course objectives are to: • Identify which information is considered electronic PHI (ePHI). • Describe the reason the Security Rule was established. • Recognize the steps organizations and their members must take to protect ePHI. • Understand the three security measures required by the Security Rule: administrative, technical, and physical safeguards.