Final answer:
The best practices for breach prevention include accessing the minimum amount of sensitive information necessary, logging off or locking workstations when unattended, and promptly retrieving documents with sensitive information from printers.
Step-by-step explanation:
The best practices for breach prevention include:
- Access only the minimum amount of PHI/ personally identifiable information (PII) necessary: This means only accessing the information that is required for your specific task or job responsibilities, rather than browsing or accessing unnecessary information.
- Logoff or lock your workstation when it is unattended: This ensures that no unauthorized access can occur when you are away from your computer or workstation.
- Promptly retrieve documents containing PHI/PII from the printer: Leaving documents containing sensitive information unattended in the printer can increase the risk of unauthorized access. It is important to promptly retrieve and secure such documents to prevent breaches.
Therefore, the correct answer is d) all of the above.