To establish procedures to ensure that access to the Company’s System (including PHI data contained therein) is properly controlled. 

Due in (days): 7