Explain at least two (2) individual rights for patients regarding EMR and their healthcare information. Next, describe three (3) basic safeguards required to protect the security of e-PHI. Lastly, speculate on what happens if a breach occurs. Provide support for your response.