Problem: Explain how the HIPAA security rule influences a security risk assessment. Who has to conduct a security risk assessment and why? How are security controls and safeguards monitored for effectiveness using information risk assessments? What are some safeguards for ePHI for the management of individual access?