Differentiate between the privacy rule and the security rule as it applies to actual use in the laboratory