There are already a variety of technologies for verifying a computer user's identity when they attempt to access sensitive data ... data such as patients' health records on hospital computer systems.
Results that may be inaccessible to you are currently showing.
Hide inaccessible results