The computer notified me that a user accessed the PHI of a patient who is a celebrity. This is an example of a(n) ________.

1) Authentication
2) Trigger
3) Transmission security
4) Integrity