There are already a variety of technologies for verifying a computer user's identity when they attempt to access sensitive data ... data such as patients' health records on hospital computer systems.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results