This activity will discuss the multiple lines of defense incorporated into the design, development, implementation, and use of EHRs to ensure their integrity and the various types of EHR transaction logs, of which the audit or access log is the most prevalent, that exist.