The Security Rule allows covered entities and business associates to take into account: A. Their size, complexity, and capabilities B. Their technical infrastructure, hardware, and software security capabilities C. The costs of security measures D. The probability and criticality of potential risks to ePHI E. Their access to and use of ePHI F. All of the above 1) Their size, complexity, and capabilities 2) Their technical infrastructure, hardware, and software security capabilities 3) The costs of security measures 4) The probability and criticality of potential risks to ePHI 5) Their access to and use of ePHI 6) All of the above