of access must occur where appropriate and feasible in log form, comments in EPIC, HIM or McKesson or other available media..., and end-users through analysis, definition, verification, and validation to ultimately ensure that the evolving application...