Compliance Crossword
Across
- 3. Accessing PHI without a _______ business reason is a HIPAA violation.
- 6. Type of email used to send sensitive information
- 9. All IPMG employee-owners have an ________ to report HIPAA violations
- 11. Number of PHI direct identifiers
- 12. The HIPAA rule that protects the confidentiality, integrity, and availability of ePHI
- 14. Type of cyber attack that can take over a company's entire system and ask for a ransom to recover it
- 15. When should a HIPAA violation be reported?
- 17. Required when connecting device to a public network
- 18. Malicious emails used to trick people into sharing login information
- 19. Type of disposal of paper records that is a HIPAA violation
Down
- 1. Staff can report compliance concerns without fear of _________.
- 2. Where I can search for documents and other useful information related to compliance
- 4. IPMG Manual to review cyber security requirements
- 5. The company with six titles of Best Places to Work in Indiana
- 7. You should always lock this when leaving unattended
- 8. The "________ Necessary" rule prohibits the over-sharing of information when PHI is requested
- 10. The name of the Corporate Compliance Manager
- 12. Who to report HIPAA violations to, aside from the Corporate Compliance Manager
- 13. The HIPAA rule that prohibits the misuse of accessing and sharing of PHI
- 16. Only ______ applications can be used to conduct IPMG business