Compliance & Security Week Part 2!
Across
- 2. What are all DDID/AHS employees supposed to wear so it can be seen as a best practice of security?
- 5. What is the term for the agreement between covered entities and business associates?
- 6. What is the term for malicious software?
- 9. The person that exploits vulnerabilities for malicious purposes
- 12. Who is the DDID Security Officer?
- 14. What is the process of converting data into a secure format?
- 15. What confidential information does DDID protect?
- 16. What color is the HIPAA Hippo?
Down
- 1. What is the over the phone voice call type of scam?
- 3. What is the term for a security incident that disrupts services?
- 4. Who is the HR Reporting Officer?
- 7. What is the process of verifying identity?
- 8. This occurs when an unauthorized person gains access to sensitive or protected information
- 10. What is the term for a legal requirement to protect data?
- 11. The document that outlines security practices
- 13. You are the first line of ____ in protection DDID and AHS
- 15. What's an organization's overall ability to protect against, detect, respond to and recover from cyber threats? (It's like a straight back when you sit or stand)