PAW 2024 Crossword Puzzle

12345678910111213141516171819
Across
  1. 3. Always access and transmit patient data ________.
  2. 6. When faxing, ensure that the fax _____-sheet is free of any PHI.
  3. 8. If someone contacts you requesting information about a confidential patient, the response should be “I do not have any information available for that ______”.
  4. 9. Snooping may be motivated by _________, concern about the health and well-being of others, interpersonal conflicts, or personal gain.
  5. 11. Always verify the source of emails and links ______ clicking.
  6. 14. All access to personal health information must be limited to what is _________ to perform your job duties.
  7. 16. Loss of _____ by patients and families may be one of the consequences of a privacy breach.
  8. 18. When verbally disclosing information, _____ the information shared to what is necessary for the purpose.
  9. 19. The patient must be informed of the purpose of the _________, use, or disclosure of their PHI.
Down
  1. 1. If you notice anything unusual about your system’s performance or receive __________ messages, report them immediately to our IT cybersecurity team.
  2. 2. When mailing information, ensure that the person named on the ________ is authorized to receive every document included within.
  3. 3. A patient may be confidential not only for privacy reasons but also potentially for ______ reasons.
  4. 4. Check twice that all information is the correct information for the correct person _____ to releasing it.
  5. 5. If a patient does not wish for it to be disclosed that they are in the facility, they can request to add a ____________ patient flag.
  6. 7. All access to personal health information must be for a ____ -related need-to-know.
  7. 10. Consent must be _________, whether it is written or verbal.
  8. 12. ____________ is a crucial aspect that safeguards both our information and our patients’ trust.
  9. 13. Contact the ______ ______ if you have been made aware of PHI being disclosed inappropriately.
  10. 15. Defined by the Information and Privacy Commissioner of Ontario (IPC) as, the unauthorized access of PHI which may be motivated by several factors.
  11. 17. If a patient has added a restriction to accessing their information, the authorization to override the consent directive must be documented in a ______ manner.