Across
- 1. Log off/secure devices during breaks/when not actively working at desk/end of shift; protect PHI at end of day. Two words :)
- 3. Don’t put member name/PHI identifiers here in electronic communication
- 4. Required when emailing PHI to external contacts.
- 6. Sharing/releasing PHI to someone else.
Down
- 2. Specific data points used to confirm identity (often 3 pieces).
- 5. used to verify broker identity (phone inquiries).
