Across
- 1. A method for confirming users' identities.
- 5. A virus and worm are two types.
- 6. Right to choose the conditions and the extent to which information and beliefs are shared with others. Informed consent for the release of medical records represents the application of information privacy.
- 7. The protection of physical items, objects, or areas from unauthorized access and misuse.
- 8. US law designed to provide privacy standards to protect patients' medical records and other health information provided to health plans, doctors, hospitals and other health care providers.
- 10. Electronic tool that can track system access by individual user, by user class, or by all persons who viewed a specific client record.
- 12. Unspoken understanding that private information shared in a situation in which a relationship has been established for the purpose of treatment or delivery of services will remain protected.
- 13. Freedom to do things without other people watching you or knowing what you are doing. Privacy includes the right to determine what information is collected, how it is used, and the ability to access collected information to review its security and accuracy.
- 14. Acronym for the exchange of health information electronically between providers and others with the same level of interoperability, such as labs and pharmacies.
- 16. Acronym for Health Insurance Portability and Accountability Act.
Down
- 2. Protection of information systems and the information housed on them from unauthorized use or threats to integrity.
- 3. The exchange of health information electronically between providers and others with the same level of interoperability, such as labs and pharmacies
- 4. The protection of non-tangible items such as software and data integrity from unauthorized access and misuse.
- 9. Programs written for the purpose of stealing information, causing annoyance or performing covert actions.
- 11. Data that has been interpreted.
- 15. Type of gateway designed to protect private network resources from outside hackers, network damage, and theft or misuse of information.
