Compliance Crossword

12345678910111213141516171819
Across
  1. 3. Accessing PHI without a _______ business reason is a HIPAA violation.
  2. 6. Type of email used to send sensitive information
  3. 9. All IPMG employee-owners have an ________ to report HIPAA violations
  4. 11. Number of PHI direct identifiers
  5. 12. The HIPAA rule that protects the confidentiality, integrity, and availability of ePHI
  6. 14. Type of cyber attack that can take over a company's entire system and ask for a ransom to recover it
  7. 15. When should a HIPAA violation be reported?
  8. 17. Required when connecting device to a public network
  9. 18. Malicious emails used to trick people into sharing login information
  10. 19. Type of disposal of paper records that is a HIPAA violation
Down
  1. 1. Staff can report compliance concerns without fear of _________.
  2. 2. Where I can search for documents and other useful information related to compliance
  3. 4. IPMG Manual to review cyber security requirements
  4. 5. The company with six titles of Best Places to Work in Indiana
  5. 7. You should always lock this when leaving unattended
  6. 8. The "________ Necessary" rule prohibits the over-sharing of information when PHI is requested
  7. 10. The name of the Corporate Compliance Manager
  8. 12. Who to report HIPAA violations to, aside from the Corporate Compliance Manager
  9. 13. The HIPAA rule that prohibits the misuse of accessing and sharing of PHI
  10. 16. Only ______ applications can be used to conduct IPMG business