Across
- 2. Contract ensuring vendors safeguard PHI
- 3. Method to scramble data to protect ePHI
- 5. Information that HIPAA protects
- 8. Federal law that protects health information and sets rules for its use
- 9. Events involving unauthorized access or disclosure of PHI
- 10. Government department that enforces HIPAA
- 12. Process of removing identifiers from PHI
Down
- 1. Must never be shared to protect system access
- 4. HIPAA rule that controls who can see or share health info
- 6. Attack where someone tricks you into giving personal info
- 7. Covered _____ must comply with HIPAA rules
- 11. How often HIPAA training is required after hire
