Across
- 4. What emails are you supposed to report to IT?
- 5. What is a security measure that requires at least two forms of identification?
- 7. Who is a person who gains unauthorized access to computer systems?
- 9. What is the process of converting data into a secure format?
- 11. Who is the HR Reporting Officer?
- 12. What are you supposed to do to your computer to not receive a blue HIPAA Hippo?
- 13. What is the term for the agreement between covered entities and business associates?
- 14. You are the first line of ___ in protection of DDID and AHS
Down
- 1. What type of malicious software is designed to block access to a computer system until a sum of money is paid?
- 2. What is a central concept of HIPAA that protects individuals' health information?
- 3. Who is the HIPAA Privacy Officer?
- 6. What is the term for malicious software?
- 8. Who is the Security Officer?
- 10. What are all DDID and AHS employees supposed to wear so it can be seen to adhere to security best practices?
