Healthcare Law & Ethics - Patient Privacy

12345678910111213141516171819202122
Across
  1. 4. Information that contains one or more patient identifiers (abbreviation).
  2. 7. Terms that provide for uniformity and simplification of health care billing and record keeping under HIPAA (two words).
  3. 8. A document that includes the HIPAA standards or requirements.
  4. 9. A reason for disclosing patient information under HIPAA.
  5. 11. The sending of information from one network connected computer to another (2 words).
  6. 15. Records maintained by or for a HIPAA-covered entity (3 words).
  7. 18. Freedom from unauthorized intrusion.
  8. 19. Hardware, software or both designed to prevent unauthorized persons from accessing electronic information.
  9. 20. The use of uniform electronic network protocols to transfer business information between organizations via computer networks (abbreviation).
  10. 21. A federal law passed in 1996 designed to protect privacy and health care rights for patients (abbreviation).
  11. 22. A written document detailing a health care provider’s privacy practices (abbreviation).
Down
  1. 1. The requirement under HIPAA to verify and request as legitimate before protected health information is released.
  2. 2. Term referring to the limited amount of patient information that may be disclosed, depending on circumstances (2 words).
  3. 3. Treatment, payment and health care operations (abbreviation).
  4. 5. Health care providers and clearing houses that transmit HIPAA transactions electronically, and must comply with HIPAA standards and rules (2 words).
  5. 6. A general requirement under HIPAA.
  6. 10. PHI from which certain patient identifiers have been removed (3 words).
  7. 12. Electronic exchanges of information between two covered-entity business partners using HIPAA-mandated standards (2 words).
  8. 13. The idea of the state’s laws taking precedence if the state’s privacy laws are stricter than HIPPA standards (2 words).
  9. 14. Policies and procedures that protect PHI from unauthorized access.
  10. 16. The scrambling or encoding of information before sending it electronically.
  11. 17. Transmission of information between two parties for financial or administrative activities.