HIT 410 Week 9 - Stand tall, Stand proud and be protected

12345678910
Across
  1. 2. The function and data available to the user are based on the role of the user.
  2. 4. Must include the policies required to prevent, identify, control, and resolve security incidents.
  3. 7. The means to control access and protect information from accidental or intentional disclosure to unauthorized persons and from unauthorized alteration, destruction, or loss.
  4. 8. An individual to be in charge of the security program for the CE.
  5. 10. Educates CE employees about the CE's security policies and procedures.
Down
  1. 1. The attempted or successful unauthorized access, use, disclosure, modification, or destruction of information or interference with system operations in an information system.
  2. 3. Intentional destruction, mutilation, alteration, or concealment of evidence or alteration of evidence.
  3. 5. The technology and the policy and procedure for its use that protect ePHI and controls assess to it.
  4. 6. Poor security practices that have not led to harm, whereas security incidents have resulted in harm for a significant risk of harm.
  5. 7. May be used to track keystrokes and passwords, monitor websites visited, or other actions and reports these actions to the designated person or organization.
  6. 9. Defines the minimum that a CE must do to protect electronic ePHI, which is PHI that is "created, received, or transmitted" electronically by CEs.