Across
- 3. The _______ Privacy Rule focuses upon the protection of the privacy of people who seek care. (abbr.)
- 4. Programming of the brain, as opposed to software-which may be social, such as calling somebody claiming to be somebody else.
- 8. Surveillance software (considered to be either software or spy-ware) that has the capability to record every keystroke you make to a log file, usually encrypted.
- 9. In case your computer is infected by a virus or your system crashes, then you should have a _____ on hand. If you don't, you probably won't be able to restore important files that you were working on.
- 10. Process by which one authorizes healthcare personnel to process information based on an understanding of how it will be used
- 12. Tapping confidential information from trash
- 14. A form of spy-ware that collects information about the user in order to display advertisements in the Web browser based on the information it collects from the user's browsing patterns.
- 15. A __________ is often an email that gets mailed in chain letter fashion describing some devastating, highly unlikely type of virus.
- 16. This can slow down your computer AND watch everywhere you go on the internet.
Down
- 1. You can block or restrict unauthorized intrusions to your computer while allowing authorized communications through by using a _________.
- 2. Use this tool to dispose of documents that contain personal or financial information.
- 5. The fraudulent acquisition and use of a person's private identifying information, usually for financial gain. (2 words)
- 6. Term for when a child, pre-teen or teen is tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by another child, pre-teen or teen using the Internet, interactive and digital technologies or mobile phones.
- 7. The front line of defence in information security!
- 11. Records of IS activities
- 13. Destruction of computer equipment or records
