Across
- 3. Informed _______ must not be obtained through deception or coercion.
- 4. Informed consent includes being informed of the consequences of giving, withholding or ___________ consent.
- 6. The Clinical Support reason for BTG is used when clinical staff need access to the electronic health record and the patient is not available to provide consent, such as when __________ a lab requisition.
- 8. We are obliged to protect PHI during its lifecycle, which includes how we collect, use, disclose, ______, and destroy it.
- 10. Appropriate access is when you have a work-_______ need-to-know the information.
- 11. Do not write down your ________ or share it with anyone.
- 13. Consent must be _______.
- 14. Annual security awareness training is what for all staff?
- 16. The term the Privacy Commissioner of Ontario uses when referring to accesses to personal health information motivated by curiosity, interpersonal conflicts, or personal gain?
- 17. _____ colleague plays an essential roles in information security.
Down
- 1. As Agents, we have the duty to protect PHI not only in our legal/medical record, but also in our ________ work environment.
- 2. All emails that are suspicious for phishing should be ________ to IT.
- 4. Oral consent may be relied on only if there is _______ documentation of it.
- 5. Using the Emergency reason for BTG is restricted to when consent is not available and access is necessary to reduce a __________ risk of bodily harm.
- 6. Break-the-Glass requests are processed thru the _______ Office.
- 7. All confidential information must be destroyed via our _______ bins.
- 9. When discussing PHI we need to do our best to provide ________ privacy.
- 12. A consequence of privacy breaches is loss of _____ by patients and families, that can then effect patient care.
- 15. Access via _____-to-Discover is an access and requires a work-related need-to-know for the access to be appropriate.
- 16. The BTG password is the ____ password used when signing-in to the computer.
