Across
- 3. Covered Entity Service Provider (1st Word)
- 4. ___________ Identifiable Information
- 5. Cybercrime (e.g., action request by email)
- 6. Unauthorized access of PHI (non-breach)
- 7. __________ Health Information
- 8. PHI Law
- 9. Altarum PHI Oversight Body
Down
- 1. Form of Secure Electronic Submission
- 2. Covered Entity Service Provider (2nd Word)
- 7. Secret Word (unlocks computer)
