Privacy and Security

123456789
Across
  1. 3. Covered Entity Service Provider (1st Word)
  2. 4. ___________ Identifiable Information
  3. 5. Cybercrime (e.g., action request by email)
  4. 6. Unauthorized access of PHI (non-breach)
  5. 7. __________ Health Information
  6. 8. PHI Law
  7. 9. Altarum PHI Oversight Body
Down
  1. 1. Form of Secure Electronic Submission
  2. 2. Covered Entity Service Provider (2nd Word)
  3. 7. Secret Word (unlocks computer)