Across
- 2. 1996; made up of the privacy, security and breach notification rules
- 7. securing digital data with a password or key
- 8. acquiring PHI in a manner that compromises the security or privacy of PHI
- 9. keeping patient records from unwarranted view
- 10. automated processes used to protect data and control access
- 12. electronic protected health information
Down
- 1. includes risk analysis, risk management and information security activities
- 3. fine paid for breaking the law
- 4. used to obtain sensitive information, primarily via email
- 5. measures that protect electronic systems, equipment and data they hold
- 6. control user access to safeguard ePHI from erroneous leaks
- 11. covered entity
