Privacy and Security

123456789101112
Across
  1. 2. 1996; made up of the privacy, security and breach notification rules
  2. 7. securing digital data with a password or key
  3. 8. acquiring PHI in a manner that compromises the security or privacy of PHI
  4. 9. keeping patient records from unwarranted view
  5. 10. automated processes used to protect data and control access
  6. 12. electronic protected health information
Down
  1. 1. includes risk analysis, risk management and information security activities
  2. 3. fine paid for breaking the law
  3. 4. used to obtain sensitive information, primarily via email
  4. 5. measures that protect electronic systems, equipment and data they hold
  5. 6. control user access to safeguard ePHI from erroneous leaks
  6. 11. covered entity