Across
- 2. What term describes the unauthorized access, acquisition, or disclosure of sensitive or confidential information, potentially resulting in harm or loss?
- 4. Used to withdraw or withhold consent for the collection, use, and disclosure of their personal health information (PHI) for health care purposes.
- 6. What term refers to the protection of internet-connected systems, including hardware, software, and data, from cyberattacks?
- 8. What term describes the voluntary agreement given by an individual for the processing of their personal data for a specific purpose?
- 9. What process involves reviewing and evaluating an organization's adherence to established privacy and security measures regarding sensitive information like PHI?
- 10. Technique involves attempting to trick individuals into providing sensitive information by pretending to be trustworthy entity.
- 11. What concept focuses on measures implemented to protect individuals, property, and information from harm or damage?
- 13. What action involves verifying information or details a second time to ensure accuracy or security?
Down
- 1. What is the term for the right of individuals to keep their personal information private and away from the public eye?
- 3. What technique involves removing personally identifiable information from data sets to protect the privacy of individuals?
- 5. What process involves converting plain text or data into a coded form to prevent unauthorized access or interception?
- 6. What principle or practice emphasizes keeping sensitive information secret and limiting access to authorized individuals or entities?
- 7. What is the term for the unauthorized or covert observation of private or confidential information, often done for malicious purposes?
- 12. Any information used to identify the patient?
