Privacy Awareness Week (May 13-17, 2024)

12345678910111213
Across
  1. 2. What term describes the unauthorized access, acquisition, or disclosure of sensitive or confidential information, potentially resulting in harm or loss?
  2. 4. Used to withdraw or withhold consent for the collection, use, and disclosure of their personal health information (PHI) for health care purposes.
  3. 6. What term refers to the protection of internet-connected systems, including hardware, software, and data, from cyberattacks?
  4. 8. What term describes the voluntary agreement given by an individual for the processing of their personal data for a specific purpose?
  5. 9. What process involves reviewing and evaluating an organization's adherence to established privacy and security measures regarding sensitive information like PHI?
  6. 10. Technique involves attempting to trick individuals into providing sensitive information by pretending to be trustworthy entity.
  7. 11. What concept focuses on measures implemented to protect individuals, property, and information from harm or damage?
  8. 13. What action involves verifying information or details a second time to ensure accuracy or security?
Down
  1. 1. What is the term for the right of individuals to keep their personal information private and away from the public eye?
  2. 3. What technique involves removing personally identifiable information from data sets to protect the privacy of individuals?
  3. 5. What process involves converting plain text or data into a coded form to prevent unauthorized access or interception?
  4. 6. What principle or practice emphasizes keeping sensitive information secret and limiting access to authorized individuals or entities?
  5. 7. What is the term for the unauthorized or covert observation of private or confidential information, often done for malicious purposes?
  6. 12. Any information used to identify the patient?