Security and Ethical IT Challenges in Healthcare

1234567891011
Across
  1. 2. Doctors can consult with patients via this method.
  2. 4. Software that is specifically intended to protect a particular machine or network from the intrusion of software-based viruses.
  3. 5. Process of bringing together smaller subsystems into one system and ensuring that the subsystems function together as a system
  4. 8. The goal of HIPAA
  5. 10. Electronically stored information about individuals
  6. 11. A digital version of a patient's paper chart.
Down
  1. 1. Federal law that governs the use and disclosure of health information.
  2. 3. is hardware, software, telecommunications, database management and other information processing technologies used in computer based information systems.
  3. 6. Granted access to data warehouses full of patient-care and insurance records.
  4. 7. Provides clinicians, staff and patients with the filtered knowledge and person-specific information.
  5. 9. Computers , communications processors and software that protect computer networks from intrusions by screening all network traffic and serving as a safe transfer point for access to and from other networks.