Security and Privacy in Clinical Research

1234567891011121314151617181920
Across
  1. 4. Adherence to laws, regulations, and guidelines in healthcare
  2. 6. HIPAA-compliant method to remove identifiable information (two words, remove space)
  3. 8. Assurance of the accuracy and consistency of data over its lifecycle
  4. 9. Legislation that protects personal health information in the U.S.
  5. 10. Right to control the disclosure of personal health information
  6. 11. Secure connection method for remote access to a network
  7. 13. Access control based on permissions and roles
  8. 15. Security system that controls incoming and outgoing network traffic
  9. 16. Keeping patient information private and secure
  10. 17. Desire to keep one's identity unknown
  11. 19. Verification of identity using passwords, tokens, or keys
Down
  1. 1. Removing or altering personal information from data sets to protect privacy
  2. 2. Measures to protect data from unauthorized access
  3. 3. Ensuring reliable access to healthcare services and data systems
  4. 5. Scrambling data to prevent unauthorized interception
  5. 7. Incident involving unauthorized release or exposure of private data
  6. 12. Fraudulent attempt to obtain sensitive information by impersonating a trustworthy entity
  7. 14. Removing identifiers from data to preserve privacy
  8. 18. Agreement by patients to participate in research and share data
  9. 20. Tool funded by NIH for data analysis and patient cohort identification