Across
- 4. Adherence to laws, regulations, and guidelines in healthcare
- 6. HIPAA-compliant method to remove identifiable information (two words, remove space)
- 8. Assurance of the accuracy and consistency of data over its lifecycle
- 9. Legislation that protects personal health information in the U.S.
- 10. Right to control the disclosure of personal health information
- 11. Secure connection method for remote access to a network
- 13. Access control based on permissions and roles
- 15. Security system that controls incoming and outgoing network traffic
- 16. Keeping patient information private and secure
- 17. Desire to keep one's identity unknown
- 19. Verification of identity using passwords, tokens, or keys
Down
- 1. Removing or altering personal information from data sets to protect privacy
- 2. Measures to protect data from unauthorized access
- 3. Ensuring reliable access to healthcare services and data systems
- 5. Scrambling data to prevent unauthorized interception
- 7. Incident involving unauthorized release or exposure of private data
- 12. Fraudulent attempt to obtain sensitive information by impersonating a trustworthy entity
- 14. Removing identifiers from data to preserve privacy
- 18. Agreement by patients to participate in research and share data
- 20. Tool funded by NIH for data analysis and patient cohort identification
