Data Privacy Word Search
Type
Word Search
Description

health information
customer data
patient data
unencrypted
protection
unsecured
password
Security
shredder
Privacy
HIPAA
Data

HIPAA COMPLIANCE TRAINING Crossword

HIPAA COMPLIANCE TRAINING Crossword
Type
Crossword
Description

I can not take _______________ inside the Hospital.
What do the initials ePHI stand for electronically Protected Health _________ ?
Abbreviation for the Health Insurance Portability and Accountability Act of 1996?
Every patient has the right to ___________ with their medical treatment and conditions.
By law hospitals must train annually on HIPAA ____________.
Hospitals have ___________ and procedures to meet Federal HIPAA rules and regulations.
If you suspect someone is violating the facility's privacy policy , you should?
HIPAA security and privacy applies to everyone ______ in the facility.
HIPAA is governed by _____ and Human Services?
HIPAA was created with _____ standards for all patients.
Accessible __________ Health Information (PHI) is limited to only that information needed for performance of services.
Personally identifiable health information is protected by HIPAA includes photographic, electronic, spoken word and ______?
I may not post any identifiable information on______?
All information regarding patients must stay confidential. I can not even tell my friends or ____.
I may not share my computer log-in _____ with anyone.

HIPAA Awareness Crossword

HIPAA Awareness Crossword
Type
Crossword
Description

One of the core values
Amount of information needed to accomplish a task (2 wrds)
Person with access to the system
Privacy Officer
Person or organization that maintains, creates, transfers, or receives PHI to perform a function on behalf of HRHS (2 wrds)
When PHI is exposed we have committed a ___ of the patient's privacy
Reportable event
Document describes a patients rights to their health information
One of the core values
The release, transfer, access to or divulging of patient information
Immediate areas consisting of a desktop, laptop and other items to complete work
Method used to protect electronic data
One of the core values
Employees, volunteers, students/observers who represent the facility are members of the __
A state of NOT protecting PHI
HRHS strives to protect the ____ of its patients
Confidential measure used to protect systems made up of a string of characters
A state of protected PHI from unauthorized users
Protected Health Information
Person who is the subject of PHI
One of the core values
Management of healthcare services to an individual
Committee responsible for reviewing internal HIPAA concerns, policies and procedures
One of the core values

HIPAA WORD SEARCH

HIPAA WORD SEARCH
Type
Word Search
Description

CONFIDENTIALITY
MEDICAL RECORD
ACCOUNTABILITY
AUTHORIZATION
CIVIL RIGHTS
REGULATIONS
INFORMATION
ELECTRONIC
SAFEGUARDS
DISCLOSURE
NECESSARY
PROTECTED
INSURANCE
ASSOCIATE
COMPLIANT
RESIDENT
IDENTITY
LAWSUITS
SECURITY
PASSWORD
GUARDIAN
MINIMUM
RELEASE
OFFICER
PRIVACY
HEALTH
ACCESS

HIPAA Crossword

HIPAA Crossword
Type
Crossword
Description

What act was passed in congress to protect individual's medical records and other personal health information
Who is one person you can report a suspected breach to?
Is it ok, to discuss health information with an individual in an open area?
How should you send an email to outside recipients that contain protected health information?
What HIPAA rule protects individual rights?
What is the acronym that identifies individual's information (ie: name, birthdate, address, etc.)?
What is HIPAA's minimum training requirement for employees?
Acronym for a document you receive from the physician office, which explains how they may use and share your health information
What should you never share with another individual that is used to access systems?
How many days do you have to send a breach notification letter to individual(s), whose information was compromised?

Chapter 5 Legal & Ethical Responsibilities Crossword

Chapter 5 Legal & Ethical Responsibilities Crossword
Type
Crossword
Description

Wrongs against person, property, society
Relationships between people, protection of person's rights
Wrongful act that do not involve a contract
Slander, libel
First component of a contract
Third component of a contract
Contracted parties must be free of _______________ disability.
________________ and Agent
The type of consent needed to release medical information
Health Care Records are ________________________.
Health Insurance Portability and Accountability Act
Health care workers must protect privacy and _________________ of patients health care records
Assisted suiside
Principles dealing with what is morally right or wrong
Standards for _______________ of Individually Identifiable Health Information

2018 HIPAA Week Word Scramble Worksheet

2018 HIPAA Week            Word Scramble Worksheet
Type
Matching Worksheet
Description

Brian Kloss is THP's _____ Officer, located in the Wheeling office.
PHI use for personal gain or member harm can lead to civil fines and ____ for individuals responsible.
For breaches affecting more than 500 members, the _____ must be notified in addition to notifying the members.
Passwords should never be left in plain _____.
Never _____ member health information with other employees unless it is part of your job.
Always remember to ______, or lock your computer when leaving your workstation.
Names, social security numbers, and email addresses are all considered forms of ___.
Documents containing PHI must always be disposed of when no longer in use, by placing in an approved, lockable ____ bin.
Disclosing member medical information inappropriately to coworkers, relatives or friends is an example of a privacy _________.
When unsecured or unencrypted PHI is out of your control, this is considered a _____.
Always double check the phone number prior to ______ any member PHI out of THP facilities, and confirm receipt of the information being sent.
The only federally recognized method of securing electronic PHI (ePHI) is through __________.

Information Security Word Search

Information Security Word Search
Type
Word Search
Description

confidentiality
availability
regulation
awareness
integrity
strategy
security
control
privacy
breach
threat
access
HIPAA
data
ARRA

Health Science Word Search

Health Science Word Search
Type
Word Search
Description

designation of health care
durable power of attorney
privileged communications
patients bill of rights
assault and battery
expressed contracts
health care records
invasion of privacy
advance directives
false imprisonment
informed consent
legal disability
confidentiality
implied consent
patients rights
criminal law
living wills
deformation
malpractice
civil law
contact
ethics
abuse
agent
HIPAA
legal
libel
OBRA
PSDA
tort

Information Security and Privacy Crossword Puzzle

Information Security and Privacy Crossword Puzzle
Type
Crossword
Description

These need to be strong enough that others won't guess them
Keep it _________ and Secure
When clicking on a suspicious link in an email you could be caught ____________
If you suspect a privacy or security breach, you must report it ______________
This type of agreement is needed when a vendor needs to access PHI to do work on our behalf
This is used to access Partners information remotely
Privacy and Security Regulations
Before stepping away from your computer, always click on the yellow ___________ so no one else can access your information
Report a lost device immediately by contacting the
When this is installed on your computer, it can lead to spreading a virus across the network
When travelling with a laptop in your vehicle, always keep it in the ___________
Where not to keep your laptop or other work information when travelling in a car
Name of the repository for Partners Policies
What is the name of the Partners Chief Information Security and Privacy Officer?
Even accessing patient _________ in Epic, without a business need to know is a violation of policy

Quartz Security: Crossword puzzle for National Cyber Security Awareness Month 2017

Quartz Security: Crossword puzzle for National Cyber Security Awareness Month 2017
Type
Crossword
Description

a list of entities that are blocked or denied access/privilege
the unauthorized access and disclosure of sensitive information released outside of an unauthorized organization
specialized techniques for gathering, retaining and analyzing data as evidence for investigations
an act of pretending to be from a reputable organization to deceive individuals into providing sensitive information
a list of organizations that are considered trustworthy or allowed access/privilege
ensuring information with sensitive data remain hidden, inaccessible to unauthorized users.
a type of malware that requires some type of payment to either remove the malware by the hacker, or retrieve files that have been encrypted by the hacker.
a type of digital currency
The practice and process designed to help protect one or an organizations networks, computers, programs and data from unauthorized access.
Medical history information, laboratory results, insurance information and other healthcare data an entity collects to identify an individual
The name of the leader who you would report security incidents to
The name of the leader who you would report privacy incidents to
The name of our Chief Information Officer who oversees the IT Infrastructures at Quartz
Duo-Security is considered what type of authentication when logging in remotely?
Name of the form used to submit requests for: Hardware/Software, Security, Telecom or Facilities (Badging only)
To report a compliance incident, who do you contact?
Quartz policy and procedure S014 outlines what type of policy?
The process of taking an unencrypted message or data and applying a mathematical function to it, to produce an encrypted message
What process do you need to go through for approval before files can be exchanged externally?
You are required to wear this item at all times while on Company premises
When a person tags along with another person who is authorized to gain entry pass a certain checkpoint