Type
Bingo Cards
Description

Los Angeles
C4C 2.0
Leah Davis
FORCE
Glint
Annual Report
DUO
77.5%
Sikich University
ServiceDesk
Flexible Time Off
SikichConnect
ISolved
Red Flag Reporting
$5,000
Passwords
1982
18%
Core Values
CE
Email Signature
18,000
Compliance Trainings
Chris Geier
Accounting Services

    Customize    

HIPAA COMPLIANCE TRAINING Crossword

Type
Crossword
Description

I can not take _______________ inside the Hospital. Selfies
What do the initials ePHI stand for electronically Protected Health _________ ? Information
Abbreviation for the Health Insurance Portability and Accountability Act of 1996? HIPAA
Every patient has the right to ___________ with their medical treatment and conditions. Privacy
By law hospitals must train annually on HIPAA ____________. Compliance
Hospitals have ___________ and procedures to meet Federal HIPAA rules and regulations. policies
If you suspect someone is violating the facility's privacy policy , you should? report
HIPAA security and privacy applies to everyone ______ in the facility. working
HIPAA is governed by _____ and Human Services? Health
HIPAA was created with _____ standards for all patients. Security
Accessible __________ Health Information (PHI) is limited to only that information needed for performance of services. Protected
Personally identifiable health information is protected by HIPAA includes photographic, electronic, spoken word and ______? Paper
I may not post any identifiable information on______? Social media
All information regarding patients must stay confidential. I can not even tell my friends or ____. Family
I may not share my computer log-in _____ with anyone. Password

Compliance and Ethics Week Crossword

Type
Crossword
Description

Samaritan Daytop Village Privacy Officer Alan
Department in which Conflicts of Interest should be reported ________________ Compliance
Director of Compliance Jamie
Manager of Compliance Ia
Policy and _________________ Procedure
Employees are required to disclose potential _______________ Conflicts
Failure to report a Conflict will result in what action Disciplinary
Directors and Officers are required to annually submit a Disclosure Statement for_________ Gifts
VP of Compliance Alicia
Samaritan has a policy that ensures any outside activities of employees do not _______________. Conflict

Internet Safety Word Search

Type
Word Search
Description

inappropriate request
avoid risks
social media
prevent
report
online
grooming
trust
email
password
personal information
cyberbully
inappropriate content
respect
internetsafety
netiquette
digital citizen
internet
bystander
phishing

Information Security and Privacy Crossword Puzzle

Type
Crossword
Description

These need to be strong enough that others won't guess them Passwords
Keep it _________ and Secure Safe
When clicking on a suspicious link in an email you could be caught ____________ phishing
If you suspect a privacy or security breach, you must report it ______________ Immediately
This type of agreement is needed when a vendor needs to access PHI to do work on our behalf Business Associate
This is used to access Partners information remotely VPN
Privacy and Security Regulations HIPAA
Before stepping away from your computer, always click on the yellow ___________ so no one else can access your information Lock
Report a lost device immediately by contacting the Service Desk
When this is installed on your computer, it can lead to spreading a virus across the network Malware
When travelling with a laptop in your vehicle, always keep it in the ___________ Trunk
Where not to keep your laptop or other work information when travelling in a car seat
Name of the repository for Partners Policies Archer
What is the name of the Partners Chief Information Security and Privacy Officer? Jigar Kadakia
Even accessing patient _________ in Epic, without a business need to know is a violation of policy demographic information

Compliance Crossword Puzzle

Type
Crossword
Description

Occupational Safety and _________ Administration Health
FERC Order 706 governs these Standards CIP
Generally ________________ Accounting Principles Accounting
ATC’s FERC formula rates are housed within this MISO
An ATC ___________ has a $50,000 expenditure authorization limit Manager
Escheatment is the process of turning over ___________ property to a state authority Unclaimed
The frequency of completing ATC’s Business Ethics Questionnaire Annual
Regulation (acronym) enacted in 1996 aimed at ensuring medical records, medical billing, and patient accounts meet certain consistent standards with regard to documentation, handling, and privacy HIPAA
An employee may take maternity leave under the ________ and Medical Leave Act Family
The heading on Page 3 of ATC’s Code of Conduct: Doing What’s _________ Right
Tax (acronym) imposed on both employees and employers to fund Social Security and Medicare FICA
The Federal _____________ Guidelines outline the seven elements of an effective compliance program Sentencing
Tone at the ________ Top
An anonymous way to report an ethics or compliance concern Helpline
The number of members on ATC’s Policy & Ethics Committee Four
________________ Reliability Organization Midwest
Juanita Banks is ATC’s Designated ___________ Officer Compliance
Substantiated ethics and/or compliance violations are reported to ATC’s ____________ Committee Audit
Enterprise ____________ Management Information
Regulatory entity (acronym) that assists in the protection of employment discrimination on the basis of race, sex, religion, national origin, and a variety of other characteristics EEOC
Information should be classified as ATC __________ Information when the unauthorized disclosure, alteration, or destruction of that information could expose the Company to a significant level of risk Confidential
Controls for providing Users the means to verify or validate a claimed identity through the presentation of something they know (e.g., passwords), something they own (e.g., hardware token), or something they are (e.g., fingerprint, biometrics, etc.). Authentication
Per the Acceptable Use of Electronic Resources Policy, data moved to removable media sources (e.g. USB, CD, etc.) must be ___________. Encrypted
Ways to report potential issues or concerns are outlined in ATC’s Open ______ Policy Door
Employment ______________ and Professional References Policy Verification
Accepting a gift card from a supplier vying for business at ATC represents a Conflict of ________ Interest
Per the External Communications & Social Media Policy, do not represent yourself as a ____________ for ATC Spokesperson
Per the Gifts & Entertianment Policy, all tangible gifts given to an ATC employee, regardless of dollar amount, must be reported to _________ Payroll
Environmental ____________ Agency Protection
A competitive _________ is required to procure services over $100,000 Bid
___________ Oxley Act was instituted in 2002, as a result of a series of high-profile financial scandals Sarbanes
Per NERC, Critical __________ are facilities, systems, and equipment which, if destroyed, degraded, or otherwise rendered unavailable, would affect the reliability or operability of the bulk electric system Assets
Personnel Risk ____________ Policy Assessment
The Travel & Expense Policy governs transactions inputted into this system Concur
___________ employees who do not charge time to project work orders only need to report their exception time (e.g. vacation, sick, personal, or floating holiday hours) each pay period Exempt
Per ATC’s Code of Conduct, each ATC employee has a responsibility to promptly _________ any known violation or dishonest, unethical, or illegal conduct Report
_______ % of ATC’s corporate goal attainment ties to Reliability Compliance Fifteen
Behavior Based _________ Observations Safety

HIPAA Crossword

Type
Crossword
Description

What act was passed in congress to protect individual's medical records and other personal health information HIPAA
Who is one person you can report a suspected breach to? SUPERVISOR
Is it ok, to discuss health information with an individual in an open area? NO
How should you send an email to outside recipients that contain protected health information? ENCRYPT
What HIPAA rule protects individual rights? PRIVACY
What is the acronym that identifies individual's information (ie: name, birthdate, address, etc.)? PHI
What is HIPAA's minimum training requirement for employees? ANNUALLY
Acronym for a document you receive from the physician office, which explains how they may use and share your health information NPP
What should you never share with another individual that is used to access systems? PASSWORD
How many days do you have to send a breach notification letter to individual(s), whose information was compromised? SIXTY

Cyber Security Awareness Word Search

Type
Word Search
Description

CODE
SPOOFING
INTERNET
HTTPS
HONEYPOT
HASHING
FORENSICS
FTP
EXPLOIT
DECRYPTION
CRYPTOGRAPHY
CONTROL
CIPHER
CONTAINMENT
COMPLIANCE
BACKDOOR
BEHAVIOUR
BIOMETRICS
VECTOR
ADWARE
POLICY
HARVESTING
EMAIL
MONITOR
AUDIT
AUTHORIZATION
ASSET
CLOUD
KEYLOGGER
NETWORK
TROJAN
WORM
CONFIDENTIALITY
AVAILABILITY
INTEGRITY
WIFI
VULNERABILITY
USERNAME
THREAT
BOTNET
SPYWARE
RANSOMWARE
VIRUS
MALEWARE
CERTIFICATE
AUTHENTICATION
FIREWALL
ENCRYPTION
ATTACK
AWARENESS
PASSWORD
PRIVACY
SECURITY
BREACH
HACKER
PHISHING

Computer Terms Word Search

Type
Word Search
Description

Bit
Browser
Clip art
computer
copy
data
delete
desktop
digital
disk
drag
email
Excel
File
flash
flash drive
folder
font
hyperlink
Keyboard
link
log out
login
memory
modem
monitor
Mouse
Page
password
paste
Power
ram
rom
runtime
save
scroll
server
spyware
storage
surf
text
toolbar
trash
undo
URL
username
utility
virus
web
Word

Security Awareness Word Scramble

Type
Word Scramble
Description

secret
responsibility
protect
confidential
top secret
email
encryption
firewall
malware
backup
virus
surf
theft
piracy
internet
policies
violations
phishing
need to know
attacks
facility security officer
homeland security
department of defense
police department
FBI
copyright
background checks
privacy
phone fraud
safety
log out
login
fraud
hoax
chain letters
network
security
spam
hackers
report
cybersecurity
threat
monitor
access
badges
serve
secure
tailgate
insider threat
accounts
scams
crime
passwords
breach
keylogger
spoofing
ransomware
intrusion detection
multifactor authentication
personal protective equipment
certified
trained
speak up
look out

ICT PUZZLE Word Search

Type
Word Search
Description

new peole forget em
never meet up
be careful
texting
prices
messaging
computer safty
think before click
password
online space
chat room
web browsing
email
ict