Type
Word Search
Description

need to know basis
what was seen
record immediately
accurate information
marks
bruises
confidentiality
Signs and symptoms
what was said
Facts
Childs name
Date
Time

Safeguarding Word Search

Type
Word Search
Description

allegation
welfare
confidentiality
need to know
warning sign
concerns
child protection
lado
whistleblower
sexual
emotional
physical
harm
neglect
abuse

Meet community information needs Crossword

Type
Crossword
Description

relates to collection, storage, use, disclosure and disposal of personal information Confidentiality
information brouchure to provide information to clients fact sheet
review information on a regular basis cross check
policy/document to inform for keeping documents safe privacy
differences in many of areas diversity
data entered that is useful, reliable and accurate valid information
groups for community members community group
list of events to be celebrated Calendar of Events
taking a group of children outside the service to visit in community excursion
involvement in the community, is community what? engagement
principle 2 of the EYLF Partnerships
correspondence in paper mail? letter
most common type of classification for records alphabetic
Early Years Directory developed by? Best start
sense of belonging in EYLF Outcome two
days of significance developed by --- children's services FKA
feedback from parents survey
meeting/documents to orient a new family to a service enrolment
visitors/performers in the centre incursion

OPSEC is not Puzzling Crossword

Type
Crossword
Description

What you should do to your anti-virus software on a regular basis UPDATE
What you should do to all papers with PII or other sensitive information SHRED
Where you should keep your badge when off-site Outofsite
An adversary is considered a _________ THREAT
"Computer1234" would be a bad example of this PASSWORD
Actions that mitigate a threat COUNTERMEASURES
An option to protect your credit FREEZE
What potential harm from poor OPSEC is called RISK
What you must do to emails containing Critical Information ENCRYPT
What a weakness in our practices or defenses is called VULNERABILITY
The type of information that OPSEC protects CRITICALINFORMATION
The number of steps in the OPSEC process FIVE
The Freedom of Information Act is for what type of information FOUO
It is very important to use privacy settings on _______________ SOCIAL MEDIA
What you should remove each time you walk away from your NMCI computer CAC
What you cannot take with your smartphone or camera anywhere onsite PICTURES
What you should practice whenever you discuss your work with anyone NEED TO KNOW
OPSEC is a _______ effort TEAM
What is the abbreviation of the list that shows the commands Critical Information CIL
The kind of email account you can't use to conduct Government business PERSONAL

Compliance Crossword Puzzle

Type
Crossword
Description

Occupational Safety and _________ Administration Health
FERC Order 706 governs these Standards CIP
Generally ________________ Accounting Principles Accounting
ATC’s FERC formula rates are housed within this MISO
An ATC ___________ has a $50,000 expenditure authorization limit Manager
Escheatment is the process of turning over ___________ property to a state authority Unclaimed
The frequency of completing ATC’s Business Ethics Questionnaire Annual
Regulation (acronym) enacted in 1996 aimed at ensuring medical records, medical billing, and patient accounts meet certain consistent standards with regard to documentation, handling, and privacy HIPAA
An employee may take maternity leave under the ________ and Medical Leave Act Family
The heading on Page 3 of ATC’s Code of Conduct: Doing What’s _________ Right
Tax (acronym) imposed on both employees and employers to fund Social Security and Medicare FICA
The Federal _____________ Guidelines outline the seven elements of an effective compliance program Sentencing
Tone at the ________ Top
An anonymous way to report an ethics or compliance concern Helpline
The number of members on ATC’s Policy & Ethics Committee Four
________________ Reliability Organization Midwest
Juanita Banks is ATC’s Designated ___________ Officer Compliance
Substantiated ethics and/or compliance violations are reported to ATC’s ____________ Committee Audit
Enterprise ____________ Management Information
Regulatory entity (acronym) that assists in the protection of employment discrimination on the basis of race, sex, religion, national origin, and a variety of other characteristics EEOC
Information should be classified as ATC __________ Information when the unauthorized disclosure, alteration, or destruction of that information could expose the Company to a significant level of risk Confidential
Controls for providing Users the means to verify or validate a claimed identity through the presentation of something they know (e.g., passwords), something they own (e.g., hardware token), or something they are (e.g., fingerprint, biometrics, etc.). Authentication
Per the Acceptable Use of Electronic Resources Policy, data moved to removable media sources (e.g. USB, CD, etc.) must be ___________. Encrypted
Ways to report potential issues or concerns are outlined in ATC’s Open ______ Policy Door
Employment ______________ and Professional References Policy Verification
Accepting a gift card from a supplier vying for business at ATC represents a Conflict of ________ Interest
Per the External Communications & Social Media Policy, do not represent yourself as a ____________ for ATC Spokesperson
Per the Gifts & Entertianment Policy, all tangible gifts given to an ATC employee, regardless of dollar amount, must be reported to _________ Payroll
Environmental ____________ Agency Protection
A competitive _________ is required to procure services over $100,000 Bid
___________ Oxley Act was instituted in 2002, as a result of a series of high-profile financial scandals Sarbanes
Per NERC, Critical __________ are facilities, systems, and equipment which, if destroyed, degraded, or otherwise rendered unavailable, would affect the reliability or operability of the bulk electric system Assets
Personnel Risk ____________ Policy Assessment
The Travel & Expense Policy governs transactions inputted into this system Concur
___________ employees who do not charge time to project work orders only need to report their exception time (e.g. vacation, sick, personal, or floating holiday hours) each pay period Exempt
Per ATC’s Code of Conduct, each ATC employee has a responsibility to promptly _________ any known violation or dishonest, unethical, or illegal conduct Report
_______ % of ATC’s corporate goal attainment ties to Reliability Compliance Fifteen
Behavior Based _________ Observations Safety

Early Childhood Cognitive Development Crossword

Type
Crossword
Description

Increases the likelihood of a behavior occurring Reinforcement
mental representations of the world around them schemas
Piaget's first developmental stage sensorimotor
Conscious, rational part of personality Ego
Unconscious, source of biological needs/desires ID
The conscience Superego
directly processing information that a child knows Assimilation
changing what one knows to fit the new information Accommodation
Child starts to think in symbols Preoperational
Child starts to think logically Concrete
reinforcers and punishments operant
stimulus, response classical
decreases the likelihood of a behavior to occur punishment
Bandura's Social Learning Theory modeling
consists of activities and interactions in the immediate environment Microsystem

HIPAA Training Crossword

Type
Crossword
Description

PCS staff may discuss a person being served over the phone with another ________ but it must be done in a private area. provider
____________ with others about persons served in public areas is prohibited Gossiping
An annual _________ is an example of PHI physical
One of the five HIPAA principles Standardization
Staff may converse about persons being served as needed to _________ programs and health plans implement
You will receive ________ upon hire and annually thereafter. training
The "I" in HIPAA stands for __________ insurance
The ____________ policy is signed upon hire and pertains to privacy and communication safeguards confidentiality
The second "A" in HIPAA stands for __________ Act
When _____ are about persons being served, they are not to be left in plain sight for others that have no "need to know". notes
Staff will have ______ access to health information of a person being served limited
HIPAA reduces the occurance of __________. fraud
The first "A" in HIPAA stands for _________ Accountability
The Privacy Officer is located in __________ Morris
HIPAA defines and protects _________ privacy
The "P" in PHI stands for ________ Protected
The medical ______ of a person being served is an example of a designated record set. chart
The "H" in HIPAA stands for _________ Health
Any requests for disclosures of PHI must be forwarded to your ___________ supervisor
The "I" in PHI stands for ________- Information
A _________ _______ includes any item, collection, or grouping of information that includes PHI and is collected or used by a provider record set
Staff that violate HIPAA policies will be __________ disciplined
Anytime a person feels a violation of their privacy rights has occurred, they have the right to file a grievance with the ________ ________ privacy officer
The "P" in HIPAA stands for _________ Portability
It is staff's responsibility to keep information __________ confidential
When discussing a person being served, you should move to a ________ area private
We should avoid discussing persons served in ________ public
We use ______ in order to keep charts inaccessible to people who do not have "need to know" about PHI locks

HIPAA WORD SEARCH

Type
Word Search
Description

NECESSARY
PROTECTED
MINIMUM
MEDICAL RECORD
ELECTRONIC
RESIDENT
AUTHORIZATION
IDENTITY
ACCOUNTABILITY
CIVIL RIGHTS
SAFEGUARDS
LAWSUITS
CONFIDENTIALITY
REGULATIONS
INSURANCE
HEALTH
SECURITY
RELEASE
OFFICER
INFORMATION
ACCESS
DISCLOSURE
PASSWORD
ASSOCIATE
PRIVACY
COMPLIANT
GUARDIAN

Health Information Management Week Crossword Puzzle

Type
Crossword
Description

The process of assigning numeric classifications to diagnostic statements Coding
A record that is made of paper and electronic information is called Hybrid
A legal and ethical concept that establishes the healtcare provider's responsibility in protecting PHI Confidentiality
A means to convey permission to administer care Consent
The process that MMRA does Release
When a doctor is non-compliant with paperwork Suspensionlist
We like to celebrate anything in our department Potluck
Another name for Health Information Management Medicalrecords
What is another word we use for chief Teamleader
Information that is on a facesheet Demographics
What an analyst does with paperwork before it is scanned Prepping
What is the next step after paperwork is scanned Analyze
The process of extracting information from a document abstracting
The act of transferring PHI between care providers is called Exchange

Child Abuse & Neglect Crossword

Type
Crossword
Description

Type of abuse characterized by acts of violence, such as hitting or kicking Physical
Type of abuse characterized by inappropriate touching or contact with a child Sexual
Act of failing to properly care for a child Neglect
Act of using demeaning language to belittle someone Psychosocial
allowing the child to talk and work out problems in a safe/confidential environment Counseling
connection between two people Relationship
discoloration of the skin from an act of violence Bruise
break in a bone; may or may not be treated and/or fresh Fracture
feeling of worthlessness, may present by sadness or withdrawal Depression
pharmacologic therapy used to reduce pain, treat depression Medication
everyone should know signs and symptoms of child abuse and the National Abuse Hotline Number so they can ____. Report
One of the many risk factors is _____. Substance Abuse

The Scientific Method Crossword

Type
Crossword
Description

To group information into categories Classify
The variable that depends on other factors, also the variable that will be measured and affected during the experiment Dependent Variable
To examine carefully and in detail to identify Analyze
To observe carefully and in detail Examine
To make a conclusion based on reasoning and observations Infer
The action or process of examining something carefully in order to Observation
To name or recognize something based on its properties Identify
A standard to compare with the results in an experiment Control
The variables that the experimenter changes to test their dependent variable Independent Variable
A statement predicting the result of a controlled scientific experiment Hypothesis
The process used by scientists to solve problems Scientific Method
To determine the extent, quantity or dimensions Measure
The methodological studying of the natural world through experimentation and verification of facts Science
Evidence gathered through observations (especially during experiments) Data
The outcome or conclusion of an experiment after a period of time Result
Visual aids used by scientists to communicate results of an experiment Graphs
The collecting of information on a particular subject Research
A feature of the experiment that does not change Constant
To form an idea as a result of the analysis of the data Formulate
A detailed series of steps to follow to perform an experiment Procedure
To write down in permanent form for later reference Record
To cause favoritism or influence to experimental results Bias
To repeat a research study, usually with different participants and in different situations, to confirm the results of the original study Replicate
A scientific procedure undertaken to make a discovery, test a hypothesis or demonstrate a known fact Experiment
What a scientist writes summarizing the results of an experiment Conclusion
To record observations, research and other information related to the experiment Journal
To notice similarities or differences Compare
Indicate in advance on the basis of observation, experience or scientific reason Predict
The first step in the scientific method is to define or identify the ________. Problems
Part of the experiment capable to change Variable