Type
Crossword
Description

This crossword contains the following questions and answers:

What act was passed in congress to protect individual's medical records and other personal health information HIPAA
Who is one person you can report a suspected breach to? SUPERVISOR
Is it ok, to discuss health information with an individual in an open area? NO
How should you send an email to outside recipients that contain protected health information? ENCRYPT
What HIPAA rule protects individual rights? PRIVACY
What is the acronym that identifies individual's information (ie: name, birthdate, address, etc.)? PHI
What is HIPAA's minimum training requirement for employees? ANNUALLY
Acronym for a document you receive from the physician office, which explains how they may use and share your health information NPP
What should you never share with another individual that is used to access systems? PASSWORD
How many days do you have to send a breach notification letter to individual(s), whose information was compromised? SIXTY

    Customize    

HIPAA Privacy/Compliance & Security Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

What act was passed in congress to protect individual's medical records and other personal health information HIPAA
What is the acronym that identifies individual's information (ie: name, birthdate, address, etc.? PHI
What HIPAA rule protects individual rights? Privacy
The attempt to prevent criminal or unauthorized access and use of electronic data CyberSecurity
An entity that performs certain functions involving PHI on behalf of a covered entity BusinessAssociate
The copying and archiving of computer data so it may be used to restore the original after a data loss event Backups
What should you never share with another individual that is used to access systems? Password
What is HIPAA's minumum training requirements for employees? Annually
How many days do you have to send a breach notification letter to individual(s), whose information was compromised? Sixty
How should you send an email to outside rcipients tht contain protected health information? Encrypt
Acronym for a document you receive from the physician office, which explains how they may use and share your health information NPP
An offical inspection of an organization's accounts, typically by an independent body Audit
When somebody sends an e-mail with a link to a bogus website it is called? Phishing
This can slow down your computer AND watch everywhere you go on the internet? Spyware

    Customize    

HIPAA COMPLIANCE TRAINING Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

I can not take _______________ inside the Hospital. Selfies
What do the initials ePHI stand for electronically Protected Health _________ ? Information
Abbreviation for the Health Insurance Portability and Accountability Act of 1996? HIPAA
Every patient has the right to ___________ with their medical treatment and conditions. Privacy
By law hospitals must train annually on HIPAA ____________. Compliance
Hospitals have ___________ and procedures to meet Federal HIPAA rules and regulations. policies
If you suspect someone is violating the facility's privacy policy , you should? report
HIPAA security and privacy applies to everyone ______ in the facility. working
HIPAA is governed by _____ and Human Services? Health
HIPAA was created with _____ standards for all patients. Security
Accessible __________ Health Information (PHI) is limited to only that information needed for performance of services. Protected
Personally identifiable health information is protected by HIPAA includes photographic, electronic, spoken word and ______? Paper
I may not post any identifiable information on______? Social media
All information regarding patients must stay confidential. I can not even tell my friends or ____. Family
I may not share my computer log-in _____ with anyone. Password

    Customize    

HIPAA Awareness Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

One of the core values Integrity
Amount of information needed to accomplish a task (2 wrds) Minimum Necessary
Person with access to the system User
Privacy Officer Emily Calvillo
Person or organization that maintains, creates, transfers, or receives PHI to perform a function on behalf of HRHS (2 wrds) Business Associate
When PHI is exposed we have committed a ___ of the patient's privacy Violation
Reportable event Breach
Document describes a patients rights to their health information NPP
One of the core values Compassion
The release, transfer, access to or divulging of patient information Disclosure
Immediate areas consisting of a desktop, laptop and other items to complete work Workstation
Method used to protect electronic data Encryption
One of the core values Accountability
Employees, volunteers, students/observers who represent the facility are members of the __ Workforce
A state of NOT protecting PHI Unsecured
HRHS strives to protect the ____ of its patients Privacy
Confidential measure used to protect systems made up of a string of characters Password
A state of protected PHI from unauthorized users Secured
Protected Health Information PHI
Person who is the subject of PHI Individual
One of the core values Respect
Management of healthcare services to an individual Treatment
Committee responsible for reviewing internal HIPAA concerns, policies and procedures HOC
One of the core values Excellence

    Customize    

OPSEC is not Puzzling Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

What you should do to your anti-virus software on a regular basis UPDATE
What you should do to all papers with PII or other sensitive information SHRED
Where you should keep your badge when off-site Outofsite
An adversary is considered a _________ THREAT
"Computer1234" would be a bad example of this PASSWORD
Actions that mitigate a threat COUNTERMEASURES
An option to protect your credit FREEZE
What potential harm from poor OPSEC is called RISK
What you must do to emails containing Critical Information ENCRYPT
What a weakness in our practices or defenses is called VULNERABILITY
The type of information that OPSEC protects CRITICALINFORMATION
The number of steps in the OPSEC process FIVE
The Freedom of Information Act is for what type of information FOUO
It is very important to use privacy settings on _______________ SOCIAL MEDIA
What you should remove each time you walk away from your NMCI computer CAC
What you cannot take with your smartphone or camera anywhere onsite PICTURES
What you should practice whenever you discuss your work with anyone NEED TO KNOW
OPSEC is a _______ effort TEAM
What is the abbreviation of the list that shows the commands Critical Information CIL
The kind of email account you can't use to conduct Government business PERSONAL

    Customize    

IT&S Cyber Security Crossword Puzzle

Type
Crossword
Description

This crossword contains the following questions and answers:

A software that is designed and destroy computer viruses Antivirus
Do not leave your laptop or computer ___________________ Unattended
A ___________ is a hardware of a software that helps keep hackers from using your computer and it watches for outside attempts to access your system and blocks communication that you don't permit Firewall
Email scam or attempt to trick you into giving your password or personal information Phishing
The state of being free from danger and threat Security
A ___________ is often an email that gets mailed in chain letter fashion describing some devasting. highly unlikely type of virus. HOAX
Choose a password that is easy for you _______________ but hard for you someone to guess. Remember
Also known as malicious software any; any program or file that is harmful to a computer user Malware
Passwords should should always be at least this many characters long. Eight
A _______ assessment is the process by which risks are identified and the impact of those risks determined Risk
Applied to data to protect it from unauthorized use in case of theft or loss. Encryption
Always _______your computer when you leave your desk Lock
To protect personal information, avoid sending it via Email
_________________ is a software that gathers computer user information and transmits it to the creator of the software without the explicit knowledge or informed consent of the user SPYWARE
A collection of information that is organized so that it can easily be accessed, managed and updated Database
Never share your _________ with another person Password

    Customize    

Health Insurance Crossword Puzzle

Type
Crossword
Description

This crossword contains the following questions and answers:

What does the acronym PPO stand for? Preferred Provider Organization
What is the acronym for Health Maintenance Organization? HMO
There are two types of medical billing: Institutional and _______________________. Professional
An __________ is a statement sent by a health insurance company to covered individuals explaining what medical treatments and/or services were paid for on their behalf. EOB
What type of claim form is used by hospitals? UB-04
Another name for a Health Information Specialist is a _________________________ Specialist. Reimbursement
An _____________________________ is a digital version of the traditional paper-based medical record for an individual. The EMR represents a medical record within a single facility, such as a doctor's office or a clinic. EMR
What is the amount you pay for health care services before your health insurance begins to pay? Deductible
A __________ is a fixed amount you pay for a health care service? Copay
A primary care physician is also known as a _______________________. Gatekeeper
What is the abbreviation for out-of-network? OON
What is the abbreviation for in-network? INN
What type of managed care plan lets you choose between an HMO or a PPO each time you need care? POS
How many parts does Medicare have? Four
A 1996 federal law that is sometimes called the "privacy rule", outlining how certain entities can use or disclose personal health information. HIPAA
The reason for the visit or surgery that defines the disease process or injury. Medical Necessity
M48.1 is an example of what type of code? ICD-10
What does UB stand for in UB-04? Uniform Bill
The healthcare system, funded by the U.S. Department of Defense, that active and retired military and their dependents use. Tricare
The entity that reimburses the provider for services. Insurance companies, Medicare, Medicaid, and third-party administrators are all payers in the healthcare industry. Payer
Any health care plan, provider, or service that transmits health care information in an electronic form and is thereby governed by laws and regulations in the handling of such data. It's called a covered _______________? Entity

    Customize    

FCHC Compliance & Ethics Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

Compliance is the responsibility of the Compliance Officer, Compliance Committee, and Upper Management only, true or false? false
These are examples of issues that can be reported to a Compliance Department: suspected Fraud, Waste, and Abuse (FWA); potential health privacy violation, and unethical behavior/employee misconduct, true or false? True
At a minimum, an effective compliance program includes how many core requirements? seven
The________________allows you to report anonymous/confidential non-compliance. Compliance Hotline
The _________ law Prohibits a physician from making referrals for certain designated health services (DHS) payable by Medicare to an entity with which he or she (or an immediate family member) has a financial relationship (ownership, investment, or compensation) Stark
The ____________ is a criminal law that prohibits the knowing and willful payment of "remuneration" to induce or reward patient referrals or the generation of business involving any item or service payable by the Federal health care programs (e.g., drugs, supplies, or health care services for Medicare or Medicaid patients). antikickback statute
____________is individually identifiable information. protected health information
______________sets boundaries on the use and release of health records. HIPAA
You should always _______________your computer when walk away. lock
Conducting routine audits reduces_____and increases compliance. risk
FCHC does not__________________against you for making a good faith effort in reporting. retaliate
Conduct yourself in an _____________manner. ethical
____________is intentionally submitting false information to the Government or a Government contractor to get money or a benefit. Fraud
Honesty is an example of ______________in the workplace integrity
The ________________act prohibits the selling of PHI without patient authorization and created a new notification when a breach of "unsecured PHI" occurs. HITECH

    Customize    

Cyber Security Awareness Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

Cyber security is a shared __________. Responsibility
This is commonly assigned to bank customers for use with ATMs and for use with debit cards. PIN
A malicious code that can infect your system. Virus
The use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes. Social engineering
You should never share your __________. Password
A clean desk policy is important in order to protect __________ information from being revealed. Sensitive
You should _____ a device before stepping away from it. Lock
Any data that could potentially be used to identify a particular person. PII
You should be careful when downloading __________ because it could be malicious. Software
You should _____ your administrator if an incident occurs. Contact
For a password to be secure, it should contain upper and lower case letters, numbers, and __________. Symbols
It is important to have antivirus installed on your computer and on your _______. Smart phone
The "s" in _____ stands for secure and indicated that communications with a webpage is encrypted. HTTPS

    Customize    

HIPAA Training Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

PCS staff may discuss a person being served over the phone with another ________ but it must be done in a private area. provider
____________ with others about persons served in public areas is prohibited Gossiping
An annual _________ is an example of PHI physical
One of the five HIPAA principles Standardization
Staff may converse about persons being served as needed to _________ programs and health plans implement
You will receive ________ upon hire and annually thereafter. training
The "I" in HIPAA stands for __________ insurance
The ____________ policy is signed upon hire and pertains to privacy and communication safeguards confidentiality
The second "A" in HIPAA stands for __________ Act
When _____ are about persons being served, they are not to be left in plain sight for others that have no "need to know". notes
Staff will have ______ access to health information of a person being served limited
HIPAA reduces the occurance of __________. fraud
The first "A" in HIPAA stands for _________ Accountability
The Privacy Officer is located in __________ Morris
HIPAA defines and protects _________ privacy
The "P" in PHI stands for ________ Protected
The medical ______ of a person being served is an example of a designated record set. chart
The "H" in HIPAA stands for _________ Health
Any requests for disclosures of PHI must be forwarded to your ___________ supervisor
The "I" in PHI stands for ________- Information
A _________ _______ includes any item, collection, or grouping of information that includes PHI and is collected or used by a provider record set
Staff that violate HIPAA policies will be __________ disciplined
Anytime a person feels a violation of their privacy rights has occurred, they have the right to file a grievance with the ________ ________ privacy officer
The "P" in HIPAA stands for _________ Portability
It is staff's responsibility to keep information __________ confidential
When discussing a person being served, you should move to a ________ area private
We should avoid discussing persons served in ________ public
We use ______ in order to keep charts inaccessible to people who do not have "need to know" about PHI locks

    Customize    

corporate compliance Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

conforming to a rule i.e. policy, standard or law compliance
moral principles and values that guide a person Ethics
guideline of ethical practices that Catholic Charities expects of its employees code of conduct
unacceptable or improper behavior by an employee misconduct
Law/Regulations to protect the privacy of health information HIPAA
Misconduct must be immediately..... reported
sitauation in which a person is in a position to derive personal benefit from decisions made in their official capcity conflict of interest
all potential conflicts of interest need to be.... disclosed
the policy that protects an employee who makes a "good faith" report of misconduct Non-Retaliation
Catholic Charities Human Resource Director Barb Poling
any information about an individual kept by an organization, including data that can be used to trace the person's identity PHI

    Customize