Type
Word Search
Description

FILES
ELECTRONICMEDICALRECORD
TRANSCRIPTION
CODING
DIAGNOSIS
PROCEDURES
SCANNING
RELEASEOFINFORMATION
PATIENTPORTAL
CONFIDENTIALITY
REPORTS
DICTATIONS
QUERY
SIGNATURES
HIPAA
CPT

HIP WEEK 2019 Word Search

Type
Word Search
Description

ANALYZING
ASSEMBLY
AUDIT
AUTHORIZATION
CODING
CONSENTS
CPT
DATA INTEGRITY
DEFICIENCY
DNFB
DOCUMENTATION
DRG
EPIC
FILING
HIPAA
ICD
MODIFIER
QUERY
RECORDS
RELEASE OF INFORMATION
REVENUE CYCLE
SCANNING
SUSPENSION
TRANSCRIPTION

HEALTH INFORMATION MANAGEMENT Word Search

Type
Word Search
Description

PRIVACY
PORTAL
HITECH
DICTATION
ENCRYPTION
REVIEW
ADDENDUM
DOCUMENTS
MPI
STORAGE
RECORDS
REQUESTS
PHI
CODING
HIPAA
QUALITY
ORDERS
CONFIDENTIALITY
SCANNING
ELECTRONIC
PAPERCLIPS

HIPAA COMPLIANCE TRAINING Crossword

Type
Crossword
Description

I can not take _______________ inside the Hospital. Selfies
What do the initials ePHI stand for electronically Protected Health _________ ? Information
Abbreviation for the Health Insurance Portability and Accountability Act of 1996? HIPAA
Every patient has the right to ___________ with their medical treatment and conditions. Privacy
By law hospitals must train annually on HIPAA ____________. Compliance
Hospitals have ___________ and procedures to meet Federal HIPAA rules and regulations. policies
If you suspect someone is violating the facility's privacy policy , you should? report
HIPAA security and privacy applies to everyone ______ in the facility. working
HIPAA is governed by _____ and Human Services? Health
HIPAA was created with _____ standards for all patients. Security
Accessible __________ Health Information (PHI) is limited to only that information needed for performance of services. Protected
Personally identifiable health information is protected by HIPAA includes photographic, electronic, spoken word and ______? Paper
I may not post any identifiable information on______? Social media
All information regarding patients must stay confidential. I can not even tell my friends or ____. Family
I may not share my computer log-in _____ with anyone. Password

HEALTH INFORMATION Word Search

Type
Word Search
Description

RELEASE OF INFORMATION
ABSTRACTIING
HIPAA
MEDICAL RECORD
AAPC
HEALTH INFORMATION
MEDICAL NECESSITY
CHART
RHIA
AUDIT
DATA
PRIVACY
CODING
RHIT
COMPLIANCE
CONFIDENTIAL
SECURITY
FILE
REGISTRATION
EHR
PHI
CHART ASSEMBLY
TRANSCRIPTION
AHIMA
KHIMA
PROVIDER
CODER
ICD10

HEALTH INFORMATION PROFESSIONALS WEEK Word Search

Type
Word Search
Description

ADMISSION
APPOINTMENTS
ASSESSMENTS
AUDIT
CHART
DISCHARGE
DOCUMENTS
EZ GRAPHS
FILE
FORMS
HEALTHCARE
INFORMATION
LABS
MEETINGS
ORDERS
ORGANIZE
PAPERWORK
PROCEDURES
RECORDS
REPORTS
RESIDENTS
SCAN
TRANSFERS
WEIGHTS

HIP Week Word Search

Type
Word Search
Description

ACCURATE INFORMATION
AUDIT TRAIL
CAHIIM
CODING
COMPLETENSS
CONFIDENTIALITY
CONSISTENCY
DATABASE
DEEMED STATUS
DISCLOSURE
EHR
ENCRIPTION
FALSE CLAIMS ACT
HIPAA
HITECH
INTEROPERABILITY
MEDICAL TERMINOLOGY
MEDICARE
PLAZA COLLEGE
PRIVACY
PRIVACY NOTICE
PROFESSIONAL
QUALITY CARE
RELEASE OF INFORMATION
RETROSPECTIVE REVIEW
SECURITY
STATISTICS
TIMELINESS

ICD-10 Word Search

Type
Word Search
Description

CMS
Expanded
Allowed
Classification
Code
Code Set
Dates
Diagnosis
Edits
Enforcement
Inpatient
Institutional
Modifiers
Outpatient
Placeholders
Procedures
Professional
Qualifiers

Cyber Security Crossword

Type
Crossword
Description

process of confirming the correctness of the claimed identity authentication
approval, permission, or empowerment for someone or something to do something authorization
cryptanalysis technique or other kind of attack method involving an exhaustive procedure that tries all possibilities, one-by-one brute force
encrypted form of the message being sent ciphertext
stripping one llayer's headers and passing the rest of the packet up to next higher layer decapsulation
TCP/IP protocol specifying the transfer of text or binary files across the network File Transfer Protocol
pseudo IP address that always refer back to the local host and never sent out to a network (127.0.0.1) loopback address
software appearing to perform a useful function but actually tricks a user into executing malicious logic (e.g. Trojan horse) malicious code
prove that a user sent a message and the message has not been altered non repudiation
sequence of eight bits octet
e-mails that appear to originate from a trusted source to trick a user into entering valid credentials on a fake website phishing
gaining unauthorized logical access to sensitive data by circumventing a system's protections penetration
type of input validation attack where SQL code is inserted into application queries to manipulate the database SQL injection
basic communication language or "protocol" of the Internet TCP/IP
hidden, self-replicating section of computer software that inserts itself and becomes part of the another program virus

CPT CODING Word Search

Type
Word Search
Description

anesthesia
audit
biopsy
cardiovascular
coding
cyst
digestive
excision
fracture
incision
index
integumentary
lesions
levels of service
medicare
modifiers
muscles
procedure
repair
respiratory
skin graft
surgery
tumor
urinary

Documentation Integrity Word Search

Type
Word Search
Description

Standardization
Consistency
MMODAL
Patient Relations
Document Imaging
MyChart Patient Portal
HIP
HIPPA
SRC
GH
BPTH
Vendor
Customer Service
Coding
Medical Records
ROI
Patient Identity
Technician
EPIC
File Circulation
Suspension
Analyzation
Transcription
Documentation Integrity
Amendment
Compliance