Type
Word Search
Description

backup policies
compliance
computer appplications
creating
data
data dictionaries
databases
graduation
health information
healthcare
privacy
real jobs
security
security guidelines
system maintenance
training users
transcription
user accounts
vendor selection

HIPAA COMPLIANCE TRAINING Crossword

Type
Crossword
Description

I can not take _______________ inside the Hospital. Selfies
What do the initials ePHI stand for electronically Protected Health _________ ? Information
Abbreviation for the Health Insurance Portability and Accountability Act of 1996? HIPAA
Every patient has the right to ___________ with their medical treatment and conditions. Privacy
By law hospitals must train annually on HIPAA ____________. Compliance
Hospitals have ___________ and procedures to meet Federal HIPAA rules and regulations. policies
If you suspect someone is violating the facility's privacy policy , you should? report
HIPAA security and privacy applies to everyone ______ in the facility. working
HIPAA is governed by _____ and Human Services? Health
HIPAA was created with _____ standards for all patients. Security
Accessible __________ Health Information (PHI) is limited to only that information needed for performance of services. Protected
Personally identifiable health information is protected by HIPAA includes photographic, electronic, spoken word and ______? Paper
I may not post any identifiable information on______? Social media
All information regarding patients must stay confidential. I can not even tell my friends or ____. Family
I may not share my computer log-in _____ with anyone. Password

Cyber Security Crossword

Type
Crossword
Description

any software program in which advertising banners are displayed while the program is running. Adware
designed to detect and destroy computer viruses. Antivirus
an attempt by hackers to damage or destroy a computer network or system. Attack
a method, often secret, of bypassing normal authentication in a product back door
refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed. backup
refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed. Blended threat
are similar to worms and Trojans, but earn their unique name by performing a wide variety of automated tasks on behalf of their master (the cybercriminals) who are often safely located somewhere far across the Internet. bots
are small files that Web sites put on your computer hard disk drive when you first visit cookie
body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access cyber security
made possible by using algorithms to create complex codes out of simple data, effectively making it more difficult for cyberthieves to gain access to the information encryption
a network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules. firewall
someone who seeks and exploits weaknesses in a computer system or computer network. hacker
global system of interconnected computer networks that use the Internet protocol suite internet
a local or restricted communications network, especially a private network created using World Wide Web software. intranet
used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system. malicious code
the activity of defrauding an online account holder of financial information by posing as a legitimate company. phishing
software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive. spyware
any malicious computer program which is used to hack into a computer by misleading users of its true intent trojan horse
a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data virus
a standalone malware computer program that replicates itself in order to spread to other computers. worm

Compliance Crossword Puzzle

Type
Crossword
Description

Occupational Safety and _________ Administration Health
FERC Order 706 governs these Standards CIP
Generally ________________ Accounting Principles Accounting
ATC’s FERC formula rates are housed within this MISO
An ATC ___________ has a $50,000 expenditure authorization limit Manager
Escheatment is the process of turning over ___________ property to a state authority Unclaimed
The frequency of completing ATC’s Business Ethics Questionnaire Annual
Regulation (acronym) enacted in 1996 aimed at ensuring medical records, medical billing, and patient accounts meet certain consistent standards with regard to documentation, handling, and privacy HIPAA
An employee may take maternity leave under the ________ and Medical Leave Act Family
The heading on Page 3 of ATC’s Code of Conduct: Doing What’s _________ Right
Tax (acronym) imposed on both employees and employers to fund Social Security and Medicare FICA
The Federal _____________ Guidelines outline the seven elements of an effective compliance program Sentencing
Tone at the ________ Top
An anonymous way to report an ethics or compliance concern Helpline
The number of members on ATC’s Policy & Ethics Committee Four
________________ Reliability Organization Midwest
Juanita Banks is ATC’s Designated ___________ Officer Compliance
Substantiated ethics and/or compliance violations are reported to ATC’s ____________ Committee Audit
Enterprise ____________ Management Information
Regulatory entity (acronym) that assists in the protection of employment discrimination on the basis of race, sex, religion, national origin, and a variety of other characteristics EEOC
Information should be classified as ATC __________ Information when the unauthorized disclosure, alteration, or destruction of that information could expose the Company to a significant level of risk Confidential
Controls for providing Users the means to verify or validate a claimed identity through the presentation of something they know (e.g., passwords), something they own (e.g., hardware token), or something they are (e.g., fingerprint, biometrics, etc.). Authentication
Per the Acceptable Use of Electronic Resources Policy, data moved to removable media sources (e.g. USB, CD, etc.) must be ___________. Encrypted
Ways to report potential issues or concerns are outlined in ATC’s Open ______ Policy Door
Employment ______________ and Professional References Policy Verification
Accepting a gift card from a supplier vying for business at ATC represents a Conflict of ________ Interest
Per the External Communications & Social Media Policy, do not represent yourself as a ____________ for ATC Spokesperson
Per the Gifts & Entertianment Policy, all tangible gifts given to an ATC employee, regardless of dollar amount, must be reported to _________ Payroll
Environmental ____________ Agency Protection
A competitive _________ is required to procure services over $100,000 Bid
___________ Oxley Act was instituted in 2002, as a result of a series of high-profile financial scandals Sarbanes
Per NERC, Critical __________ are facilities, systems, and equipment which, if destroyed, degraded, or otherwise rendered unavailable, would affect the reliability or operability of the bulk electric system Assets
Personnel Risk ____________ Policy Assessment
The Travel & Expense Policy governs transactions inputted into this system Concur
___________ employees who do not charge time to project work orders only need to report their exception time (e.g. vacation, sick, personal, or floating holiday hours) each pay period Exempt
Per ATC’s Code of Conduct, each ATC employee has a responsibility to promptly _________ any known violation or dishonest, unethical, or illegal conduct Report
_______ % of ATC’s corporate goal attainment ties to Reliability Compliance Fifteen
Behavior Based _________ Observations Safety

Quartz Security: Crossword puzzle for National Cyber Security Awareness Month 2017

Type
Crossword
Description

a list of entities that are blocked or denied access/privilege BLACKLIST
the unauthorized access and disclosure of sensitive information released outside of an unauthorized organization DATA BREACH
specialized techniques for gathering, retaining and analyzing data as evidence for investigations FORENSICS
an act of pretending to be from a reputable organization to deceive individuals into providing sensitive information PHISHING
a list of organizations that are considered trustworthy or allowed access/privilege WHITELIST
ensuring information with sensitive data remain hidden, inaccessible to unauthorized users. DATA PRIVACY
a type of malware that requires some type of payment to either remove the malware by the hacker, or retrieve files that have been encrypted by the hacker. RANSOMWARE
a type of digital currency Bitcoin
The practice and process designed to help protect one or an organizations networks, computers, programs and data from unauthorized access. cybersecurity
Medical history information, laboratory results, insurance information and other healthcare data an entity collects to identify an individual Personal health Information
The name of the leader who you would report security incidents to Charlie Pierce
The name of the leader who you would report privacy incidents to Kelly Skifton
The name of our Chief Information Officer who oversees the IT Infrastructures at Quartz Marybeth Bay
Duo-Security is considered what type of authentication when logging in remotely? Multifactor
Name of the form used to submit requests for: Hardware/Software, Security, Telecom or Facilities (Badging only) IT Request Form
To report a compliance incident, who do you contact? compliancehotline
Quartz policy and procedure S014 outlines what type of policy? ACCEPTABLE USE
The process of taking an unencrypted message or data and applying a mathematical function to it, to produce an encrypted message ENCRYPTION
What process do you need to go through for approval before files can be exchanged externally? externaldatareview
You are required to wear this item at all times while on Company premises badge
When a person tags along with another person who is authorized to gain entry pass a certain checkpoint piggyback

HIPAA Awareness Crossword

Type
Crossword
Description

One of the core values Integrity
Amount of information needed to accomplish a task (2 wrds) Minimum Necessary
Person with access to the system User
Privacy Officer Emily Calvillo
Person or organization that maintains, creates, transfers, or receives PHI to perform a function on behalf of HRHS (2 wrds) Business Associate
When PHI is exposed we have committed a ___ of the patient's privacy Violation
Reportable event Breach
Document describes a patients rights to their health information NPP
One of the core values Compassion
The release, transfer, access to or divulging of patient information Disclosure
Immediate areas consisting of a desktop, laptop and other items to complete work Workstation
Method used to protect electronic data Encryption
One of the core values Accountability
Employees, volunteers, students/observers who represent the facility are members of the __ Workforce
A state of NOT protecting PHI Unsecured
HRHS strives to protect the ____ of its patients Privacy
Confidential measure used to protect systems made up of a string of characters Password
A state of protected PHI from unauthorized users Secured
Protected Health Information PHI
Person who is the subject of PHI Individual
One of the core values Respect
Management of healthcare services to an individual Treatment
Committee responsible for reviewing internal HIPAA concerns, policies and procedures HOC
One of the core values Excellence

corporate compliance Crossword

Type
Crossword
Description

conforming to a rule i.e. policy, standard or law compliance
moral principles and values that guide a person Ethics
guideline of ethical practices that Catholic Charities expects of its employees code of conduct
unacceptable or improper behavior by an employee misconduct
Law/Regulations to protect the privacy of health information HIPAA
Misconduct must be immediately..... reported
sitauation in which a person is in a position to derive personal benefit from decisions made in their official capcity conflict of interest
all potential conflicts of interest need to be.... disclosed
the policy that protects an employee who makes a "good faith" report of misconduct Non-Retaliation
Catholic Charities Human Resource Director Barb Poling
any information about an individual kept by an organization, including data that can be used to trace the person's identity PHI

Technology Crossword

Type
Crossword
Description

The opening page of a website. homepage
A computer language used to create web pages. HTML
A file format for compressing pictures JPEG
A link from a hypertext file or document to another location or file, activated by clicking on a highlighted word or image on the screen. hyperlink
The ability to use technology to find, organize, and evaluate information. digitalliteracy
A group of networked computers that share a common address (.edu, .com). Domain
The process of converting data into code. encryption
A security system that protects a network. firewall
A way to narrow search results by using the operators AND, OR, & NOT. BooleanLogic
A temporary storage place for quick retrieval of frequently used data. cache
A small text file stored in a computer’s hard drive by a website. cookie
An organized collection of information that is searchable. database
To practice appropriate and responsible behavior when using technology digitalcitizenship
The text field in a web browser where an URL is displayed or typed. addressbar
The amount of data that can be sent through a connection at one time. bandwidth
To save the URL of a webpage for easy access in the future. bookmark
Instructions you input for a computer to follow. code
The action of writing CODE or instructions for the computer to follow. programming
An unit of memory (8 binary digits represent a character). byte
Central Processing Unit- The brain of the computer. cpu
A program that searches for items in a database or sites on the WWW. searchengine
Uniform Resource Locator- The address of a resource on the WWW. url
A program used to navigate the WWW. browser
The global system of interconnected computer networks that link billions of devices. internet
A set of computers connected together for the purpose of sharing resources. network
Hyper Text Transfer Protocol- the set of rules for transferring files on the World Wide Web. http

HEALTH INFORMATION Word Search

Type
Word Search
Description

RELEASE OF INFORMATION
ABSTRACTIING
HIPAA
MEDICAL RECORD
AAPC
HEALTH INFORMATION
MEDICAL NECESSITY
CHART
RHIA
AUDIT
DATA
PRIVACY
CODING
RHIT
COMPLIANCE
CONFIDENTIAL
SECURITY
FILE
REGISTRATION
EHR
PHI
CHART ASSEMBLY
TRANSCRIPTION
AHIMA
KHIMA
PROVIDER
CODER
ICD10

Computer Safety Crossword

Type
Crossword
Description

Small circuit board that controls processing within a computer microprocessor
Physical parts of a computer Hardware
A program that contains instructions for a computer Software
Applications are also known as Apps
Consists of information Message
Refers to the method used to enter or transmit your message to a computer Input
Information or data retrieved or received from a computer Output
"Brain of the computer" CPU
Input/Output device that reads data from and writes data to a disK Diskdrive
Output device that displays text and graphics on a screen Monitor
Input device used for commands and navigation Mouse
Input device with an arrangement of letters, etc. Keyboard
First line of defense Password
An unauthorized user able to access and misuse information Hacker
A destructive program loaded onto a computer Virus
Defamation by written or printed words or pictures Libel
Defamation by oral utterance Slander
A program that allows users to view web pages and online information Browser
Sotware that has been written to detect, isolate, and destroy viruses Antivirusprogram
A web address URL
Any word, phrase, or picure that, when clicked, take the user to another location Hyperlink
Electronic mail Email
Playing video and sound in real time Streaming
Retrieving somehting fromt he internet and storing it on a disk drive Downloading
Using material antoher person has created and claims it as your own Plagiarism

Computer Terms Crossword

Type
Crossword
Description

is the ability to use information and communication technologies to find, evaluate, create, and communicate information, requiring both cognitive and technical skills Digital Literacy
a computer designed for use by one person at a time. Personal Computer
is the collection of physical parts of a computer system. Hardware
is a generic term for organized collections of computer data and instructions Software
one of the most essential parts of a computer system. Motherboard
A central processing unit CPU
refers to the copying and archiving of computer data so it may be used to restore the original after a data loss event. Back Up
The primary computer storage device, which spins, reads and writes one or more fixed disk platters. Hard Drive
Short for digital versatile disc or digital video disc DVD
a device or program that enables a computer to transmit data over Modem
a widely used sans-serif typeface developed in 1957 by Swiss typeface designer Max Miedinger Helvetica
Universal Serial Bus USB
The global communication network that allows almost all computers worldwide to connect and exchange information. Internet
providing a common topic identifier in text and chat messages so they can be searched as a group. Commonly used in tweets hashtag
connects to the motherboard of a computer system and generates output images to display. Video Card