My Crossword Maker Logo
Powered by BrightSprout
Save Status:
or to save your progress. The page will not refresh.
Controls:
SPACEBAR SWITCHES TYPING DIRECTION
Answer Key:
Edit a Copy:
Make Your Own:
Crossword Word Search Worksheet
Rate This Puzzle:
Log in or sign up to rate this puzzle.

HIPAA Crossword Puzzle

Across
Business Associate hereby agrees to prohibit the use and disclosure of PHI that is ______ information for underwriting.
I.H.S. may provide the individual a right to request ______ to PHI or a record about the individual in a designated record set as long as the PHI is maintained in the designated record set.
PHI ____ individually identifiable health information present in education records, employment records held by I.H.S. in its role as employer and of persons who are deceased for more than 50 years.
If the expiration date has passed or the expiration event is to have occurred, I.H.S. will treat an authorization as _____.
The property that data or information is not made available or disclosed to unauthorized persons or processes is _____
A record of _______ and maintenance to facility and security systems will be maintained by the designated person assigned with the responsibility of facility security.
I.H.S. is permitted to use and disclose PHI of an individual to carry out treatment _____ or healthcare operations.
I.H.S. and business associates will make reasonable efforts to limit the access of persons or classes of persons, as appropriate, in their workforce who need ______ to ePHI to carry out their duties and for each person or class of persons, the categories of Ephi/PHI to which access is needed must be reasonably limited.
Down
I.H.S. will ensure that training records are being kept and maintained in a _____ with the compliance records.
If the breach affects more 500 residents of a state _____, notice must be prominent in media outlets serving that state or jurisdiction without reasonably delay and no later than 60 calendar days after the date the breach was discovered by the CE.
The use fo an algorithmic process to transform data into a form in which there is a low probability of assigning meaning without use of a confidential process or key is called ____
The technology and the policy and procedures for its use that protect ePHI and control access to it is ______ safeguard.
I.H.S. will designate an _____ who will perform the necessary functions to safeguard the privacy and security requirements of PHI.
I.H.S. may terminate a request to restrict uses and disclosures of PHI if the individual submits in ______ the termination of their request to restrict uses and disclosures of PHI.
Any inadvertent disclosure between two persons who are authorized to access PHI at I.H.S., and the information received as a result of such disclosure is not further used or disclosed in a manner not _______.
The business associate will, on the discovery of a _____ of unsecured PHI, notify I.H.S.
The ____ personnel will arrive at the continuity facility first to prepare the site for running a business.
The compliance team will approve the encryption methods used to protect the confidentiality, _____ and availability of ePHI during transmission over a electronic communication network.
In the event the Business Associate fails to perform the obligations under this agreement, I.H.S. may it's option require the BA to _____ any loss occasioned by the unauthorized disclosure or use of PHI.
Employees will not be allowed to write down a password leaving them in areas that are ______ to others and will have to commit the same to memory.
A description about your medical information may be used and disclosed and how you can get access to this information is the