The Best Crossword Puzzle Maker Online
Powered by BrightSprout
Save Status:
or to save your progress. The page will not refresh.
Controls:
SPACEBAR SWITCHES TYPING DIRECTION
Answer Key:
Edit a Copy:
Make Your Own:
Crossword Word Search Worksheet
Rate This Puzzle:
Log in or sign up to rate this puzzle.

CORPORATE COMPLIANCE PUZZLE

Across
The process of encoding a message so that it can be read only by the sender and the intended recipient.
A listing of required behaviors that if violated might result in disciplinary action. (3 WDS)
Any data that could potentially identify a specific individual.
A conflict between the private interests and the official responsibilities of a person in a position of trust. (3 WDS)
The core beliefs we hold regarding what is right and fair in terms of our actions and our interactions with others.
Must be completed on a daily basis.
The chance that a negative outcome, financial loss, or error can damage the organization.
When data breach should be reported.
United States legislation that provides data privacy and security provisions for safeguarding medical information.
Down
Adherence to a set of rules established by a regulatory body.
Must be worn at all times during work hours.
An examination performed by an independent third party that verifies the guidelines outlined by a regulatory body.
A set of rules or a promise that limits access or places restrictions on certain types of information.
The decisions, choices, and actions (behaviors) we make that reflect and enact our values.
A person or entity making a protected disclosure.
The quality of being honest and having strong moral principles.
Demographic information, medical history, test and laboratory results, insurance information and other data that a healthcare professional collects to identify an individual and determine appropriate care.
Sequence of characters (letters, numbers, symbols) used as a secret key for accessing a computer system or network.
The act of systematic and/or continued unwanted and annoying actions of one party or a group, including threats and demands.
An incident in which sensitive, protected or confidential data has potentially been viewed, stolen or used by an individual unauthorized to do so. (2 WDS)