Privacy & Information Security Word Search

Edit Answers
PHELJCHNORAZPCSXZZFJ PCMUSWETHZYIITJHCFTS EBQSWWLVWIRLXHLEOCSK LQKAYRUPPHAIIYPNRGHB UTQFNYRHOISWPPMVJQLE REFEOCYBERSECURITYJA YREGIWTJFVEMANUPSDSK CARUTKIHQPCWDPLBVOFJ AWUAAQREATEKMPBNGNTE VMSRZAUTHENTICATIONL IOODIPCZDCMPNCYAOTLA RSLSRUEPHHUHIKXIVCUC PNCAOISWCNMISZSNBLSI EASAHBUUAIISTZTCBIES KRIPTZAWECNHRMGIKCEY ITDIUPCHRAIIAALDQKBH KESHAJKRBLMNTWEEXVHP ACQUISITIONGIJWNMMBZ QGSENGFPIKZQVHRTFOES WHAIKKEDZKVSEKSSECCA
1.
Access
2.
Acquisition
3.
Administrative
4.
Authentication
5.
Authorization
6.
Breach
7.
Cybersecurity
8.
Disclosure
9.
DoNotClick
10.
HIPAA
11.
Incident
12.
Minimumnecessary
13.
NPP
14.
PHI
15.
Phishing
16.
Physical
17.
PrivacyRule
18.
Ransomware
19.
Safeguards
20.
SecurityRule
21.
Technical
22.
Use
23.
WHA