Difference between revisions of "Terms related to privacy, confidentiality, and security"
From Clinfowiki
Varungadhok (Talk | contribs) |
m |
||
Line 4: | Line 4: | ||
* [[Access control]] | * [[Access control]] | ||
* [[Administrative Safeguards]] | * [[Administrative Safeguards]] | ||
+ | * [[Anonymization of data]] | ||
* [[Antivirus program]] | * [[Antivirus program]] | ||
* [[ARRA]] | * [[ARRA]] | ||
+ | * [[Attestation]] | ||
+ | * [[Audit trail]] | ||
* [[Authentication]] | * [[Authentication]] | ||
* [[Authorization ]] | * [[Authorization ]] | ||
Line 11: | Line 14: | ||
* [[Audit trails]] | * [[Audit trails]] | ||
* [[Availability]] | * [[Availability]] | ||
+ | * [[Backup]] | ||
* [[Biometrics]] | * [[Biometrics]] | ||
* [[Break Glass]] | * [[Break Glass]] | ||
* [[Business Associates]] | * [[Business Associates]] | ||
+ | * [[Business continuity]] | ||
+ | * [[Business escrow]] | ||
* [[Certificates]] | * [[Certificates]] | ||
+ | * [[Co-mingled records]] | ||
* [[Confidentiality]] | * [[Confidentiality]] | ||
* [[Contingency Plan]] | * [[Contingency Plan]] | ||
Line 20: | Line 27: | ||
* [[Covered Entities]] | * [[Covered Entities]] | ||
* [[Data Breach]] | * [[Data Breach]] | ||
+ | * [[Data confidentiality]] | ||
+ | * [[Data re-identification]] | ||
* [[Data security]] | * [[Data security]] | ||
* [[Data integrity]] | * [[Data integrity]] | ||
Line 39: | Line 48: | ||
* [[FTP (File Transfer Protocol)]] | * [[FTP (File Transfer Protocol)]] | ||
* [[Genetic Information]] | * [[Genetic Information]] | ||
+ | * [[Hacker]] | ||
* [[Health Insurance Portability and Accountability Act (HIPAA)]] | * [[Health Insurance Portability and Accountability Act (HIPAA)]] | ||
* [[HTTPS protocol]] | * [[HTTPS protocol]] | ||
Line 50: | Line 60: | ||
* [[Non-repudiation]] | * [[Non-repudiation]] | ||
* [[Password]] | * [[Password]] | ||
+ | * [[Password change policy]] | ||
* [[Personal identifiers]] | * [[Personal identifiers]] | ||
* [[Personally identifiable data]] | * [[Personally identifiable data]] | ||
Line 55: | Line 66: | ||
* [[Pretty Good Privacy]] | * [[Pretty Good Privacy]] | ||
* [[Privacy]] | * [[Privacy]] | ||
+ | * [[Private key]] | ||
* [[Protected Health Information (PHI)]] | * [[Protected Health Information (PHI)]] | ||
+ | * [[Proxy access]] | ||
* [[Psychotherapy Notes]] | * [[Psychotherapy Notes]] | ||
+ | * [[Public key]] | ||
* [[Remote login]] | * [[Remote login]] | ||
* [[Risk Assessment]] | * [[Risk Assessment]] | ||
+ | * [[Risk analysis]] | ||
+ | * [[Risk mitigation]] | ||
* [[Role-based access]] | * [[Role-based access]] | ||
* [[Rootkit]] | * [[Rootkit]] | ||
* [[Secure FTP]] | * [[Secure FTP]] | ||
* [[Secure Sockets Layer]] | * [[Secure Sockets Layer]] | ||
+ | * [[Security audit]] | ||
+ | * [[Security flaw]] | ||
* [[Security Rule]] | * [[Security Rule]] | ||
* [[Spoofing]] | * [[Spoofing]] | ||
Line 71: | Line 89: | ||
* [[Transport Layer Security]] | * [[Transport Layer Security]] | ||
* [[Treatment, Payment and Operation (TPO)]] | * [[Treatment, Payment and Operation (TPO)]] | ||
+ | * [[Two-factor authentication]] | ||
* [[Unemancipated Minor]] | * [[Unemancipated Minor]] | ||
* [[Virtual Private Network]] | * [[Virtual Private Network]] | ||
* [[Virus]] | * [[Virus]] | ||
+ | * [[White hat hacker]] | ||
* [[Wi-Fi Protected Access (WPA)]] | * [[Wi-Fi Protected Access (WPA)]] | ||
* [[Wired Equivalent Privacy (WEP)]] | * [[Wired Equivalent Privacy (WEP)]] |
Revision as of 18:49, 10 November 2014
- Acceptable Use Policy (AUP)
- Access control
- Administrative Safeguards
- Anonymization of data
- Antivirus program
- ARRA
- Attestation
- Audit trail
- Authentication
- Authorization
- Autonomy
- Audit trails
- Availability
- Backup
- Biometrics
- Break Glass
- Business Associates
- Business continuity
- Business escrow
- Certificates
- Co-mingled records
- Confidentiality
- Contingency Plan
- Cookies
- Covered Entities
- Data Breach
- Data confidentiality
- Data re-identification
- Data security
- Data integrity
- Data Governance
- Data Use Agreement
- Decrypting
- De-Identified Data
- Digital Signature
- Disaster Recovery Plan
- Disclosure
- Emancipated Minor
- Identifiable Health Data
- Identity Key
- Institutional Review Board (IRB)
- Electronic Signature
- Encryption
- FERPA
- Firewall
- FTP (File Transfer Protocol)
- Genetic Information
- Hacker
- Health Insurance Portability and Accountability Act (HIPAA)
- HTTPS protocol
- In loco parentis
- Information Security Officer (ISO)
- Integrity
- Limited Data Set
- Malicious Software
- Minimum Necessary
- Mission Critical
- Non-repudiation
- Password
- Password change policy
- Personal identifiers
- Personally identifiable data
- Phishing
- Pretty Good Privacy
- Privacy
- Private key
- Protected Health Information (PHI)
- Proxy access
- Psychotherapy Notes
- Public key
- Remote login
- Risk Assessment
- Risk analysis
- Risk mitigation
- Role-based access
- Rootkit
- Secure FTP
- Secure Sockets Layer
- Security audit
- Security flaw
- Security Rule
- Spoofing
- System Assessment
- TCP/IP
- Temporal Key Integrity Protocol (TKIP)
- Trojan horse
- Transport Layer Security
- Treatment, Payment and Operation (TPO)
- Two-factor authentication
- Unemancipated Minor
- Virtual Private Network
- Virus
- White hat hacker
- Wi-Fi Protected Access (WPA)
- Wired Equivalent Privacy (WEP)
- Worm