Difference between revisions of "Terms related to privacy, confidentiality, and security"
From Clinfowiki
m (→Important terms related to patient privacy, data confidentiality, and security) |
m |
||
Line 3: | Line 3: | ||
* [[Acceptable Use Policy (AUP)]] | * [[Acceptable Use Policy (AUP)]] | ||
* [[Access control]] | * [[Access control]] | ||
+ | * [[Administrative Safeguards]] | ||
+ | * [[Antivirus program]] | ||
* [[Authentication]] | * [[Authentication]] | ||
* [[Authorization ]] | * [[Authorization ]] | ||
Line 12: | Line 14: | ||
* [[Certificates]] | * [[Certificates]] | ||
* [[Confidentiality]] | * [[Confidentiality]] | ||
+ | * [[Contingency Plan]] | ||
* [[Cookies]] | * [[Cookies]] | ||
* [[Covered Entities]] | * [[Covered Entities]] | ||
* [[Data security]] | * [[Data security]] | ||
* [[Data integrity]] | * [[Data integrity]] | ||
+ | * [[Data Use Agreement]] | ||
* [[Decrypting]] | * [[Decrypting]] | ||
* [[De-Identified Data]] | * [[De-Identified Data]] | ||
* [[Digital Signature]] | * [[Digital Signature]] | ||
+ | * [[Disaster Recovery Plan]] | ||
* [[Disclosure]] | * [[Disclosure]] | ||
+ | * [[Emancipated Minor]] | ||
* [[Identifiable Health Data]] | * [[Identifiable Health Data]] | ||
* [[Identity Key]] | * [[Identity Key]] | ||
Line 26: | Line 32: | ||
* [[Encryption]] | * [[Encryption]] | ||
* [[FERPA]] | * [[FERPA]] | ||
+ | * [[Firewall]] | ||
* [[FTP (File Transfer Protocol)]] | * [[FTP (File Transfer Protocol)]] | ||
+ | * [[Genetic Information]] | ||
* [[Health Insurance Portability and Accountability Act (HIPAA)]] | * [[Health Insurance Portability and Accountability Act (HIPAA)]] | ||
* [[HIPAA Audit]] | * [[HIPAA Audit]] | ||
* [[ARRA#Health_Information_Technology_Economy_and_Clinical_Health_.28HITECH.29|Health Information Technology Economy and Clinical Health (HITECH) ]] | * [[ARRA#Health_Information_Technology_Economy_and_Clinical_Health_.28HITECH.29|Health Information Technology Economy and Clinical Health (HITECH) ]] | ||
* [[HTTPS protocol]] | * [[HTTPS protocol]] | ||
+ | * [[In loco parentis]] | ||
* [[Information Security Officer (ISO)]] | * [[Information Security Officer (ISO)]] | ||
* [[Integrity]] | * [[Integrity]] | ||
Line 45: | Line 54: | ||
* [[Privacy]] | * [[Privacy]] | ||
* [[Protected Health Information (PHI)]] | * [[Protected Health Information (PHI)]] | ||
+ | * [[Psychotherapy Notes]] | ||
* [[Remote login]] | * [[Remote login]] | ||
+ | * [[Risk Analysis]] | ||
* [[Role-based access]] | * [[Role-based access]] | ||
* [[Rootkit]] | * [[Rootkit]] | ||
Line 54: | Line 65: | ||
* [[Transport Layer Security]] | * [[Transport Layer Security]] | ||
* [[Treatment, Payment and Operation (TPO)]] | * [[Treatment, Payment and Operation (TPO)]] | ||
+ | * [[Unemancipated Minor]] | ||
* [[Virtual Private Network]] | * [[Virtual Private Network]] | ||
* [[Virus]] | * [[Virus]] |
Revision as of 19:13, 23 October 2013
- Acceptable Use Policy (AUP)
- Access control
- Administrative Safeguards
- Antivirus program
- Authentication
- Authorization
- Autonomy
- Audit trails
- Availability
- Biometrics
- Business Associates
- Certificates
- Confidentiality
- Contingency Plan
- Cookies
- Covered Entities
- Data security
- Data integrity
- Data Use Agreement
- Decrypting
- De-Identified Data
- Digital Signature
- Disaster Recovery Plan
- Disclosure
- Emancipated Minor
- Identifiable Health Data
- Identity Key
- Institutional Review Board (IRB)
- Electronic Signature
- Encryption
- FERPA
- Firewall
- FTP (File Transfer Protocol)
- Genetic Information
- Health Insurance Portability and Accountability Act (HIPAA)
- HIPAA Audit
- Health Information Technology Economy and Clinical Health (HITECH)
- HTTPS protocol
- In loco parentis
- Information Security Officer (ISO)
- Integrity
- Limited Data Set
- Malicious Software
- Minimum Necessary
- Mission Critical
- Non-repudiation
- Password
- Personal identifiers
- Personally identifiable data
- Phishing
- Pretty Good Privacy
- Privacy
- Protected Health Information (PHI)
- Psychotherapy Notes
- Remote login
- Risk Analysis
- Role-based access
- Rootkit
- Secure Sockets Layer
- Security Rule
- Spoofing
- Trojan horse
- Transport Layer Security
- Treatment, Payment and Operation (TPO)
- Unemancipated Minor
- Virtual Private Network
- Virus
- Wi-Fi Protected Access (WPA)
- Worm