Difference between revisions of "Terms related to privacy, confidentiality, and security"
From Clinfowiki
Line 13: | Line 13: | ||
* [[Data Integrity]] | * [[Data Integrity]] | ||
* [[Decrypting]] | * [[Decrypting]] | ||
− | * [[ | + | * [[Identifiable Health Data]] |
* [[Disclosure]] | * [[Disclosure]] | ||
* [[Encryption]] | * [[Encryption]] | ||
Line 22: | Line 22: | ||
* [[Non-repudiation]] | * [[Non-repudiation]] | ||
* [[Password strength]] | * [[Password strength]] | ||
− | |||
* [[Phishing]] | * [[Phishing]] | ||
* [[Pretty Good Privacy]] | * [[Pretty Good Privacy]] | ||
Line 37: | Line 36: | ||
* [[Virus]] | * [[Virus]] | ||
* [[Worm]] | * [[Worm]] | ||
− | |||
[[Category: Definition]] | [[Category: Definition]] |
Revision as of 14:39, 13 October 2011
- Access control
- Authentication
- Authorization
- Autonomy
- Audit Trails
- Biometrics
- Certificates
- Confidential Information
- Confidentiality
- Data security
- Data Integrity
- Decrypting
- Identifiable Health Data
- Disclosure
- Encryption
- Health Insurance Portability and Accountability Act (HIPAA)
- Health Information Technology for Economic and Clinical Health Act(HITECH)
- HTTPS protocol
- Limited Data Set
- Non-repudiation
- Password strength
- Phishing
- Pretty Good Privacy
- Privacy
- Protected Health Information (PHI)
- Remote login
- Role-based access
- Rootkits
- Spoofing
- SSL protocol
- Trojan Horse
- TLS protocol
- Two-factor authentication
- Virus
- Worm