Difference between revisions of "Terms related to privacy, confidentiality, and security"

From Clinfowiki
Jump to: navigation, search
m
Line 4: Line 4:
 
* [[Access control]]
 
* [[Access control]]
 
* [[Administrative Safeguards]]
 
* [[Administrative Safeguards]]
 +
* [[Anonymization of data]]
 
* [[Antivirus program]]
 
* [[Antivirus program]]
 
* [[ARRA]]
 
* [[ARRA]]
 +
* [[Attestation]]
 +
* [[Audit trail]]
 
* [[Authentication]]
 
* [[Authentication]]
 
* [[Authorization ]]
 
* [[Authorization ]]
Line 11: Line 14:
 
* [[Audit trails]]
 
* [[Audit trails]]
 
* [[Availability]]
 
* [[Availability]]
 +
* [[Backup]]
 
* [[Biometrics]]
 
* [[Biometrics]]
 
* [[Break Glass]]
 
* [[Break Glass]]
 
* [[Business Associates]]
 
* [[Business Associates]]
 +
* [[Business continuity]]
 +
* [[Business escrow]]
 
* [[Certificates]]
 
* [[Certificates]]
 +
* [[Co-mingled records]]
 
* [[Confidentiality]]
 
* [[Confidentiality]]
 
* [[Contingency Plan]]
 
* [[Contingency Plan]]
Line 20: Line 27:
 
* [[Covered Entities]]
 
* [[Covered Entities]]
 
* [[Data Breach]]
 
* [[Data Breach]]
 +
* [[Data confidentiality]]
 +
* [[Data re-identification]]
 
* [[Data security]]
 
* [[Data security]]
 
* [[Data integrity]]
 
* [[Data integrity]]
Line 39: Line 48:
 
* [[FTP (File Transfer Protocol)]]
 
* [[FTP (File Transfer Protocol)]]
 
* [[Genetic Information]]
 
* [[Genetic Information]]
 +
* [[Hacker]]
 
* [[Health Insurance Portability and Accountability Act (HIPAA)]]
 
* [[Health Insurance Portability and Accountability Act (HIPAA)]]
 
* [[HTTPS protocol]]
 
* [[HTTPS protocol]]
Line 50: Line 60:
 
* [[Non-repudiation]]
 
* [[Non-repudiation]]
 
* [[Password]]
 
* [[Password]]
 +
* [[Password change policy]]
 
* [[Personal identifiers]]
 
* [[Personal identifiers]]
 
* [[Personally identifiable data]]
 
* [[Personally identifiable data]]
Line 55: Line 66:
 
* [[Pretty Good Privacy]]
 
* [[Pretty Good Privacy]]
 
* [[Privacy]]
 
* [[Privacy]]
 +
* [[Private key]]
 
* [[Protected Health Information (PHI)]]
 
* [[Protected Health Information (PHI)]]
 +
* [[Proxy access]]
 
* [[Psychotherapy Notes]]
 
* [[Psychotherapy Notes]]
 +
* [[Public key]]
 
* [[Remote login]]
 
* [[Remote login]]
 
* [[Risk Assessment]]
 
* [[Risk Assessment]]
 +
* [[Risk analysis]]
 +
* [[Risk mitigation]]
 
* [[Role-based access]]
 
* [[Role-based access]]
 
* [[Rootkit]]
 
* [[Rootkit]]
 
* [[Secure FTP]]
 
* [[Secure FTP]]
 
* [[Secure Sockets Layer]]
 
* [[Secure Sockets Layer]]
 +
* [[Security audit]]
 +
* [[Security flaw]]
 
* [[Security Rule]]
 
* [[Security Rule]]
 
* [[Spoofing]]
 
* [[Spoofing]]
Line 71: Line 89:
 
* [[Transport Layer Security]]
 
* [[Transport Layer Security]]
 
* [[Treatment, Payment and Operation (TPO)]]
 
* [[Treatment, Payment and Operation (TPO)]]
 +
* [[Two-factor authentication]]
 
* [[Unemancipated Minor]]
 
* [[Unemancipated Minor]]
 
* [[Virtual Private Network]]
 
* [[Virtual Private Network]]
 
* [[Virus]]
 
* [[Virus]]
 +
* [[White hat hacker]]
 
* [[Wi-Fi Protected Access (WPA)]]
 
* [[Wi-Fi Protected Access (WPA)]]
 
* [[Wired Equivalent Privacy (WEP)]]
 
* [[Wired Equivalent Privacy (WEP)]]

Revision as of 18:49, 10 November 2014

Important terms related to patient privacy, data confidentiality, and security