Difference between revisions of "Terms related to privacy, confidentiality, and security"
From Clinfowiki
Peggy Hines (Talk | contribs) |
(added Health_Information_Exchange) |
||
(20 intermediate revisions by 13 users not shown) | |||
Line 3: | Line 3: | ||
* [[Acceptable Use Policy (AUP)]] | * [[Acceptable Use Policy (AUP)]] | ||
* [[Access control]] | * [[Access control]] | ||
+ | * [[Access Logs]] | ||
* [[Administrative Safeguards]] | * [[Administrative Safeguards]] | ||
* [[Anonymization of data]] | * [[Anonymization of data]] | ||
Line 45: | Line 46: | ||
* [[FHIR]] | * [[FHIR]] | ||
* [[Identifiable Health Data]] | * [[Identifiable Health Data]] | ||
− | * [[Identity | + | * [[Identity (SQL)]] |
* [[Institutional Review Board (IRB)]] | * [[Institutional Review Board (IRB)]] | ||
* [[Electronic Signature]] | * [[Electronic Signature]] | ||
Line 52: | Line 53: | ||
* [[Firewall]] | * [[Firewall]] | ||
* [[FTP (File Transfer Protocol)]] | * [[FTP (File Transfer Protocol)]] | ||
+ | * [[Freedom of Information Act (FIOA)]] | ||
* [[Genetic Information]] | * [[Genetic Information]] | ||
* [[Grey Hat Hacker]] | * [[Grey Hat Hacker]] | ||
* [[Hacker]] | * [[Hacker]] | ||
+ | * [[Health Information Exchange]] | ||
* [[Health Insurance Portability and Accountability Act (HIPAA)]] | * [[Health Insurance Portability and Accountability Act (HIPAA)]] | ||
+ | * [[Homelessness]] | ||
* [[Hot Sites]] | * [[Hot Sites]] | ||
* [[HTTPS protocol]] | * [[HTTPS protocol]] | ||
+ | * [[Identification Card]] | ||
* [[In loco parentis]] | * [[In loco parentis]] | ||
* [[Information Security Officer (ISO)]] | * [[Information Security Officer (ISO)]] | ||
Line 63: | Line 68: | ||
* [[JavaScript]] | * [[JavaScript]] | ||
* [[Limited Data Set ]] | * [[Limited Data Set ]] | ||
+ | * [[Malware]] | ||
* [[Malicious Software]] | * [[Malicious Software]] | ||
+ | * [[Marketing]] | ||
* [[Medical Record Number]] | * [[Medical Record Number]] | ||
* [[Minimum Necessary]] | * [[Minimum Necessary]] | ||
* [[Mission Critical]] | * [[Mission Critical]] | ||
+ | * [[Mitigation]] | ||
* [[Non-repudiation]] | * [[Non-repudiation]] | ||
* [[Password]] | * [[Password]] | ||
Line 85: | Line 93: | ||
* [[Public key]] | * [[Public key]] | ||
* [[Remote login]] | * [[Remote login]] | ||
+ | * [[Right to Privacy]] | ||
* [[Risk Assessment]] | * [[Risk Assessment]] | ||
* [[Risk analysis]] | * [[Risk analysis]] | ||
Line 91: | Line 100: | ||
* [[Rootkit]] | * [[Rootkit]] | ||
* [[Secure FTP]] | * [[Secure FTP]] | ||
+ | * [[Secure Multipurpose Internet Mail Extensions]] | ||
* [[Secure Sockets Layer]] | * [[Secure Sockets Layer]] | ||
* [[Security audit]] | * [[Security audit]] | ||
Line 96: | Line 106: | ||
* [[Security Policy]] | * [[Security Policy]] | ||
* [[Security Rule]] | * [[Security Rule]] | ||
+ | * [[Security Standards]] | ||
* [[Spoofing]] | * [[Spoofing]] | ||
+ | * [[Spyware]] | ||
* [[System Assessment]] | * [[System Assessment]] | ||
* [[System Security]] | * [[System Security]] | ||
+ | * [[SSH]] | ||
* [[TCP/IP]] | * [[TCP/IP]] | ||
* [[Temporal Key Integrity Protocol (TKIP)]] | * [[Temporal Key Integrity Protocol (TKIP)]] | ||
Line 106: | Line 119: | ||
* [[Two-factor authentication]] | * [[Two-factor authentication]] | ||
* [[Unemancipated Minor]] | * [[Unemancipated Minor]] | ||
+ | * [[User Permission]] | ||
* [[Virtual Private Network]] | * [[Virtual Private Network]] | ||
* [[Virus]] | * [[Virus]] |
Latest revision as of 22:52, 27 November 2015
- Acceptable Use Policy (AUP)
- Access control
- Access Logs
- Administrative Safeguards
- Anonymization of data
- Antivirus program
- ARRA
- Attestation
- Audit trail
- Authentication
- Authorization
- Autonomy
- Audit trails
- Availability
- Backup
- Biometrics
- Black hat hacker
- Blacklisting
- Break Glass
- Business Associates
- Business continuity
- Business escrow
- Certificates
- Co-mingled records
- Confidentiality
- Contingency Plan
- Cookies
- Covered Entities
- Cryptographic Checksum
- Data Breach
- Data confidentiality
- Data re-identification
- Data security
- Data integrity
- Data Governance
- Data Retention
- Data Use Agreement
- Decrypting
- De-Identified Data
- Digital Signature
- Disaster Recovery Plan
- Disclosure
- Emancipated Minor
- FHIR
- Identifiable Health Data
- Identity (SQL)
- Institutional Review Board (IRB)
- Electronic Signature
- Encryption
- FERPA
- Firewall
- FTP (File Transfer Protocol)
- Freedom of Information Act (FIOA)
- Genetic Information
- Grey Hat Hacker
- Hacker
- Health Information Exchange
- Health Insurance Portability and Accountability Act (HIPAA)
- Homelessness
- Hot Sites
- HTTPS protocol
- Identification Card
- In loco parentis
- Information Security Officer (ISO)
- Integrity
- JavaScript
- Limited Data Set
- Malware
- Malicious Software
- Marketing
- Medical Record Number
- Minimum Necessary
- Mission Critical
- Mitigation
- Non-repudiation
- Password
- Password change policy
- Patient privacy
- Patient Safety and Quality Improvement Act
- Personal identifiers
- Personally identifiable data
- Phishing
- Pretty Good Privacy
- Privacy
- Private key
- Protected Health Information (PHI)
- Provider Identity Theft
- Proxy access
- Proxy server
- Psychotherapy Notes
- Public key
- Remote login
- Right to Privacy
- Risk Assessment
- Risk analysis
- Risk mitigation
- Role-based access
- Rootkit
- Secure FTP
- Secure Multipurpose Internet Mail Extensions
- Secure Sockets Layer
- Security audit
- Security flaw
- Security Policy
- Security Rule
- Security Standards
- Spoofing
- Spyware
- System Assessment
- System Security
- SSH
- TCP/IP
- Temporal Key Integrity Protocol (TKIP)
- Trojan horse
- Transport Layer Security
- Treatment, Payment and Operation (TPO)
- Two-factor authentication
- Unemancipated Minor
- User Permission
- Virtual Private Network
- Virus
- White hat hacker
- Wi-Fi Protected Access (WPA)
- Wired Equivalent Privacy (WEP)
- Worm