Difference between revisions of "Terms related to privacy, confidentiality, and security"
From Clinfowiki
Pournejati (Talk | contribs) m |
|||
Line 25: | Line 25: | ||
* [[Confidentiality]] | * [[Confidentiality]] | ||
* [[Contingency Plan]] | * [[Contingency Plan]] | ||
− | |||
− | |||
* [[Cookies]] | * [[Cookies]] | ||
* [[Covered Entities]] | * [[Covered Entities]] | ||
+ | * [[Cryptographic Checksum]] | ||
* [[Data Breach]] | * [[Data Breach]] | ||
* [[Data confidentiality]] | * [[Data confidentiality]] | ||
Line 43: | Line 42: | ||
* [[Disclosure]] | * [[Disclosure]] | ||
* [[Emancipated Minor]] | * [[Emancipated Minor]] | ||
+ | * [[FHIR]] | ||
* [[Identifiable Health Data]] | * [[Identifiable Health Data]] | ||
* [[Identity Key]] | * [[Identity Key]] |
Revision as of 03:15, 7 April 2015
- Acceptable Use Policy (AUP)
- Access control
- Administrative Safeguards
- Anonymization of data
- Antivirus program
- ARRA
- Attestation
- Audit trail
- Authentication
- Authorization
- Autonomy
- Audit trails
- Availability
- Backup
- Biometrics
- Black hat hacker
- Break Glass
- Business Associates
- Business continuity
- Business escrow
- Certificates
- Co-mingled records
- Confidentiality
- Contingency Plan
- Cookies
- Covered Entities
- Cryptographic Checksum
- Data Breach
- Data confidentiality
- Data re-identification
- Data security
- Data integrity
- Data Governance
- Data Retention
- Data Use Agreement
- Decrypting
- De-Identified Data
- Digital Signature
- Disaster Recovery Plan
- Disclosure
- Emancipated Minor
- FHIR
- Identifiable Health Data
- Identity Key
- Institutional Review Board (IRB)
- Electronic Signature
- Encryption
- FERPA
- Firewall
- FTP (File Transfer Protocol)
- Genetic Information
- Grey Hat Hacker
- Hacker
- Health Insurance Portability and Accountability Act (HIPAA)
- HTTPS protocol
- In loco parentis
- Information Security Officer (ISO)
- Integrity
- JavaScript
- Limited Data Set
- Malicious Software
- Minimum Necessary
- Mission Critical
- Non-repudiation
- Password
- Password change policy
- Patient Safety and Quality Improvement Act
- Personal identifiers
- Personally identifiable data
- Phishing
- Pretty Good Privacy
- Privacy
- Private key
- Protected Health Information (PHI)
- Provider Identity Theft
- Proxy access
- Psychotherapy Notes
- Public key
- Remote login
- Risk Assessment
- Risk analysis
- Risk mitigation
- Role-based access
- Rootkit
- Secure FTP
- Secure Sockets Layer
- Security audit
- Security flaw
- Security Rule
- Spoofing
- System Assessment
- TCP/IP
- Temporal Key Integrity Protocol (TKIP)
- Trojan horse
- Transport Layer Security
- Treatment, Payment and Operation (TPO)
- Two-factor authentication
- Unemancipated Minor
- Virtual Private Network
- Virus
- White hat hacker
- Wi-Fi Protected Access (WPA)
- Wired Equivalent Privacy (WEP)
- Worm