Difference between revisions of "Terms related to privacy, confidentiality, and security"
From Clinfowiki
T. Botello (Talk | contribs) (Adding the term "Data Governance" to the list - Tyson Botello) |
(→Important terms related to patient privacy, data confidentiality, and security) |
||
Line 64: | Line 64: | ||
* [[Spoofing]] | * [[Spoofing]] | ||
* [[System Assessment]] | * [[System Assessment]] | ||
+ | * [[TCP/IP]] | ||
+ | * [[Temporal Key Integrity Protocol (TKIP)]] | ||
* [[Trojan horse]] | * [[Trojan horse]] | ||
* [[Transport Layer Security]] | * [[Transport Layer Security]] | ||
Line 71: | Line 73: | ||
* [[Virus]] | * [[Virus]] | ||
* [[Wi-Fi Protected Access (WPA)]] | * [[Wi-Fi Protected Access (WPA)]] | ||
+ | * [[Wired Equivalent Privacy (WEP)]] | ||
* [[Worm]] | * [[Worm]] | ||
+ | |||
[[Category: Definition]] | [[Category: Definition]] |
Revision as of 05:16, 8 October 2014
- Acceptable Use Policy (AUP)
- Access control
- Administrative Safeguards
- Antivirus program
- Authentication
- Authorization
- Autonomy
- Audit trails
- Availability
- Biometrics
- Business Associates
- Certificates
- Confidentiality
- Contingency Plan
- Cookies
- Covered Entities
- Data security
- Data integrity
- Data Governance
- Data Use Agreement
- Decrypting
- De-Identified Data
- Digital Signature
- Disaster Recovery Plan
- Disclosure
- Emancipated Minor
- Identifiable Health Data
- Identity Key
- Institutional Review Board (IRB)
- Electronic Signature
- Encryption
- FERPA
- Firewall
- FTP (File Transfer Protocol)
- Genetic Information
- Health Insurance Portability and Accountability Act (HIPAA)
- HIPAA Audit
- Health Information Technology Economy and Clinical Health (HITECH)
- HTTPS protocol
- In loco parentis
- Information Security Officer (ISO)
- Integrity
- Limited Data Set
- Malicious Software
- Minimum Necessary
- Mission Critical
- Non-repudiation
- Password
- Personal identifiers
- Personally identifiable data
- Phishing
- Pretty Good Privacy
- Privacy
- Protected Health Information (PHI)
- Psychotherapy Notes
- Remote login
- Risk Assessment
- Role-based access
- Rootkit
- Secure Sockets Layer
- Security Rule
- Spoofing
- System Assessment
- TCP/IP
- Temporal Key Integrity Protocol (TKIP)
- Trojan horse
- Transport Layer Security
- Treatment, Payment and Operation (TPO)
- Unemancipated Minor
- Virtual Private Network
- Virus
- Wi-Fi Protected Access (WPA)
- Wired Equivalent Privacy (WEP)
- Worm