Difference between revisions of "Terms related to privacy, confidentiality, and security"

From Clinfowiki
Jump to: navigation, search
(Adding the term "Data Governance" to the list - Tyson Botello)
(added Health_Information_Exchange)
 
(43 intermediate revisions by 32 users not shown)
Line 3: Line 3:
 
* [[Acceptable Use Policy (AUP)]]
 
* [[Acceptable Use Policy (AUP)]]
 
* [[Access control]]
 
* [[Access control]]
 +
* [[Access Logs]]
 
* [[Administrative Safeguards]]
 
* [[Administrative Safeguards]]
 +
* [[Anonymization of data]]
 
* [[Antivirus program]]
 
* [[Antivirus program]]
 +
* [[ARRA]]
 +
* [[Attestation]]
 +
* [[Audit trail]]
 
* [[Authentication]]
 
* [[Authentication]]
 
* [[Authorization ]]
 
* [[Authorization ]]
Line 10: Line 15:
 
* [[Audit trails]]
 
* [[Audit trails]]
 
* [[Availability]]
 
* [[Availability]]
 +
* [[Backup]]
 
* [[Biometrics]]
 
* [[Biometrics]]
 +
* [[Black hat hacker]]
 +
* [[Blacklisting]]
 +
* [[Break Glass]]
 
* [[Business Associates]]
 
* [[Business Associates]]
 +
* [[Business continuity]]
 +
* [[Business escrow]]
 
* [[Certificates]]
 
* [[Certificates]]
 +
* [[Co-mingled records]]
 
* [[Confidentiality]]
 
* [[Confidentiality]]
 
* [[Contingency Plan]]
 
* [[Contingency Plan]]
 
* [[Cookies]]
 
* [[Cookies]]
 
* [[Covered Entities]]
 
* [[Covered Entities]]
 +
* [[Cryptographic Checksum]]
 +
* [[Data Breach]]
 +
* [[Data confidentiality]]
 +
* [[Data re-identification]]
 
* [[Data security]]
 
* [[Data security]]
 
* [[Data integrity]]
 
* [[Data integrity]]
 
* [[Data Governance]]
 
* [[Data Governance]]
 +
* [[Data Retention]]
 
* [[Data Use Agreement]]
 
* [[Data Use Agreement]]
 
* [[Decrypting]]
 
* [[Decrypting]]
Line 27: Line 44:
 
* [[Disclosure]]
 
* [[Disclosure]]
 
* [[Emancipated Minor]]
 
* [[Emancipated Minor]]
 +
* [[FHIR]]
 
* [[Identifiable Health Data]]
 
* [[Identifiable Health Data]]
* [[Identity Key]]
+
* [[Identity (SQL)]]
 
* [[Institutional Review Board (IRB)]]
 
* [[Institutional Review Board (IRB)]]
 
* [[Electronic Signature]]
 
* [[Electronic Signature]]
Line 35: Line 53:
 
* [[Firewall]]
 
* [[Firewall]]
 
* [[FTP (File Transfer Protocol)]]
 
* [[FTP (File Transfer Protocol)]]
 +
* [[Freedom of Information Act (FIOA)]]
 
* [[Genetic Information]]
 
* [[Genetic Information]]
 +
* [[Grey Hat Hacker]]
 +
* [[Hacker]]
 +
* [[Health Information Exchange]]
 
* [[Health Insurance Portability and Accountability Act (HIPAA)]]
 
* [[Health Insurance Portability and Accountability Act (HIPAA)]]
* [[HIPAA Audit]]
+
* [[Homelessness]]
* [[ARRA#Health_Information_Technology_Economy_and_Clinical_Health_.28HITECH.29|Health Information Technology Economy and Clinical Health (HITECH) ]]
+
* [[Hot Sites]]
 
* [[HTTPS protocol]]
 
* [[HTTPS protocol]]
 +
* [[Identification Card]]
 
* [[In loco parentis]]
 
* [[In loco parentis]]
 
* [[Information Security Officer (ISO)]]
 
* [[Information Security Officer (ISO)]]
 
* [[Integrity]]
 
* [[Integrity]]
 +
* [[JavaScript]]
 
* [[Limited Data Set ]]
 
* [[Limited Data Set ]]
 +
* [[Malware]]
 
* [[Malicious Software]]
 
* [[Malicious Software]]
 +
* [[Marketing]]
 +
* [[Medical Record Number]]
 
* [[Minimum Necessary]]
 
* [[Minimum Necessary]]
 
* [[Mission Critical]]
 
* [[Mission Critical]]
 +
* [[Mitigation]]
 
* [[Non-repudiation]]
 
* [[Non-repudiation]]
 
* [[Password]]
 
* [[Password]]
 +
* [[Password change policy]]
 +
* [[Patient privacy]]
 +
* [[Patient Safety and Quality Improvement Act]]
 
* [[Personal identifiers]]
 
* [[Personal identifiers]]
 
* [[Personally identifiable data]]
 
* [[Personally identifiable data]]
Line 54: Line 85:
 
* [[Pretty Good Privacy]]
 
* [[Pretty Good Privacy]]
 
* [[Privacy]]
 
* [[Privacy]]
 +
* [[Private key]]
 
* [[Protected Health Information (PHI)]]
 
* [[Protected Health Information (PHI)]]
 +
* [[Provider Identity Theft]]
 +
* [[Proxy access]]
 +
* [[Proxy server]]
 
* [[Psychotherapy Notes]]
 
* [[Psychotherapy Notes]]
 +
* [[Public key]]
 
* [[Remote login]]
 
* [[Remote login]]
 +
* [[Right to Privacy]]
 
* [[Risk Assessment]]
 
* [[Risk Assessment]]
 +
* [[Risk analysis]]
 +
* [[Risk mitigation]]
 
* [[Role-based access]]
 
* [[Role-based access]]
 
* [[Rootkit]]
 
* [[Rootkit]]
 +
* [[Secure FTP]]
 +
* [[Secure Multipurpose Internet Mail Extensions]]
 
* [[Secure Sockets Layer]]
 
* [[Secure Sockets Layer]]
 +
* [[Security audit]]
 +
* [[Security flaw]]
 +
* [[Security Policy]]
 
* [[Security Rule]]
 
* [[Security Rule]]
 +
* [[Security Standards]]
 
* [[Spoofing]]
 
* [[Spoofing]]
 +
* [[Spyware]]
 
* [[System Assessment]]
 
* [[System Assessment]]
 +
* [[System Security]]
 +
* [[SSH]]
 +
* [[TCP/IP]]
 +
* [[Temporal Key Integrity Protocol (TKIP)]]
 
* [[Trojan horse]]
 
* [[Trojan horse]]
 
* [[Transport Layer Security]]
 
* [[Transport Layer Security]]
 
* [[Treatment, Payment and Operation (TPO)]]
 
* [[Treatment, Payment and Operation (TPO)]]
 +
* [[Two-factor authentication]]
 
* [[Unemancipated Minor]]
 
* [[Unemancipated Minor]]
 +
* [[User Permission]]
 
* [[Virtual Private Network]]
 
* [[Virtual Private Network]]
 
* [[Virus]]
 
* [[Virus]]
 +
* [[White hat hacker]]
 
* [[Wi-Fi Protected Access (WPA)]]
 
* [[Wi-Fi Protected Access (WPA)]]
 +
* [[Wired Equivalent Privacy (WEP)]]
 
* [[Worm]]
 
* [[Worm]]
 +
  
 
[[Category: Definition]]
 
[[Category: Definition]]

Latest revision as of 22:52, 27 November 2015

Important terms related to patient privacy, data confidentiality, and security