Difference between revisions of "Terms related to privacy, confidentiality, and security"
From Clinfowiki
(→Important terms related to patient privacy, data confidentiality, and security) |
(→Important terms related to patient privacy, data confidentiality, and security) |
||
Line 5: | Line 5: | ||
* [[Administrative Safeguards]] | * [[Administrative Safeguards]] | ||
* [[Antivirus program]] | * [[Antivirus program]] | ||
+ | * [[ARRA]] | ||
* [[Authentication]] | * [[Authentication]] | ||
* [[Authorization ]] | * [[Authorization ]] | ||
Line 37: | Line 38: | ||
* [[Genetic Information]] | * [[Genetic Information]] | ||
* [[Health Insurance Portability and Accountability Act (HIPAA)]] | * [[Health Insurance Portability and Accountability Act (HIPAA)]] | ||
− | |||
− | |||
* [[HTTPS protocol]] | * [[HTTPS protocol]] | ||
* [[In loco parentis]] | * [[In loco parentis]] |
Revision as of 06:22, 11 October 2014
- Acceptable Use Policy (AUP)
- Access control
- Administrative Safeguards
- Antivirus program
- ARRA
- Authentication
- Authorization
- Autonomy
- Audit trails
- Availability
- Biometrics
- Business Associates
- Certificates
- Confidentiality
- Contingency Plan
- Cookies
- Covered Entities
- Data security
- Data integrity
- Data Governance
- Data Use Agreement
- Decrypting
- De-Identified Data
- Digital Signature
- Disaster Recovery Plan
- Disclosure
- Emancipated Minor
- Identifiable Health Data
- Identity Key
- Institutional Review Board (IRB)
- Electronic Signature
- Encryption
- FERPA
- Firewall
- FTP (File Transfer Protocol)
- Genetic Information
- Health Insurance Portability and Accountability Act (HIPAA)
- HTTPS protocol
- In loco parentis
- Information Security Officer (ISO)
- Integrity
- Limited Data Set
- Malicious Software
- Minimum Necessary
- Mission Critical
- Non-repudiation
- Password
- Personal identifiers
- Personally identifiable data
- Phishing
- Pretty Good Privacy
- Privacy
- Protected Health Information (PHI)
- Psychotherapy Notes
- Remote login
- Risk Assessment
- Role-based access
- Rootkit
- Secure Sockets Layer
- Security Rule
- Spoofing
- System Assessment
- TCP/IP
- Temporal Key Integrity Protocol (TKIP)
- Trojan horse
- Transport Layer Security
- Treatment, Payment and Operation (TPO)
- Unemancipated Minor
- Virtual Private Network
- Virus
- Wi-Fi Protected Access (WPA)
- Wired Equivalent Privacy (WEP)
- Worm