Glossary


A

Access:
The ability or the means necessary to read, write, modify, or communicate data/information or otherwise use any system resource. (This definition applies to 'access' as used in this subpart, not as used in subpart E of this part [the Privacy Standards].) [45 C.F.R. § 164.304]
Access Control:
A device or method that allows access only to authorized users
Access Control List (ACL):
A mechanism that implements access control for a system resource by listing the identities of the system entities that are permitted to access the resource.
Active Content:
Program code embedded in the contents of a web page. When the page is accessed by a web browser, the embedded code is automatically downloaded and executed on the user 's workstation. Ex. Java, ActiveX (MS).
Addressable Safeguard:
Also called addressable implementation specification. A safeguard that must be implemented if it is reasonable and appropriate for the situation, otherwise the related security standard must be met with an appropriate safeguard. If for some reason the standard associated with an addressable safeguard doesn't apply to a particular organization or no safeguard is needed to meet the standard, this needs to be appropriately documented.
Administrative Safeguards:
Administrative actions, and policies and procedures, to manage the selection, development, implementation, and maintenance of security measures to protect electronic protected health information and to manage the conduct of the covered entity's workforce in relation to the protection of that information. [45 C.F.R. § 164.304]
Advanced Encryption Standard (AES):
Replaces DES as the symmetric encryption algorithm that may be used by U.S. Government organizations (and others) to protect sensitive information. Block size of 128 bits and key sizes of 128, 192, and 256 bits.
Affiliate Entity:
A business partner or affiliate
Applet:
Java programs; an application program that uses the client's web browser to provide a user interface.
Asymmetric Cryptography:
Public-key cryptography; A modern branch of cryptography in which the algorithms employ a pair of keys(a public key and a private key) and use a different component of the pair for different steps of the algorithm.
Authentication:
The corroboration that a person is the one claimed. [45 C.F.R. § 164.304]
Authorization:
Consent by the patient for the use and disclosure of health information
Availability:
The property that data or information is accessible and useable upon demand by an authorized person. [45 C.F.R. § 164.304]



HIPAA Security Implementation, Version 1.0
HIPAA Security Implementation, Version 1.0
ISBN: 974372722
EAN: N/A
Year: 2003
Pages: 181

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net