Customer Contacts
When a customer receives access to the Protected Network, he or she names the Customer Contacts. One person can fill both roles.
• At the direction of the Data Steward, the Administrative Customer Contact has overall authority for the use of the Protected Network in the customer area and designates who has access to the data in the Protected Network.
• The Technical Customer Contact is responsible for IT-related operations and tasks that require working with OIT.
Disk Striping
The process of dividing a body of data into blocks and spreading the data blocks across several partitions on several hard disks.
DoS/DDoS attack
Denial-of-Service/Distributed-Denial-of-Service Attack
A type of assault on a network that is designated to bring the network to its knees by flooding it with useless traffic.
ePHI (or PHI)
Electronic Protected Health Information
The patient information that is protected by HIPAA. The "e" indicates it is in electronic format.
Password Exceptions
SNMP Password
An SNMP (Single Network Management Protocol) password allows a machine to gain automatic access to the statistics of a router or other device.
BIOS Password
A BIOS (Basic Input/Output System) password is authentication information that may be required to log onto a computer's BIOS before the device will boot up. The BIOS password is stored in CMOS (Complementary Metal-Oxide Semiconductor) memory.
Physical Access Controls
Devices that track and prevent unauthorized entry (Examples: card key, door locks, and video cameras).
RDS/RDP
Remote Desktop Services/Remote Desktop Protocol
RDS/RDP is Windows-based. It provides a proxy session over an encrypted connection into the Protected Network.
Secure Location
A place that is not routinely accessible to the public, particularly is authorized personnel are not always available to monitor security.
Server
A computer that manages access to centralized resources or services on a network.
SSH
Secure Shell
SSH provides a Unix-based, secure, encrypted connection into the Protected Network.
VPN
Virtual Private Network
A Virtual Private Network provides a secure, encrypted connection ("a tunnel") into the Protected Network.