When a customer receives access to the Protected Network, he or she names the Customer Contacts. One person can fill both roles.
• At the direction of the Data Steward, the Administrative Customer Contact has overall authority for the use of the Protected Network in the customer area and designates who has access to the data in the Protected Network.
• The Technical Customer Contact is responsible for IT-related operations and tasks that require working with OIT.
The process of dividing a body of data into blocks and spreading the data blocks across several partitions on several hard disks.
A type of assault on a network that is designated to bring the network to its knees by flooding it with useless traffic.
ePHI (or PHI)
Electronic Protected Health Information
The patient information that is protected by HIPAA. The "e" indicates it is in electronic format.
An SNMP (Single Network Management Protocol) password allows a machine to gain automatic access to the statistics of a router or other device.
A BIOS (Basic Input/Output System) password is authentication information that may be required to log onto a computer's BIOS before the device will boot up. The BIOS password is stored in CMOS (Complementary Metal-Oxide Semiconductor) memory.
Physical Access Controls
Devices that track and prevent unauthorized entry (Examples: card key, door locks, and video cameras).
Remote Desktop Services/Remote Desktop Protocol
RDS/RDP is Windows-based. It provides a proxy session over an encrypted connection into the Protected Network.
A place that is not routinely accessible to the public, particularly is authorized personnel are not always available to monitor security.
A computer that manages access to centralized resources or services on a network.
SSH provides a Unix-based, secure, encrypted connection into the Protected Network.
Virtual Private Network
A Virtual Private Network provides a secure, encrypted connection ("a tunnel") into the Protected Network.