Customer Contacts

When a customer receives access to the Protected Network, he or she names the Customer Contacts. One person can fill both roles.

• At the direction of the Data Steward, the Administrative Customer Contact has overall authority for the use of the Protected Network in the customer area and designates who has access to the data in the Protected Network.

• The Technical Customer Contact is responsible for IT-related operations and tasks that require working with OIT.


Disk Striping

The process of dividing a body of data into blocks and spreading the data blocks across several partitions on several hard disks.


DoS/DDoS attack

Denial-of-Service/Distributed-Denial-of-Service Attack

A type of assault on a network that is designated to bring the network to its knees by flooding it with useless traffic.


ePHI (or PHI)

Electronic Protected Health Information

The patient information that is protected by HIPAA. The "e" indicates it is in electronic format.


Password Exceptions

SNMP Password

An SNMP (Single Network Management Protocol) password allows a machine to gain automatic access to the statistics of a router or other device.

BIOS Password

A BIOS (Basic Input/Output System) password is authentication information that may be required to log onto a computer's BIOS before the device will boot up. The BIOS password is stored in CMOS (Complementary Metal-Oxide Semiconductor) memory.


Physical Access Controls

Devices that track and prevent unauthorized entry (Examples: card key, door locks, and video cameras).



Remote Desktop Services/Remote Desktop Protocol

RDS/RDP is Windows-based. It provides a proxy session over an encrypted connection into the Protected Network.


Secure Location

A place that is not routinely accessible to the public, particularly is authorized personnel are not always available to monitor security.



A computer that manages access to centralized resources or services on a network.



Secure Shell

SSH provides a Unix-based, secure, encrypted connection into the Protected Network.



Virtual Private Network

A Virtual Private Network provides a secure, encrypted connection ("a tunnel") into the Protected Network.