Number |
Title |
Keyword(s) |
1 |
General Security Compliance |
General, Security Officer, Security Liaison |
2 |
Security Management |
Risk, Management, EPHI Inventory |
3 |
Workforce Security |
Workforce Authorization Security |
4 |
Information Access Management |
Information Access, Termination, Transfer |
5 |
Security Awareness and Training |
Training, Reminders, Virus, Log-in Monitoring |
6 |
Incident Response and Reporting |
Incident Response, Helpdesk, NTS |
7 |
Data Backups and Contingency Planning |
Backups, Disaster Recovery, Contingency Plan |
8 |
Periodic Evaluation of Compliance Policies and Procedures |
Evaluation, Internal Audit |
9 |
Facility Access Control |
Facility Access Control, Locks, Badges |
10 |
Workstation Acceptable Use |
Acceptable Use |
11 |
Server, Desktop, and Wireless Computer System Security |
Server, PC, Wireless, Laptop, PDA |
12 |
Device and Media Controls |
Removable Media, Media Re-Use |
13 |
Access Control |
Access Control, User Id, PW, FW, VPN |
14 |
Audit Control |
Audit, System Activity, Review |
15 |
EPHI Integrity and Authentication |
Integrity, Data Authentication |
16 |
Person or Entity Authentication |
User Authentication |
17 |
Transmission Security |
Encryption, Network Transfer, Wireless, E-Mail |