Page 180 - DCAP309_INFORMATION_SECURITY_AND_PRIVACY
P. 180
Information Security and Privacy
Notes 12.8 Related Terms
Access Control: It is the avoidance of unauthorized access of information assets. It is the policy
rules and deployment technique which control use to information systems, and physical access
to premises.
Access: The ability or the resources necessary to read, write, modify, or converse data/information
or else use any system resource.
Authentication: The work of verifying the identity of an individual, originator, terminal, or
workstation, to find out that entity’s right to use specific categories of information and a measure
intended to defend against fraudulent transmission by verifying the authority of a transmission,
message, station, or originator.
Authorization: Consent from an individual, or his or her personal representative providing the
Department of Human Services (Department) authorization to attain, release or use information
concerning the individual from third parties for particular purposes or to disclose information
to a third party precise by the individual.
Business Associate: An individual or thing performing any movement or function on behalf of
the Department concerning the use or disclosure of secluded health information (PHI) and is not
a member of the Department’s workforce.
Client: An individual who requests or obtains services from the Department.
Client Services: The condition of assistance, care, treatment, training or assistance to a client by
DHS.
Confidentiality: The extent to which sensitive data, about both individuals and organizations,
must be secluded. Information is not made obtainable or disclosed to unauthorized individuals,
entities, or procedures.
Confidential Information: Any client information that DHS may have in its records or files on
any DHS client that must be protected.
Cookies: Cookies register information regarding a visit to a Web site for upcoming use by the
server. A server may obtain information of cookies of other sites also, which create concern in
view of breach of privacy.
Decrypting: It is the process of overturning the encryption of a file or message to improve the
original data so as to use or read it.
Encryption: The process by which data is provisionally rearranged into an unreadable or
incomprehensible form for confidentiality, transmission, or other security reasons.
File Server: A computer system that offers a way of sharing and working on files accumulated on
the system among users with use to these files over a network.
Individual: The person who is the subject of information composed, used, or revealed by the
Department.
Individually Identifying Information: Any single item or collection of information or data that
indicates or discloses the identity of an individual, either specifically (such as the individual’s
name or social security number), or from which the individual’s identity can sensibly be
ascertained.
Information: Personal information connecting to an individual, a participant, or a Department
client.
Information Owner/User: An (human) entity that makes use of computer systems and networks.
174 LOVELY PROFESSIONAL UNIVERSITY