T
Table Top Exercise
One method of exercising teams in which participants review and discuss the actions they would take per their plans, but do not perform any of these actions. The exercise can be conducted with a single team, or multiple teams, typically under the guidance of exercise facilitators.
TAG
Technical Advisory Group.
Test Plan
A document designed to periodically exercise specific action tasks and procedures to ensure viability in a real disaster or severe outage situation.
TG
Task Group.
Third Party Administrator (TPA)
An entity that processes health care claims and performs related business functions for a health plan.
Third Party Administrator (TPA)
is a business associate that performs claims administration and elated business functions for a self-insured entity.
Trading partner
is an external entity, such as a customer, that you do business with. This relationship can be formalized via a trading partner agreement. It is quite possible to be a trading partner of an entity for some purposes and a business associate of that entity for other purposes.
Transaction Change Request System
A system established under HIPAA for accepting and tracking change requests for any of the HIPAA mandated transactions standards via a single web site.
Transaction
Under HIPAA, this is the exchange of information between two parties to carry out financial or administrative activities related to health care.
Triage activities and assessment activities
Detected incidents act as indicators and warnings. They are reviewed collectively in order to assess the events and apply an order of importance, then determine the appropriate response. High risk cases would be handled by a triage group composed of local and national law and order healthcare organizations such as Intelligence Communities (DND, CSE and CSIS), Police as well as members of the legal community, are required to collaborate in ensuring that there is formulation of an appropriate response to major events.
Tripwires
File integrity can be established by applying calculations to file contents and deriving coded values that are stored separately. If in doubt about whether someone has altered your critical system files then pull out these stored check values and compare them to newly calculated values for the files.
Trojan Horse Programs
Trojan horse programs are programs that appear to perform one function while actually performing a different function. Intruders use Trojan horse programs to hide their activity, capture username and password data, and create backdoors for future access to a compromised system.