Business Continuity and HIPAA Business Continuity Management in the Health Care Environment [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

Business Continuity and HIPAA Business Continuity Management in the Health Care Environment [Electronic resources] - نسخه متنی

Jim Barnes

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید








T


Table Top Exercise

One method of exercising teams in which participants review and discuss the actions they would take per their plans, but do not perform any of these actions. The exercise can be conducted with a single team, or multiple teams, typically under the guidance of exercise facilitators.




TAG

Technical Advisory Group.




Test Plan

A document designed to periodically exercise specific action tasks and procedures to ensure viability in a real disaster or severe outage situation.




TG

Task Group.




Third Party Administrator (TPA)

An entity that processes health care claims and performs related business functions for a health plan.




Third Party Administrator (TPA)

is a business associate that performs claims administration and elated business functions for a self-insured entity.




Trading partner

is an external entity, such as a customer, that you do business with. This relationship can be formalized via a trading partner agreement. It is quite possible to be a trading partner of an entity for some purposes and a business associate of that entity for other purposes.




Transaction Change Request System

A system established under HIPAA for accepting and tracking change requests for any of the HIPAA mandated transactions standards via a single web site.




Transaction

Under HIPAA, this is the exchange of information between two parties to carry out financial or administrative activities related to health care.




Triage activities and assessment activities

Detected incidents act as indicators and warnings. They are reviewed collectively in order to assess the events and apply an order of importance, then determine the appropriate response. High risk cases would be handled by a triage group composed of local and national law and order healthcare organizations such as Intelligence Communities (DND, CSE and CSIS), Police as well as members of the legal community, are required to collaborate in ensuring that there is formulation of an appropriate response to major events.




Tripwires

File integrity can be established by applying calculations to file contents and deriving coded values that are stored separately. If in doubt about whether someone has altered your critical system files then pull out these stored check values and compare them to newly calculated values for the files.




Trojan Horse Programs

Trojan horse programs are programs that appear to perform one function while actually performing a different function. Intruders use Trojan horse programs to hide their activity, capture username and password data, and create backdoors for future access to a compromised system.




/ 90