Impact Analysis

Impact Analysis: A process used to understand the potential consequences of a change in a system, application, or another component of an organization’s operations. Impact analysis can be used in various contexts, such as assessing the potential effects of a security incident or evaluating the implications of a new policy or process. It aids in […]

Identity Lifecycle – Job or duties review

Identity Lifecycle – Job or duties review: As part of the identity lifecycle, job or duties review involves regularly reviewing and updating the roles and responsibilities of users within an organization. This is typically done to ensure that users have the appropriate access and permissions for their job duties and to reduce the risk of […]

Identity Lifecycle – User behavior review

Identity Lifecycle – User behavior review: As part of the identity lifecycle, user behavior review involves regularly reviewing and monitoring the actions and activities of users to identify any suspicious or unusual behavior. This is typically done to identify potential security threats or breaches within an organization. An example of user behavior review as part […]

Health Information Technology for Economic and Clinical Health Act (HITECH Act) (US)

Health Information Technology for Economic and Clinical Health Act (HITECH Act) (US): A US law enacted as part of the American Recovery and Reinvestment Act of 2009. The act promotes the adoption and meaningful use of health information technology, specifically electronic health records. One of its significant aspects related to security is that it expands […]

Health Insurance Portability and Accountability Act (HIPAA) (US)

Health Insurance Portability and Accountability Act (HIPAA) (US): A US law passed in 1996 that sets standards for the protection of certain health information. The Privacy Rule, a key component of HIPAA, protects the privacy of individually identifiable health information, and the Security Rule, another key component, sets national standards for the security of electronically […]

HITRUST (Health Information Trust Alliance)

HITRUST (Health Information Trust Alliance): A common security framework used in the healthcare industry to ensure the privacy and security of electronic protected health information (ePHI). It is used by healthcare organizations to assess and mitigate risks to ePHI and to meet regulatory requirements. Examples of organizations using HITRUST include hospitals, clinics, and insurance companies.