1 |
ConfidentialityPreserving authorized restrictions on access and disclosure, including means for protecting privacy and proprietary information.
|
2 |
ConfidentialityConfidentiality is the need to ensure that information is disclosed only to those who are authorized to view it.
|
3 |
ConfidentialityData confidentiality is a property of data, usually resulting from legislative measures, which prevents it from unauthorized disclosure.
|
4 |
ConfidentialityRelating to a piece of information about a person that should not be given to another person without that person's permission. An example would be the result, whether positive or negative, of an [..]
|
5 |
ConfidentialityEnsuring that personal medical information is accessible only to those authorized to have access, unless the patient provides consent.
|
6 |
ConfidentialityThe obligation of an individual, organization or business to protect personal information and not misuse or wrongfully disclose that information. Reference(s) in IAPP Certification Textbooks: F77, G46
|
7 |
ConfidentialityThe international application and any documents related thereto are not published prior to the expiration of 18 months from the priority date, unless the applicant requests early publication of the in [..]
|
8 |
Confidentialityin collecting data in user studies, confidentiality guarantees a person that their data will not be released in a way that it can be tracked to them as an individual. Anonymity is slightly different, [..]
|
9 |
Confidentialitythe state of being secret; "you must respect the confidentiality of your client's communications" discretion in keeping secret information (confidential) the leve [..]
|
10 |
Confidentiality1. Of classified or sensitive data, the degree to which the data have not been compromised; i.e., have not been made available or disclosed to unauthorized individuals, processes, or other entities. [After 2382-pt.8] 2. Assurance that information is not disclosed to unauthorized persons, processes, or devices. [INFOSEC-99] 3. A property by which in [..]
|
11 |
ConfidentialityThe idea that private information about an individual will not be shared with others.
|
12 |
ConfidentialityDefinition The entrustment of proprietary information from one party to another for that party's exclusive use so as not to impart the obtained knowledge to others.
|
13 |
Confidentialitynoun. A standard of professional values necessitating suppliers of mental or medical healthcare to constrain the revealing of a person's name, their illness, remedial tactics, and any information [..]
|
14 |
ConfidentialityIn the delivery of library services, the right of patrons to have the nature of their research and library transactions remain private. Under the guidance of the ALA Code of Ethics, librarians and lib [..]
|
15 |
ConfidentialityConfidentiality is a part of the ethical guidelines of psychologists and means that information between a patient and a therapist cannot be shared with anyone. This applies to patients and any health [..]
|
16 |
ConfidentialityInfoSec dimensions.
|
17 |
ConfidentialityThe relation between lawyer and client which guarantees any information shared by the client is treated as private and as such cannot be divulged to third parties without the client's consent.
|
18 |
ConfidentialityThe protection of research subjects from being identified. A common standard in social science research is that records or information used for research should not allow participants to be identified [..]
|
19 |
ConfidentialityConfidentiality and non-disclosure agreements are used to impose confidentiality obligations on parties receiving information on materials from disclosing parties which consider such information or ma [..]
|
20 |
ConfidentialityAn attempt to remove any elements that might indicate the subject's identity.
|
21 |
Confidentiality(n) the state of being secret(n) discretion in keeping secret information
|
22 |
ConfidentialityOne of the six major areas of infosec, confidentiality is the area concerned with keeping secrets. Contrast: For the most part, the words confidentiality and privacy are interchangeable. We typical [..]
|
23 |
ConfidentialitySee Confidentiality, Integrity & Availability.
|
24 |
ConfidentialityRegularly referred to as the CIA triad (or C/I/A), these three security aspects have long been held as the fundamental principles of Information Security. There is regular discussion about adding additional aspects (such as Authenticity, Accountability, Non-Repudiation or Legality to the set, but in general these tend to be descriptive of means by [..]
|
25 |
Confidentiality A key aspect of Information Security is to preserve the confidentiality, integrity and availability of an organisation's information. It is only with this information, that it can engage in commercial activities. Loss of one or more of these attributes, can threaten the continued existence of even the largest corporate entities. Confidential [..]
|
26 |
ConfidentialityKeeping the content of a document secret from anyone who is not authorized to see it.
|
27 |
ConfidentialityDefinition: Confidentiality refers to the condition or state under which all computer information, software and hardware associated with a networked information infrastructure remains private. Individ [..]
|
28 |
ConfidentialityThe limiting of access to official information to authorised users for approved purposes. The confidentiality requirement is determined by reference to the likely consequences of unauthorised disclosure of official information. The New Zealand Government Security Classification System has been developed to help agencies identify information that ha [..]
|
29 |
ConfidentialityConfidentiality is assurance that information is shared only among authorized persons or organizations. Breaches of confidentiality can occur when data is not handled in a manner adequate to safeguard [..]
|
30 |
Confidentiality The property that information is not made available or disclosed to unauthorized individuals, entities, or processes. Chain of Custody
|
31 |
ConfidentialityAssuring information will be kept secret, with access limited to appropriate persons.
|
32 |
ConfidentialityA condition where a data resource can only be accessed by properly authenticated and authorized identities.
|
33 |
ConfidentialityThe degree to which confidential university data
|
34 |
ConfidentialityIn a confidential survey, the privacy of information provided by individual respondents is maintained, and information about the individual respondents cannot be derived from the published results.
|
35 |
ConfidentialityThe obligation of the Department of Education to maintain the student's special education records in a manner that assures that only appropriate staff has access to the student's IEP and records.
|
36 |
ConfidentialityThe protection of personal, private and sensitive information. Professional codes of conduct and the Department of Education and Training's Staff Conduct policy reinforce the importance of protecting an individual's privacy.
|
37 |
ConfidentialityProtection, in accordance with all applicable federal and state laws, if personally identifiable information including, but not limited to written information. (laws/policy, by it, confidential, not t [..]
|
38 |
ConfidentialityThe limiting of access to a child or family's records to personnel having direct involvement with the child.
|
39 |
ConfidentialityKeeping certain facts, data and information out of public or unauthorized view. In the U.S., U.K. and many other jurisdictions, confidentiality is required when filing suspicious transaction or activi [..]
|
40 |
ConfidentialityConfidentiality is a property of information according to which it is not made available or disclosed to unauthorised persons, entities or processes.The possibility to make only portions of informatio [..]
|
41 |
ConfidentialityThe Privacy of information and its protection against unauthorized Disclosure.
|
42 |
ConfidentialityA policy that requires site visitors, Commissioners, Councilors and staff not to disclose or discuss information from an educator preparation provider’s (EPP) self study, related evidence, interviews, [..]
|
43 |
ConfidentialityThe privacy of information and its protection against unauthorized disclosure.
|
44 |
ConfidentialityConfidentiality, in the context of computer systems, allows authorized users to access sensitive and protected data. Specific mechanisms ensure confidentiality and safeguard data from harmful intruder [..]
|
45 |
Confidentiality
|
46 |
ConfidentialityProtection against disclosure to an outside person of information revealed in a professional relationship, e.g. doctor-patient.
|
47 |
Confidentiality Spoken, written, acted on, etc., in strict privacy or secrecy; secret.
|
48 |
Confidentialitya rule that says what you say to someone will not be told to others unless you agree
|
49 |
ConfidentialityA requirement that to serve the interests of justice, certain facts about a proceeding or nature of a proceeding be withheld from public discussion or scrutiny.
|
50 |
ConfidentialityPrevention of disclosure, to other than authorized individuals, of client's proprietary information, investigation findings, or of a subject's identity.
|
51 |
ConfidentialityPreserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information.
|
52 |
ConfidentialitySecuring the identity of, as well as any information provided by, the respondent, in order to ensure to that public identification of an individual participating in the study and/or his individual res [..]
|
53 |
ConfidentialityThis provision in a research study means that although the researcher potentially or actually can associate a research subject’s identity with information received from that individual, assurances are given that such associations of one’s identity and information will be kept strictly secret, private, and undisclosed.
|
54 |
ConfidentialityConfidentiality is protecting study information, such as client name, brand name, purpose of the research, concepts, products, and research results, from unauthorized disclosure to any third party. Co [..]
|
55 |
ConfidentialityObligation of a person or agency that receives information about an individual, as part of providing a service to that individual, to protect that information from unauthorized persons or unauthorized uses. Confidentiality also includes respecting the privacy interest of the individuals who are associated with that information.
|
56 |
ConfidentialityHas been defined by the International Organization for Standardization (ISO) as "ensuring that information is accessible only to those authorized to have access" and is one of the cornerstones of information security.
|
57 |
ConfidentialityThe protection of individually identifiable information as required by state or federal law or by policy of the healthcare provider.
|
58 |
ConfidentialityPrivacy of certain information and how information is stored and used. Connectedness (AG)
|
59 |
ConfidentialityAssurance that information is held in confidence and protected from unauthorized disclosure (USAID Automated Directives System - ADS - Chapter 545).
|
60 |
ConfidentialityThe practice and maintenance of absolute anonymity of the insured and all data and information related to the insured to those without express written release or permission of the insured
|
61 |
ConfidentialityPrinciple according to which personal information can only be disclosed with the informed consent of the person concerned and solely to authorized persons.
|
62 |
ConfidentialityKeeping information private or secret.
|
63 |
Confidentiality
(uncountable) The property of being confidential.
(countable) Something told in confidence; a secret.
|
<< Concurrent access | Configurable control >> |