security.harvard.edu

Website:https://security.harvard.edu
Upvotes received0
Downvotes received0
Karma:0 (upvotes-downvotes)



0 earned Badges

No badges were found



Definitions (28)

1

0 Thumbs up   0 Thumbs down

Access Control Systems


Access Control Systems are systems that manage physical access to Harvard-owned properties, structures, or services.
Source: security.harvard.edu (offline)
This meaning has been disapproved

2

0 Thumbs up   0 Thumbs down

access control systems


Access Control Systems are systems that manage physical access to Harvard-owned properties, structures, or services.
Source: security.harvard.edu (offline)
This meaning has been disapproved

3

0 Thumbs up   0 Thumbs down

Authorization


Permission to access resources in a digital domain (after positive authentication)
Source: security.harvard.edu (offline)

4

0 Thumbs up   0 Thumbs down

Authorization Proxy Service


Service provided by Harvard that allows applications to check the status of users prior to allowing system access.
Source: security.harvard.edu (offline)
This meaning has been disapproved

5

0 Thumbs up   0 Thumbs down

authorization proxy service


Service provided by Harvard that allows applications to check the status of users prior to allowing system access.
Source: security.harvard.edu (offline)
This meaning has been disapproved

6

0 Thumbs up   0 Thumbs down

Confidential information


Information about a person or an entity that, if disclosed, could reasonably be expected to place the person or the entity at risk of criminal or civil liability, or to be damaging to financial standing, employability, reputation or other interests.
Source: security.harvard.edu (offline)

7

0 Thumbs up   0 Thumbs down

CONTRACT RIDER


Text approved by Harvard counsel to be appended to Harvard contracts in which the vendor is working with Harvard confidential information. The contract riders specify the protections that must be implemented and the criteria that must be met in order for a vendor to work with Harvard confidential information.
Source: security.harvard.edu (offline)

8

0 Thumbs up   0 Thumbs down

De-Identified Data


Information that can be used to identify individuals either directly or indirectly must be removed. For information to be de-identified under HIPAA, 18 separate identifiers must be removed from the individual's record before that information can be considered de-identified. Covered entities have the option of stripping fewer identifiers from i [..]
Source: security.harvard.edu (offline)

9

0 Thumbs up   0 Thumbs down

De-Identified Research Data Set


A Research Data Set where all personal identifiers have been removed (and normally replaced by a random identity key) such that no personally identifiable data remains.
Source: security.harvard.edu (offline)
This meaning has been disapproved

10

0 Thumbs up   0 Thumbs down

de-identified research data set


A Research Data Set where all personal identifiers have been removed (and normally replaced by a random identity key) such that no personally identifiable data remains.
Source: security.harvard.edu (offline)
This meaning has been disapproved


To view all 28 definitions, please sign in.