Term
|
Definition
| A room in a hospital equipped for performing surgical procedures |
|
|
Term
|
Definition
| A clear film or acrylic filter placed in front of a monitor to decrease the viewing angle of the monitor |
|
|
Term
|
Definition
| The capability of software to limit to certain hours of the day and week when users can log in |
|
|
Term
|
Definition
| A record of activity in an IS. Audit trails typically record the activity along with a time and date stamp and the username performing the activity |
|
|
Term
| File transfer protocol (FTP) |
|
Definition
| A method to communicate over a network electronically. This communication method enables documents to be placed on and copied from a remote server. FTP is great for sharing large files with other people who also have access to the FTP server |
|
|
Term
|
Definition
| A secure form of FTP that encrypts both commands and data. Sometimes called SSH FTP because secure FTP uses SSH to secure the transfer |
|
|
Term
| Private branch exchange (PBX) |
|
Definition
| A private telephone system. Switches are housed within a facility to provide greater control over the phone system. With a switch the facility can customize phone routing and assign extensions. |
|
|
Term
|
Definition
| A sever used to route telephone calls in a facility |
|
|
Term
|
Definition
| The HIT personnel responsible for the overall health of the information system in the facility |
|
|
Term
|
Definition
| The HIT personnel responsible for securing data in the facility |
|
|
Term
|
Definition
| The HIT personnel responsible for maintain the integrity of the network |
|
|
Term
| database administrator (DBA) |
|
Definition
| The HIT personnel responsible for the management of the databases in the information systems used in a facility |
|
|
Term
| Desktop support technician |
|
Definition
| The HIT personnel responsible for the support of computers and certain peripheral devices in the facility |
|
|
Term
| Role-based access control (RBAC) |
|
Definition
| The assignment of access to information systems based on job title and not individual evaluation for need of access |
|
|
Term
| Mandatory access control (MAC) |
|
Definition
| A security mechanism where a user can only gain access to a resource if the security or system administrator grants the access |
|
|
Term
| Discretionary access control (DAC) |
|
Definition
| A security mechanism where a user has control to grant access to resources owned by the user account |
|
|
Term
|
Definition
| A username and password reserved for emergency use to access patient information |
|
|