Search results

Jump to navigation Jump to search
  • While this page is primarily about identification of the patient during interaction with the healthcare community, there are
    19 KB (3,008 words) - 20:23, 20 March 2021
  • It is known that search terms alone are sufficient in many cases to allow identification of the user. In any service that collects attributes or behaviors of the us
    9 KB (1,467 words) - 20:46, 9 September 2018
  • ...indirectly, in particular by reference to an identifier such as a name, an identification number, location data, an online identifier or to one or more factors speci
    10 KB (1,662 words) - 23:06, 24 April 2019
  • ...determined that the social security number (SSN) is not a secure means of identification and has mandated that many agencies will need to create their own [[Identif
    18 KB (2,580 words) - 18:52, 7 December 2020
  • ...b is due, in part, to the work of this forum in establishing rules for the identification of web sites.
    7 KB (1,184 words) - 04:47, 23 August 2020
  • ...nt for the first time with a current complaint. The patient provides some identification and subjective information about their history and health problem and then ...and their guardians. Please see that wiki page for more details about the identification of [[Trustworthy Healthcare Provider]]s.
    28 KB (4,415 words) - 17:28, 21 March 2021
  • # Some delegations may by their very identification, expose information about the subject. For example if the results of test f
    13 KB (2,151 words) - 00:14, 30 October 2020
  • ...ndergoing a process of improvement. In the case of the user the needs for identification and authentication proofing vary substantially based on the context. One of
    14 KB (2,250 words) - 01:29, 23 December 2020
  • ...nt for the first time with a current complaint. The patient provides some identification and subjective information about their history and health problem and then ...been de-identified, and there are mitigating circumstances that prevent re-identification, which minimize risk of harm from unauthorized disclosure. The information
    19 KB (2,997 words) - 01:34, 18 February 2021
  • ##Identification of the hardware supplier, the operating system supplier and the user applic
    14 KB (2,290 words) - 21:36, 30 March 2020
  • # '''IDENTIFICATION AND AUTHENTICATION''' ===IDENTIFICATION AND AUTHENTICATION===
    2 KB (236 words) - 20:30, 17 March 2020
  • # gender identification
    10 KB (1,599 words) - 22:38, 20 March 2021
  • # A patient intake process that is able to leverage all of the patient identification methods. ...for returning patients.) The patient is coherent and able to assist in the identification process.
    6 KB (872 words) - 21:56, 5 December 2020
  • ...[[Identity Management]], [[Code of Conduct]] applies to the actors in the identification of users and the protection of user data supplied during the process of [[A
    7 KB (1,033 words) - 23:32, 20 May 2020
  • ...attributable to identification problems and patient matching, but several identification problems are called out as a fix that would be effective in cost reduction.
    5 KB (834 words) - 00:18, 24 August 2020
  • ...thentication, Encryption, Digital Signatures, Transport/Media Security, De-Identification, Pseudonymization, Anonymization, and Blockchain.</blockquote>
    2 KB (249 words) - 00:39, 14 March 2021
  • ...sible will be supported in their healthcare experience with high assurance identification and guidance to positive, healthy out-comes.
    7 KB (1,136 words) - 20:39, 8 September 2020
  • ...d later), compatible with the data structures in the ISO 18013-5 Personal identification — ISO-compliant driving license — Part 5: Mobile driving licence (mDL)
    8 KB (1,167 words) - 20:52, 2 July 2021
  • ## The interoperability of the APIs used by the app. This applies to the identification proofing and authentication of the user as well as the compatibility with F
    11 KB (1,637 words) - 23:44, 10 November 2020
  • .... This use case looks forward to the case where the state has combined all identification cards into a single system. ...evice and is not currently enrolled for state services with a state issued identification card.
    8 KB (1,360 words) - 01:30, 7 January 2021
  • ...nt for the first time with a current complaint. The patient provides some identification and subjective information about their history and health problem and then ...been de-identified, and there are mitigating circumstances that prevent re-identification, which minimize risk of harm from unauthorized disclosure. The information
    20 KB (3,074 words) - 22:40, 21 March 2021
  • ...V to approve an individual’s application for a REAL ID driver’s license or identification card.
    30 KB (4,866 words) - 16:56, 9 June 2021
  • ...call SCRA that is supposed to be used by creditors and claims and not for identification purposes. That is the concern. Using the database even with the veteran p
    6 KB (1,061 words) - 04:02, 28 June 2018
  • ...]], [[Microcode]], [[Operator]], [[Output Data]], [[Password]], [[Personal Identification Number]], [[Physical Protection]], [[Plaintext Key]], [[Port]], [[Private K
    3 KB (379 words) - 03:58, 28 June 2018
  • for the Accreditation of PIV Card Issuers; SP 800-87, Codes for the Identification of Federal and
    1 KB (173 words) - 03:58, 28 June 2018
  • for the Accreditation of PIV Card Issuers; SP 800-87, Codes for the Identification of Federal and chain-of-trust for collected identification data, this will contain PII which must be protected and disposed
    3 KB (374 words) - 00:25, 24 August 2020
  • ...question was asked how to prepare the physical card along with some other identification process if the card is missing.
    7 KB (1,073 words) - 03:58, 28 June 2018
  • ...uested by the Relying Party. The need for attributes, in addition to user identification and authentication, stems from access control models in which combinations
    7 KB (1,007 words) - 03:58, 28 June 2018
  • *Strong identification usually with a second factor, like smart cards.
    8 KB (1,315 words) - 19:29, 30 July 2020
  • Countermeasures taken to prevent the unauthorized use of legitimate Identification & Authentication (I&A) data, however it was obtained, to mimic a subject di ...em used to satisfy a subset of requirements related to the verification or identification of an end user's identity so that the end user's identifier can be used to
    845 KB (86,833 words) - 04:00, 28 June 2018
  • ...or in it, and other printed information on it. It may be used for personal identification, physical access to facilities such as buildings and/or logical access to a Contrasts with Identification.
    135 KB (15,051 words) - 04:00, 28 June 2018
  • * Any time a user is asked to provide identification or personal information. In general the user will be able to assume that an
    10 KB (1,596 words) - 20:11, 15 October 2019
  • ...ing one knows (e.g., password/PIN), something one has (e.g., cryptographic identification device, token), or something one is (e.g., biometric). [[IDEF_Glossary_Refe
    11 KB (1,496 words) - 23:48, 5 September 2020
  • [[CPS Summary (or CPS Abstract)]], [[Identification]], [[Issuing Certification Authority (issuing CA)]],
    2 KB (297 words) - 04:00, 28 June 2018
  • ...d rules. The Identity Ecosystem will offer, but will not mandate, stronger identification and authentication while protecting privacy by limiting the amount of infor
    1 KB (171 words) - 04:00, 28 June 2018
  • ...rics. Authentication and the factors that contribute to establishing that identification for authentication needs to be better defined.
    3 KB (449 words) - 04:02, 28 June 2018
  • *#Identification of security standards for IDESG adoption
    2 KB (361 words) - 04:02, 28 June 2018
  • ...perator]], [[Grant Category]], [[Grant (of Rights Ofuse)]], [[Grantee]], [[Identification]], [[Identifier]], [[Identity]], [[Identity Assurance Work Group]], [[Ident
    2 KB (217 words) - 04:02, 28 June 2018
  • ...inct from the user display name and the user email address. Any real-world identification information must be protected as befits the compliance criteria that the RP # What are the canonical terms for identification?
    24 KB (3,980 words) - 19:57, 13 November 2020
  • '''Title''': Specification for Asset Identification 1.1 ...ription''': Part of the Security Content Automation Protocol (SCAP), Asset Identification is a language for identifying
    2 KB (204 words) - 04:02, 28 June 2018
  • [[Passive Attack]], [[Password]], [[Personal Identification Number]],
    4 KB (459 words) - 23:02, 18 February 2021
  • *The Healthcare Committee has produced a set of patient identification requirements. Paul is working with Sal on process to circulate to other co
    2 KB (276 words) - 04:02, 28 June 2018
  • names. It is used by SCAP Asset Identification 1.1 (for example) to represent names for those types of
    1 KB (142 words) - 04:02, 28 June 2018
  • * Applicant satisfies financial institutions customer identification program (CIP}
    6 KB (830 words) - 04:02, 28 June 2018
  • The short term identification of a user as recognized within a computer system.
    4 KB (560 words) - 04:02, 28 June 2018
  • It is known that search terms alone are sufficient in many cases to allow identification of the user. In any service that collects attributes or behaviors of the us
    14 KB (2,167 words) - 01:45, 15 May 2021
  • * PbD De-identification Center, https://www.privacybydesign.ca/index.php/de-identification-centre/
    1 KB (147 words) - 04:03, 28 June 2018
  • * Any time a user is asked to provide identification or personal information to gain access to a web service. This pattern speci
    24 KB (3,856 words) - 16:05, 16 December 2021
  • ...e from devices and processes here on page 8: "Technology and processes for identification (establishing unique digital identities) and authentication (verifying the *"Lack of secure, convenient, user-friendly options for authentication and identification;" Page15
    8 KB (1,190 words) - 16:21, 27 May 2020

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)