Term
|
Definition
A room in a hospital equipped for performing surgical procedures |
|
|
Term
|
Definition
A clear film or acrylic filter placed in front of a monitor to decrease the viewing angle of the monitor |
|
|
Term
|
Definition
The capability of software to limit to certain hours of the day and week when users can log in |
|
|
Term
|
Definition
A record of activity in an IS. Audit trails typically record the activity along with a time and date stamp and the username performing the activity |
|
|
Term
File transfer protocol (FTP) |
|
Definition
A method to communicate over a network electronically. This communication method enables documents to be placed on and copied from a remote server. FTP is great for sharing large files with other people who also have access to the FTP server |
|
|
Term
|
Definition
A secure form of FTP that encrypts both commands and data. Sometimes called SSH FTP because secure FTP uses SSH to secure the transfer |
|
|
Term
Private branch exchange (PBX) |
|
Definition
A private telephone system. Switches are housed within a facility to provide greater control over the phone system. With a switch the facility can customize phone routing and assign extensions. |
|
|
Term
|
Definition
A sever used to route telephone calls in a facility |
|
|
Term
|
Definition
The HIT personnel responsible for the overall health of the information system in the facility |
|
|
Term
|
Definition
The HIT personnel responsible for securing data in the facility |
|
|
Term
|
Definition
The HIT personnel responsible for maintain the integrity of the network |
|
|
Term
database administrator (DBA) |
|
Definition
The HIT personnel responsible for the management of the databases in the information systems used in a facility |
|
|
Term
Desktop support technician |
|
Definition
The HIT personnel responsible for the support of computers and certain peripheral devices in the facility |
|
|
Term
Role-based access control (RBAC) |
|
Definition
The assignment of access to information systems based on job title and not individual evaluation for need of access |
|
|
Term
Mandatory access control (MAC) |
|
Definition
A security mechanism where a user can only gain access to a resource if the security or system administrator grants the access |
|
|
Term
Discretionary access control (DAC) |
|
Definition
A security mechanism where a user has control to grant access to resources owned by the user account |
|
|
Term
|
Definition
A username and password reserved for emergency use to access patient information |
|
|