HITRUST
General Compliance
HIPAA
Security Compliance
Core Value
100

What does the acronym HITRUST stand for?

Health Information Trust Alliance 

100

Overall intention and direction as formally expressed by management, most often articulated in documents that record high level principals or actions that have been decided on. 

Policy

100

What does the acronyms for HIPAA stand for?

Health Insurance Portability and Accountability Act

100

A program that is inserted into a system, usually covertly with the intent of compromising the confidentiality, integrity or availability of the victim's data, applications, and operating systems. 

Malware 

100

 MTM is committed to doing more and working to ensure diversity equity and inclusion are cultural pillars throughout every level at MTM. 

Respect Individuals

200

A framework for managing information security and privacy risks and compliance. 

HITRUST CSF

200

A document that explains and organization privacy practices, how information about the information may be shared, the individual rights, and the organization legal duties also known as notice of privacy practices. 

Privacy Notice

200

Electronic record of an individual's health information by which the individual controls access to the information and may have the ability to manage, track, and participate in his or her own health care. 

Personal Health Record (PHR)

200

A live test of the effectiveness of security defenses through mimicking the actions of real-life hackers. 

Penetration Test

200

The management of appropriate business partnerships

Collaborate to Innovate

300

A common taxonomy and standard set of processes, procedures, activities, and tools that support the identification, assessment, response control and reporting of risk. 

Risk Management Framework (RMF)

300

A person designated by an organization to develop, implement, and oversee the organization compliance with applicable with privacy laws, and acts as the point of contact for all patient privacy issues. 

Chief Information Security Officer (CISO) Also known as Privacy Officer.

300

Information that is a subset of Health Information, including demographic information collected from an individual.

Individually identifiable Health Information

300

Media that are designed and or capable of being easily and routinely moved from one location to another (BG, USB Drives, Memory Card, CDs/DVDs).

Portable Media
300

Respecting clients and their members 

Align with Clients

400

A model for controlling access to resources where permitted actions by resources are identified with roles rather than with individual subject identities. 

Role Based Access Controls (RBAC)

400

A written plan for recovering one or more information systems at an alternate facility in response to a major hardware or software failure or destruction of facilities. 

Disaster Recovery Plan (DRP) 

400

Subtitle D of the Health Information Technology for Economic and clinical health act. 

HITECH

400

Attack, via cyberspace, targeting an enterprise use of cyber space for the purpose of disrupting, destroying or maliciously controlling a computer environment/infrastructure. 

Cyber Attack

400

Prioritization of health safety and wellness. 

Deliver Value 

500

Scoring guide used to evaluate the quality or effectiveness of a HITRUST CSF control requirements implementation.

Rubric

500

Logically related series of activities conducted toward a defined objective. 

Process/Procedure

500

Any data that could potentially identify a specific individual, including: any piece of information or combination of information that together can be used to distinguish or trace an individual identity such as name, social security, date and place of birth. 

(PII) Personal Identifying Information 

500

Safeguard that employs cryptography to achieve the desired protection. 

Cryptographic Controls 

500

Act in good faith, responsibly manner, with confidence, and diligence and to do the right thing ethically and legally.

Act with Integrity