DEFINITIONS
Confidential Information
Confidential Information is information that identifies or describes an individual. Confidential Information is further detailed with the SLA of each client project (HIPAA, PCI, other)
Data Acquisition
Unencrypted electronic personal information/notice-triggering information will be considered to have been acquired, or reasonably believed to have been acquired, by an unauthorized person in any of the following situations.
1. Equipment
Lost or stolen electronic equipment (including palm pilots, laptops, desktop computers, and USB storage devices) containing unencrypted personal information.
2. Hacking
A successful intrusion of server or computer systems via the network where it is indicated that unencrypted personal information has been downloaded, copied, or otherwise accessed.
3. Unauthorized Data Access
Includes situations where someone has received unauthorized access to data, such as sending non public mail/e-mail to the wrong recipient, incorrect computer access settings, inadvertent posting of personal information in electronic format or other non-hacking incidents. Unauthorized data access also includes indications that the information was used by an unauthorized person, such as fraudulent accounts opened or instances of identity theft reported.
Data Owner
The individual with primary responsibility for determining the purpose and function of a record system.
Encryption
All encryption algorithms, with the exception of trivial ciphers, meet the minimal requirements for encryption. If personal information stored on the compromised electronic equipment is encrypted, no notification is required.
Health Insurance Information
An individual’s health insurance policy number or subscriber identification number, any unique identifier used by a health insurer to identify the individual, or any information in an individual’s application and claims history, including any appeals records.
Incident Report
An investigatory summation of a Security Incident completed by the Information Security Officer or the Assistant Information Security Officer to determine if Oxcyon has incurred a Security Breach.
Medical Information
Information regarding an individual’s medical history, mental or physical condition, or medical treatment or diagnosis by a health care professional.
Notice-Triggering Information
Specific items of personal information. This information includes an individual’s name in combination with Social Security Number, driver’s license/Medical Group/Patient ID, identification card number, health insurance information, medical information, or financial account number such as credit card number, in combination with any required security code, access code, or password that would permit access to an individual’s financial account.
Security Breach
An unauthorized acquisition of computerized data that compromises the security, confidentiality or integrity of personal information maintained by Oxcyon.
Security Incident
A collection of related activities or events which provide evidence that confidential information could have been acquired by an unauthorized person.