<?xml version="1.0" encoding="UTF-8"?><TrustmarkDefinitions count="25" total="3493" max="25" offset="0" self="https://artifacts.trustmarkinitiative.org/lib/tds?format=xml&amp;max=25&amp;offset=0" next="https://artifacts.trustmarkinitiative.org/lib/tds?format=xml&amp;max=25&amp;offset=25"><TrustmarkDefinition html="https://artifacts.trustmarkinitiative.org/lib/tds/acceptable-identity-source-documents-for-identity-proofing-must-be-from-form-i-9_-omb-no.-1115-0136_-employment-eligibility-verification/1.0/?format=html" json="https://artifacts.trustmarkinitiative.org/lib/tds/acceptable-identity-source-documents-for-identity-proofing-must-be-from-form-i-9_-omb-no.-1115-0136_-employment-eligibility-verification/1.0/?format=json" xml="https://artifacts.trustmarkinitiative.org/lib/tds/acceptable-identity-source-documents-for-identity-proofing-must-be-from-form-i-9_-omb-no.-1115-0136_-employment-eligibility-verification/1.0/?format=xml"><Identifier>https://artifacts.trustmarkinitiative.org/lib/tds/acceptable-identity-source-documents-for-identity-proofing-must-be-from-form-i-9_-omb-no.-1115-0136_-employment-eligibility-verification/1.0/</Identifier><SubIdentifier>https://artifacts.trustmarkinitiative.org/lib/tds/acceptable-identity-source-documents-for-identity-proofing-must-be-from-form-i-9_-omb-no.-1115-0136_-employment-eligibility-verification/1.0/</SubIdentifier><BaseUrl></BaseUrl><Name>Acceptable Identity Source Documents For Identity Proofing Must Be From Form I-9, OMB No. 1115-0136, Employment Eligibility Verification</Name><Version>1.0</Version><Description>Addresses requirements for identity source documents used for identity proofing to be from the list of acceptable documents included in Form I-9, OMB No. 1115-0136, Employment Eligibility Verification.</Description><Deprecated>false</Deprecated><PublicationDateTime>2018-10-29T00:00:00.000Z</PublicationDateTime><Keywords><Keyword>federal bridge</Keyword><Keyword>identity</Keyword><Keyword>security</Keyword><Keyword>piv-i</Keyword></Keywords></TrustmarkDefinition><TrustmarkDefinition html="https://artifacts.trustmarkinitiative.org/lib/tds/acceptance-criteria/1.0/?format=html" json="https://artifacts.trustmarkinitiative.org/lib/tds/acceptance-criteria/1.0/?format=json" xml="https://artifacts.trustmarkinitiative.org/lib/tds/acceptance-criteria/1.0/?format=xml"><Identifier>https://artifacts.trustmarkinitiative.org/lib/tds/acceptance-criteria/1.0/</Identifier><SubIdentifier>https://artifacts.trustmarkinitiative.org/lib/tds/acceptance-criteria/1.0/</SubIdentifier><BaseUrl></BaseUrl><Name>Acceptance Criteria</Name><Version>1.0</Version><Description>Defines conformance and assessment criteria for compliance with minimum security requirements for acceptance criteria as related to overall system and services acquisition requirements.</Description><Deprecated>false</Deprecated><PublicationDateTime>2018-10-24T00:00:00.000Z</PublicationDateTime><Keywords><Keyword>800-53</Keyword><Keyword>nist</Keyword><Keyword>information assurance</Keyword><Keyword>security</Keyword><Keyword>system and services acquisition</Keyword></Keywords></TrustmarkDefinition><TrustmarkDefinition html="https://artifacts.trustmarkinitiative.org/lib/tds/acceptance-of-federal-piv-credentials-for-non-organizational-users/1.0/?format=html" json="https://artifacts.trustmarkinitiative.org/lib/tds/acceptance-of-federal-piv-credentials-for-non-organizational-users/1.0/?format=json" xml="https://artifacts.trustmarkinitiative.org/lib/tds/acceptance-of-federal-piv-credentials-for-non-organizational-users/1.0/?format=xml"><Identifier>https://artifacts.trustmarkinitiative.org/lib/tds/acceptance-of-federal-piv-credentials-for-non-organizational-users/1.0/</Identifier><SubIdentifier>https://artifacts.trustmarkinitiative.org/lib/tds/acceptance-of-federal-piv-credentials-for-non-organizational-users/1.0/</SubIdentifier><BaseUrl></BaseUrl><Name>Acceptance of Federal PIV Credentials For Non-Organizational Users</Name><Version>1.0</Version><Description>Defines conformance and assessment criteria for compliance with minimum security requirements for acceptance of federal PIV credentials for non-organizational users as related to overall identification and authentication requirements.</Description><Deprecated>false</Deprecated><PublicationDateTime>2018-10-24T00:00:00.000Z</PublicationDateTime><Keywords><Keyword>piv</Keyword><Keyword>800-53</Keyword><Keyword>nist</Keyword><Keyword>information assurance</Keyword><Keyword>security</Keyword><Keyword>identification and authentication</Keyword></Keywords></TrustmarkDefinition><TrustmarkDefinition html="https://artifacts.trustmarkinitiative.org/lib/tds/acceptance-of-piv-credentials/1.0/?format=html" json="https://artifacts.trustmarkinitiative.org/lib/tds/acceptance-of-piv-credentials/1.0/?format=json" xml="https://artifacts.trustmarkinitiative.org/lib/tds/acceptance-of-piv-credentials/1.0/?format=xml"><Identifier>https://artifacts.trustmarkinitiative.org/lib/tds/acceptance-of-piv-credentials/1.0/</Identifier><SubIdentifier>https://artifacts.trustmarkinitiative.org/lib/tds/acceptance-of-piv-credentials/1.0/</SubIdentifier><BaseUrl></BaseUrl><Name>Acceptance of PIV Credentials</Name><Version>1.0</Version><Description>Defines conformance and assessment criteria for compliance with minimum security requirements for acceptance of PIV credentials as related to overall identification and authentication requirements.</Description><Deprecated>false</Deprecated><PublicationDateTime>2018-10-24T00:00:00.000Z</PublicationDateTime><Keywords><Keyword>piv</Keyword><Keyword>800-53</Keyword><Keyword>nist</Keyword><Keyword>information assurance</Keyword><Keyword>security</Keyword><Keyword>identification and authentication</Keyword></Keywords></TrustmarkDefinition><TrustmarkDefinition html="https://artifacts.trustmarkinitiative.org/lib/tds/access---authentication/1.0/?format=html" json="https://artifacts.trustmarkinitiative.org/lib/tds/access---authentication/1.0/?format=json" xml="https://artifacts.trustmarkinitiative.org/lib/tds/access---authentication/1.0/?format=xml"><Identifier>https://artifacts.trustmarkinitiative.org/lib/tds/access---authentication/1.0/</Identifier><SubIdentifier>https://artifacts.trustmarkinitiative.org/lib/tds/access---authentication/1.0/</SubIdentifier><BaseUrl></BaseUrl><Name>Access - Authentication</Name><Version>1.0</Version><Description>Defines privacy requirements related to individuals' ability to obtain their sensitive information.</Description><Deprecated>false</Deprecated><PublicationDateTime>2018-04-10T00:00:00.000Z</PublicationDateTime><Keywords><Keyword>privacy</Keyword></Keywords></TrustmarkDefinition><TrustmarkDefinition html="https://artifacts.trustmarkinitiative.org/lib/tds/access---ease-of-obtaining-information/1.0/?format=html" json="https://artifacts.trustmarkinitiative.org/lib/tds/access---ease-of-obtaining-information/1.0/?format=json" xml="https://artifacts.trustmarkinitiative.org/lib/tds/access---ease-of-obtaining-information/1.0/?format=xml"><Identifier>https://artifacts.trustmarkinitiative.org/lib/tds/access---ease-of-obtaining-information/1.0/</Identifier><SubIdentifier>https://artifacts.trustmarkinitiative.org/lib/tds/access---ease-of-obtaining-information/1.0/</SubIdentifier><BaseUrl></BaseUrl><Name>Access - Ease of Obtaining Information</Name><Version>1.0</Version><Description>Defines privacy requirements related to individuals obtaining sensitive information that is held about them.</Description><Deprecated>false</Deprecated><PublicationDateTime>2018-04-10T00:00:00.000Z</PublicationDateTime><Keywords><Keyword>privacy</Keyword></Keywords></TrustmarkDefinition><TrustmarkDefinition html="https://artifacts.trustmarkinitiative.org/lib/tds/access---exceptions/1.0/?format=html" json="https://artifacts.trustmarkinitiative.org/lib/tds/access---exceptions/1.0/?format=json" xml="https://artifacts.trustmarkinitiative.org/lib/tds/access---exceptions/1.0/?format=xml"><Identifier>https://artifacts.trustmarkinitiative.org/lib/tds/access---exceptions/1.0/</Identifier><SubIdentifier>https://artifacts.trustmarkinitiative.org/lib/tds/access---exceptions/1.0/</SubIdentifier><BaseUrl></BaseUrl><Name>Access - Exceptions</Name><Version>1.0</Version><Description>Defines privacy requirements related to organizations providing individuals access to sensitive information about them that the organization holds, and applicable exceptions.</Description><Deprecated>false</Deprecated><PublicationDateTime>2018-04-10T00:00:00.000Z</PublicationDateTime><Keywords><Keyword>privacy</Keyword></Keywords></TrustmarkDefinition><TrustmarkDefinition html="https://artifacts.trustmarkinitiative.org/lib/tds/access---information-is-held/1.0/?format=html" json="https://artifacts.trustmarkinitiative.org/lib/tds/access---information-is-held/1.0/?format=json" xml="https://artifacts.trustmarkinitiative.org/lib/tds/access---information-is-held/1.0/?format=xml"><Identifier>https://artifacts.trustmarkinitiative.org/lib/tds/access---information-is-held/1.0/</Identifier><SubIdentifier>https://artifacts.trustmarkinitiative.org/lib/tds/access---information-is-held/1.0/</SubIdentifier><BaseUrl></BaseUrl><Name>Access - Information Is Held</Name><Version>1.0</Version><Description>Defines privacy requirements related to individuals obtaining confirmation of whether or not sensitive information is held about them.</Description><Deprecated>false</Deprecated><PublicationDateTime>2018-04-10T00:00:00.000Z</PublicationDateTime><Keywords><Keyword>privacy</Keyword></Keywords></TrustmarkDefinition><TrustmarkDefinition html="https://artifacts.trustmarkinitiative.org/lib/tds/access---mechanisms-to-determine-purposes/1.0/?format=html" json="https://artifacts.trustmarkinitiative.org/lib/tds/access---mechanisms-to-determine-purposes/1.0/?format=json" xml="https://artifacts.trustmarkinitiative.org/lib/tds/access---mechanisms-to-determine-purposes/1.0/?format=xml"><Identifier>https://artifacts.trustmarkinitiative.org/lib/tds/access---mechanisms-to-determine-purposes/1.0/</Identifier><SubIdentifier>https://artifacts.trustmarkinitiative.org/lib/tds/access---mechanisms-to-determine-purposes/1.0/</SubIdentifier><BaseUrl></BaseUrl><Name>Access - Mechanisms To Determine Purposes</Name><Version>1.0</Version><Description>Defines privacy requirements for mechanisms to allow individuals to determine the purposes for which their sensitive information has been shared.</Description><Deprecated>false</Deprecated><PublicationDateTime>2018-04-10T00:00:00.000Z</PublicationDateTime><Keywords><Keyword>privacy</Keyword></Keywords></TrustmarkDefinition><TrustmarkDefinition html="https://artifacts.trustmarkinitiative.org/lib/tds/access---mechanisms-to-determine-sharing/1.0/?format=html" json="https://artifacts.trustmarkinitiative.org/lib/tds/access---mechanisms-to-determine-sharing/1.0/?format=json" xml="https://artifacts.trustmarkinitiative.org/lib/tds/access---mechanisms-to-determine-sharing/1.0/?format=xml"><Identifier>https://artifacts.trustmarkinitiative.org/lib/tds/access---mechanisms-to-determine-sharing/1.0/</Identifier><SubIdentifier>https://artifacts.trustmarkinitiative.org/lib/tds/access---mechanisms-to-determine-sharing/1.0/</SubIdentifier><BaseUrl></BaseUrl><Name>Access - Mechanisms To Determine Sharing</Name><Version>1.0</Version><Description>Defines privacy requirements for mechanisms to allow individuals to determine with which parties their sensitive information has been shared.</Description><Deprecated>false</Deprecated><PublicationDateTime>2018-04-10T00:00:00.000Z</PublicationDateTime><Keywords><Keyword>privacy</Keyword></Keywords></TrustmarkDefinition><TrustmarkDefinition html="https://artifacts.trustmarkinitiative.org/lib/tds/access---right-to-inspect-personal-information/1.0/?format=html" json="https://artifacts.trustmarkinitiative.org/lib/tds/access---right-to-inspect-personal-information/1.0/?format=json" xml="https://artifacts.trustmarkinitiative.org/lib/tds/access---right-to-inspect-personal-information/1.0/?format=xml"><Identifier>https://artifacts.trustmarkinitiative.org/lib/tds/access---right-to-inspect-personal-information/1.0/</Identifier><SubIdentifier>https://artifacts.trustmarkinitiative.org/lib/tds/access---right-to-inspect-personal-information/1.0/</SubIdentifier><BaseUrl></BaseUrl><Name>Access - Right to Inspect Personal Information</Name><Version>1.0</Version><Description>Defines privacy requirements for organizations to establish an individual's right to inspect their stored sensitive information.</Description><Deprecated>false</Deprecated><PublicationDateTime>2018-04-10T00:00:00.000Z</PublicationDateTime><Keywords><Keyword>privacy</Keyword></Keywords></TrustmarkDefinition><TrustmarkDefinition html="https://artifacts.trustmarkinitiative.org/lib/tds/access---support-to-inspect-personal-information/1.0/?format=html" json="https://artifacts.trustmarkinitiative.org/lib/tds/access---support-to-inspect-personal-information/1.0/?format=json" xml="https://artifacts.trustmarkinitiative.org/lib/tds/access---support-to-inspect-personal-information/1.0/?format=xml"><Identifier>https://artifacts.trustmarkinitiative.org/lib/tds/access---support-to-inspect-personal-information/1.0/</Identifier><SubIdentifier>https://artifacts.trustmarkinitiative.org/lib/tds/access---support-to-inspect-personal-information/1.0/</SubIdentifier><BaseUrl></BaseUrl><Name>Access - Support to Inspect Personal Information</Name><Version>1.0</Version><Description>Defines privacy requirements for organizations to support an individual's right to inspect their stored sensitive information.</Description><Deprecated>false</Deprecated><PublicationDateTime>2018-04-10T00:00:00.000Z</PublicationDateTime><Keywords><Keyword>privacy</Keyword></Keywords></TrustmarkDefinition><TrustmarkDefinition html="https://artifacts.trustmarkinitiative.org/lib/tds/access-agreements-_-post-employment-requirements---notification/1.0/?format=html" json="https://artifacts.trustmarkinitiative.org/lib/tds/access-agreements-_-post-employment-requirements---notification/1.0/?format=json" xml="https://artifacts.trustmarkinitiative.org/lib/tds/access-agreements-_-post-employment-requirements---notification/1.0/?format=xml"><Identifier>https://artifacts.trustmarkinitiative.org/lib/tds/access-agreements-_-post-employment-requirements---notification/1.0/</Identifier><SubIdentifier>https://artifacts.trustmarkinitiative.org/lib/tds/access-agreements-_-post-employment-requirements---notification/1.0/</SubIdentifier><BaseUrl></BaseUrl><Name>Access Agreements | Post-Employment Requirements - Notification</Name><Version>1.0</Version><Description>Defines conformance and assessment criteria for verifying that an organization notifies individuals of applicable, legally binding post-employment requirements for protection of organizational information.</Description><Deprecated>false</Deprecated><PublicationDateTime>2018-10-17T00:00:00.000Z</PublicationDateTime><Keywords><Keyword>800-53</Keyword><Keyword>nist</Keyword><Keyword>information assurance</Keyword><Keyword>security</Keyword><Keyword>personnel security</Keyword></Keywords></TrustmarkDefinition><TrustmarkDefinition html="https://artifacts.trustmarkinitiative.org/lib/tds/access-agreements-_-post-employment-requirements---signed-acknowlegment/1.0/?format=html" json="https://artifacts.trustmarkinitiative.org/lib/tds/access-agreements-_-post-employment-requirements---signed-acknowlegment/1.0/?format=json" xml="https://artifacts.trustmarkinitiative.org/lib/tds/access-agreements-_-post-employment-requirements---signed-acknowlegment/1.0/?format=xml"><Identifier>https://artifacts.trustmarkinitiative.org/lib/tds/access-agreements-_-post-employment-requirements---signed-acknowlegment/1.0/</Identifier><SubIdentifier>https://artifacts.trustmarkinitiative.org/lib/tds/access-agreements-_-post-employment-requirements---signed-acknowlegment/1.0/</SubIdentifier><BaseUrl></BaseUrl><Name>Access Agreements | Post-Employment Requirements - Signed Acknowlegment</Name><Version>1.0</Version><Description>Defines conformance and assessment criteria for verifying that an organization requires individuals to sign an acknowledgment of legally binding post-employment requirements for protection of organizational information, if applicable, as part of granting initial access to covered information.</Description><Deprecated>false</Deprecated><PublicationDateTime>2018-10-17T00:00:00.000Z</PublicationDateTime><Keywords><Keyword>800-53</Keyword><Keyword>nist</Keyword><Keyword>information assurance</Keyword><Keyword>security</Keyword><Keyword>personnel security</Keyword></Keywords></TrustmarkDefinition><TrustmarkDefinition html="https://artifacts.trustmarkinitiative.org/lib/tds/access-agreements-_-u.s.-classified-information-requiring-special-protection/1.0/?format=html" json="https://artifacts.trustmarkinitiative.org/lib/tds/access-agreements-_-u.s.-classified-information-requiring-special-protection/1.0/?format=json" xml="https://artifacts.trustmarkinitiative.org/lib/tds/access-agreements-_-u.s.-classified-information-requiring-special-protection/1.0/?format=xml"><Identifier>https://artifacts.trustmarkinitiative.org/lib/tds/access-agreements-_-u.s.-classified-information-requiring-special-protection/1.0/</Identifier><SubIdentifier>https://artifacts.trustmarkinitiative.org/lib/tds/access-agreements-_-u.s.-classified-information-requiring-special-protection/1.0/</SubIdentifier><BaseUrl></BaseUrl><Name>Access Agreements | U.S. Classified Information Requiring Special Protection</Name><Version>1.0</Version><Description>Defines conformance and assessment criteria for verifying that an organization ensures that access to U.S. classified information requiring special protection is granted only to individuals who:
(a) Have a valid access authorization that is demonstrated by assigned official government duties;
(b) Satisfy associated personnel security criteria; and
(c) Have read, understood, and signed a nondisclosure agreement.</Description><Deprecated>false</Deprecated><PublicationDateTime>2018-10-17T00:00:00.000Z</PublicationDateTime><Keywords><Keyword>800-53</Keyword><Keyword>nist</Keyword><Keyword>information assurance</Keyword><Keyword>security</Keyword><Keyword>personnel security</Keyword></Keywords></TrustmarkDefinition><TrustmarkDefinition html="https://artifacts.trustmarkinitiative.org/lib/tds/access-authorizations/1.0/?format=html" json="https://artifacts.trustmarkinitiative.org/lib/tds/access-authorizations/1.0/?format=json" xml="https://artifacts.trustmarkinitiative.org/lib/tds/access-authorizations/1.0/?format=xml"><Identifier>https://artifacts.trustmarkinitiative.org/lib/tds/access-authorizations/1.0/</Identifier><SubIdentifier>https://artifacts.trustmarkinitiative.org/lib/tds/access-authorizations/1.0/</SubIdentifier><BaseUrl></BaseUrl><Name>Access Authorizations</Name><Version>1.0</Version><Description>Defines conformance and assessment criteria for compliance with minimum security requirements for access authorizations as related to overall access control requirements.</Description><Deprecated>false</Deprecated><PublicationDateTime>2018-10-24T00:00:00.000Z</PublicationDateTime><Keywords><Keyword>800-53</Keyword><Keyword>nist</Keyword><Keyword>information assurance</Keyword><Keyword>security</Keyword><Keyword>account management</Keyword><Keyword>access control</Keyword></Keywords></TrustmarkDefinition><TrustmarkDefinition html="https://artifacts.trustmarkinitiative.org/lib/tds/access-authorizations-support-separation-of-duties/1.0/?format=html" json="https://artifacts.trustmarkinitiative.org/lib/tds/access-authorizations-support-separation-of-duties/1.0/?format=json" xml="https://artifacts.trustmarkinitiative.org/lib/tds/access-authorizations-support-separation-of-duties/1.0/?format=xml"><Identifier>https://artifacts.trustmarkinitiative.org/lib/tds/access-authorizations-support-separation-of-duties/1.0/</Identifier><SubIdentifier>https://artifacts.trustmarkinitiative.org/lib/tds/access-authorizations-support-separation-of-duties/1.0/</SubIdentifier><BaseUrl></BaseUrl><Name>Access Authorizations Support Separation of Duties</Name><Version>1.0</Version><Description>Defines conformance and assessment criteria for verifying that an organization has defined information system access authorizations to support separation of duties.</Description><Deprecated>false</Deprecated><PublicationDateTime>2018-10-17T00:00:00.000Z</PublicationDateTime><Keywords><Keyword>information assurance</Keyword><Keyword>security</Keyword><Keyword>800-53</Keyword><Keyword>nist</Keyword><Keyword>pki</Keyword><Keyword>access control</Keyword></Keywords></TrustmarkDefinition><TrustmarkDefinition html="https://artifacts.trustmarkinitiative.org/lib/tds/access-control---automatic-logoff/1.0/?format=html" json="https://artifacts.trustmarkinitiative.org/lib/tds/access-control---automatic-logoff/1.0/?format=json" xml="https://artifacts.trustmarkinitiative.org/lib/tds/access-control---automatic-logoff/1.0/?format=xml"><Identifier>https://artifacts.trustmarkinitiative.org/lib/tds/access-control---automatic-logoff/1.0/</Identifier><SubIdentifier>https://artifacts.trustmarkinitiative.org/lib/tds/access-control---automatic-logoff/1.0/</SubIdentifier><BaseUrl></BaseUrl><Name>Access Control - Automatic Logoff</Name><Version>1.0</Version><Description>Specifies that a health care related organization must implement electronic procedures that terminate an electronic session after a predetermined time of inactivity.</Description><Deprecated>false</Deprecated><PublicationDateTime>2017-02-17T00:00:00.000Z</PublicationDateTime><Keywords><Keyword>technical safeguards</Keyword><Keyword>hipaa security</Keyword><Keyword>health care</Keyword></Keywords></TrustmarkDefinition><TrustmarkDefinition html="https://artifacts.trustmarkinitiative.org/lib/tds/access-control---emergency-access-procedure/1.0/?format=html" json="https://artifacts.trustmarkinitiative.org/lib/tds/access-control---emergency-access-procedure/1.0/?format=json" xml="https://artifacts.trustmarkinitiative.org/lib/tds/access-control---emergency-access-procedure/1.0/?format=xml"><Identifier>https://artifacts.trustmarkinitiative.org/lib/tds/access-control---emergency-access-procedure/1.0/</Identifier><SubIdentifier>https://artifacts.trustmarkinitiative.org/lib/tds/access-control---emergency-access-procedure/1.0/</SubIdentifier><BaseUrl></BaseUrl><Name>Access Control - Emergency Access Procedure</Name><Version>1.0</Version><Description>Specifies that a health care related organization must establish (and implement as needed) procedures for obtaining necessary electronic protected health information during an emergency.</Description><Deprecated>false</Deprecated><PublicationDateTime>2017-02-17T00:00:00.000Z</PublicationDateTime><Keywords><Keyword>technical safeguards</Keyword><Keyword>hipaa security</Keyword><Keyword>health care</Keyword></Keywords></TrustmarkDefinition><TrustmarkDefinition html="https://artifacts.trustmarkinitiative.org/lib/tds/access-control---encryption-and-decryption/1.0/?format=html" json="https://artifacts.trustmarkinitiative.org/lib/tds/access-control---encryption-and-decryption/1.0/?format=json" xml="https://artifacts.trustmarkinitiative.org/lib/tds/access-control---encryption-and-decryption/1.0/?format=xml"><Identifier>https://artifacts.trustmarkinitiative.org/lib/tds/access-control---encryption-and-decryption/1.0/</Identifier><SubIdentifier>https://artifacts.trustmarkinitiative.org/lib/tds/access-control---encryption-and-decryption/1.0/</SubIdentifier><BaseUrl></BaseUrl><Name>Access Control - Encryption and Decryption</Name><Version>1.0</Version><Description>Specifies that a health care related organization must implement a mechanism to encrypt and decrypt electronic protected health information.</Description><Deprecated>false</Deprecated><PublicationDateTime>2017-02-17T00:00:00.000Z</PublicationDateTime><Keywords><Keyword>technical safeguards</Keyword><Keyword>hipaa security</Keyword><Keyword>health care</Keyword></Keywords></TrustmarkDefinition><TrustmarkDefinition html="https://artifacts.trustmarkinitiative.org/lib/tds/access-control---policies-and-procedures-for-e-phi/1.0/?format=html" json="https://artifacts.trustmarkinitiative.org/lib/tds/access-control---policies-and-procedures-for-e-phi/1.0/?format=json" xml="https://artifacts.trustmarkinitiative.org/lib/tds/access-control---policies-and-procedures-for-e-phi/1.0/?format=xml"><Identifier>https://artifacts.trustmarkinitiative.org/lib/tds/access-control---policies-and-procedures-for-e-phi/1.0/</Identifier><SubIdentifier>https://artifacts.trustmarkinitiative.org/lib/tds/access-control---policies-and-procedures-for-e-phi/1.0/</SubIdentifier><BaseUrl></BaseUrl><Name>Access Control - Policies and Procedures for e-PHI</Name><Version>1.0</Version><Description>Specifies that a health care related organization must implement technical policies and procedures for electronic information systems that maintain electronic protected health information to allow access only to those persons or software programs that have been granted access rights as specified in Section 164.308(a)(4).</Description><Deprecated>false</Deprecated><PublicationDateTime>2017-02-17T00:00:00.000Z</PublicationDateTime><Keywords><Keyword>technical safeguards</Keyword><Keyword>hipaa security</Keyword><Keyword>health care</Keyword></Keywords></TrustmarkDefinition><TrustmarkDefinition html="https://artifacts.trustmarkinitiative.org/lib/tds/access-control---unique-user-identification/1.0/?format=html" json="https://artifacts.trustmarkinitiative.org/lib/tds/access-control---unique-user-identification/1.0/?format=json" xml="https://artifacts.trustmarkinitiative.org/lib/tds/access-control---unique-user-identification/1.0/?format=xml"><Identifier>https://artifacts.trustmarkinitiative.org/lib/tds/access-control---unique-user-identification/1.0/</Identifier><SubIdentifier>https://artifacts.trustmarkinitiative.org/lib/tds/access-control---unique-user-identification/1.0/</SubIdentifier><BaseUrl></BaseUrl><Name>Access Control - Unique User Identification</Name><Version>1.0</Version><Description>Specifies that a health care related organization must assign a unique name and/or number for identifying user identity.</Description><Deprecated>false</Deprecated><PublicationDateTime>2017-02-17T00:00:00.000Z</PublicationDateTime><Keywords><Keyword>technical safeguards</Keyword><Keyword>hipaa security</Keyword><Keyword>health care</Keyword></Keywords></TrustmarkDefinition><TrustmarkDefinition html="https://artifacts.trustmarkinitiative.org/lib/tds/access-control---unique-user-tracking/1.0/?format=html" json="https://artifacts.trustmarkinitiative.org/lib/tds/access-control---unique-user-tracking/1.0/?format=json" xml="https://artifacts.trustmarkinitiative.org/lib/tds/access-control---unique-user-tracking/1.0/?format=xml"><Identifier>https://artifacts.trustmarkinitiative.org/lib/tds/access-control---unique-user-tracking/1.0/</Identifier><SubIdentifier>https://artifacts.trustmarkinitiative.org/lib/tds/access-control---unique-user-tracking/1.0/</SubIdentifier><BaseUrl></BaseUrl><Name>Access Control - Unique User Tracking</Name><Version>1.0</Version><Description>Specifies that a health care related organization must assign a unique name and/or number for tracking user identity.</Description><Deprecated>false</Deprecated><PublicationDateTime>2017-02-17T00:00:00.000Z</PublicationDateTime><Keywords><Keyword>technical safeguards</Keyword><Keyword>hipaa security</Keyword><Keyword>health care</Keyword></Keywords></TrustmarkDefinition><TrustmarkDefinition html="https://artifacts.trustmarkinitiative.org/lib/tds/access-control-decisions/1.0/?format=html" json="https://artifacts.trustmarkinitiative.org/lib/tds/access-control-decisions/1.0/?format=json" xml="https://artifacts.trustmarkinitiative.org/lib/tds/access-control-decisions/1.0/?format=xml"><Identifier>https://artifacts.trustmarkinitiative.org/lib/tds/access-control-decisions/1.0/</Identifier><SubIdentifier>https://artifacts.trustmarkinitiative.org/lib/tds/access-control-decisions/1.0/</SubIdentifier><BaseUrl></BaseUrl><Name>Access Control Decisions</Name><Version>1.0</Version><Description>Defines conformance and assessment criteria for verifying that an organization establishes procedures to ensure organization-defined access control decisions are applied to each access request prior to access enforcement.</Description><Deprecated>false</Deprecated><PublicationDateTime>2018-10-17T00:00:00.000Z</PublicationDateTime><Keywords><Keyword>800-53</Keyword><Keyword>nist</Keyword><Keyword>information assurance</Keyword><Keyword>security</Keyword><Keyword>access control</Keyword></Keywords></TrustmarkDefinition><TrustmarkDefinition html="https://artifacts.trustmarkinitiative.org/lib/tds/access-control-decisions-_-no-user-or-process-identity/1.0/?format=html" json="https://artifacts.trustmarkinitiative.org/lib/tds/access-control-decisions-_-no-user-or-process-identity/1.0/?format=json" xml="https://artifacts.trustmarkinitiative.org/lib/tds/access-control-decisions-_-no-user-or-process-identity/1.0/?format=xml"><Identifier>https://artifacts.trustmarkinitiative.org/lib/tds/access-control-decisions-_-no-user-or-process-identity/1.0/</Identifier><SubIdentifier>https://artifacts.trustmarkinitiative.org/lib/tds/access-control-decisions-_-no-user-or-process-identity/1.0/</SubIdentifier><BaseUrl></BaseUrl><Name>Access Control Decisions | No User Or Process Identity</Name><Version>1.0</Version><Description>Defines conformance and assessment criteria for verifying that an information system enforces access control decisions based on organization-defined security attributes that do not include the identity of the user or process acting on behalf of the user.</Description><Deprecated>false</Deprecated><PublicationDateTime>2018-10-17T00:00:00.000Z</PublicationDateTime><Keywords><Keyword>800-53</Keyword><Keyword>nist</Keyword><Keyword>information assurance</Keyword><Keyword>security</Keyword><Keyword>access control</Keyword></Keywords></TrustmarkDefinition></TrustmarkDefinitions>