Trustmark Definitions (1926-1950 of 3247)

Trustmark Definition Name Version
Specifies that a health care related organization must perform a periodic technical evaluation that establishes the extent to which the organization's security policies meet requirements.
1.0
Specifies that a health care related organization must perform a periodic technical evaluation that establishes the extent to which the organization's implemented security procedures meet requirements.
1.0
Specifies that a health care related organization must implement procedures to verify that a person or entity seeking access to electronic protected health information is the one claimed.
1.0
Defines conformance and assessment criteria for verifying that personal firewalls employed by the organization filter Incoming traffic by IP address.
1.0
Defines conformance and assessment criteria for verifying that personal firewalls employed by the organization filter Incoming traffic by destination ports.
1.0
Defines conformance and assessment criteria for verifying that personal firewalls employed by the organization filter Incoming traffic by network protocol.
1.0
Defines conformance and assessment criteria for verifying that personal firewalls employed by the organization maintain an IP traffic log.
1.0
Defines conformance and assessment criteria for verifying that personal firewalls employed by the organization manage program access to the Internet.
1.0
Defines conformance and assessment criteria for verifying that personal firewalls employed by the organization block unsolicited requests to connect to the device.
1.0
Defines conformance and assessment criteria for verifying that PII extracted from sensitive information only for the purpose of official business.
1.0
Defines conformance and assessment criteria for compliance with minimum security requirements for personnel screening criteria as related to overall personnel security requirements.
1.0
Defines conformance and assessment criteria for verifying that an performsvalidation testing to ensure rogue APs (Access Points) do not exist in the 802.11 Wireless Local Area Network (WLAN).
1.0
Defines conformance and assessment criteria for verifying that an organization screens personnel with access to CJI in accordance with section 5.12.1.1 of the CJIS Security Polic, "Minimum Screening Requirements for Individuals Requiring Access to CJI".
1.0
Defines conformance and assessment criteria for verifying that all personnel screening requirements for accessing CJI are met.
1.2
Defines conformance and assessment criteria for verifying that an organization ensures that individuals accessing an information system processing, storing, or transmitting types of U.S. classified information which require formal indoctrination, are formally indoctrinated for all of the relevant types of information to which they have access on the system.
1.0
Defines conformance and assessment criteria for verifying that an organization ensures that individuals accessing an information system processing, storing, or transmitting information requiring special protection: (a) Have valid access authorizations that are demonstrated by assigned official government duties; and (b) Satisfy organization-defined additional personnel screening criteria. .
1.0
Defines conformance and assessment criteria for verifying that an organization ensures that individuals accessing an information system processing, storing, or transmitting U.S. classified information are cleared and indoctrinated to the highest classification level of the information to which they have access on the system.
1.0
Defines conformance and assessment criteria for compliance with minimum security requirements for personnel termination - credential revocation as related to overall personnel security requirements.
1.0
Defines conformance and assessment criteria for compliance with minimum security requirements for personnel termination - disabling of access as related to overall personnel security requirements.
1.0
Defines conformance and assessment criteria for compliance with minimum security requirements for personnel termination - exit interviews as related to overall personnel security requirements.
1.0
Defines conformance and assessment criteria for compliance with minimum security requirements for personnel termination - organizational notification as related to overall personnel security requirements.
1.0
Defines conformance and assessment criteria for compliance with minimum security requirements for personnel termination - organizational retention of access to information and systems as related to overall personnel security requirements.
1.0
Defines conformance and assessment criteria for compliance with minimum security requirements for personnel termination - retrieval of security-related property as related to overall personnel security requirements.
1.0
Defines conformance and assessment criteria for verifying that an organization employs automated mechanisms to notify organization-defined personnel or roles upon termination of an individual.
1.0
Defines conformance and assessment criteria for verifying that an organization notifies terminated individuals of applicable, legally binding post-employment requirements for the protection of organizational information.
1.0
This page is also available as JSON and XML.