Trustmark Definitions (226-250 of 3325)

Trustmark Definition Name Version
This Trustmark Definition defines conformance and assessment criteria for compliance with minimum security requirements for personnel screening criteria as related to overall personnel security requirements.
1.0
Specifies National Identity Exchange Federation (NIEF) requirements for a Service Provider Organization (SPO) on the full disclosure of all applicable policies, procedures, and other documentation to other NIEF member organizations.
1.0
This Trustmark Definition defines conformance and assessment criteria for compliance with minimum security requirements for personnel screening criteria as related to overall personnel security requirements.
1.0
This Trustmark Definition specifies a minimum Elliptic Curve key size for private keys use with PKI.
1.0
Specifies that a health care related organization must implement electronic procedures that terminate an electronic session after a predetermined time of inactivity.
1.0
Addresses the requirement for the individual personnel shall be specifically designated to one of the four PKI trusted roles: Administrative, Officer, Auditor or Operator.
1.0
Specifies a health care related organization's starting compliance date for the Security Rule, based on the type of organization.
1.0
Defines conformance and assessment criteria for verifying that an information system performs an integrity check of organization-defined software at startup.
1.0
Specifies requirements for an Attribute Provider Organization (APO) that seeks to conform with National Identiy Exchange Federation (NIEF) requirements related to the proper assertion of attributes.
1.0
Defines conformance and assessment criteria for verifying that an organization provides training to its personnel on indicators of malicious code to recognize suspicious communications and anomalous behavior in organizational information systems.
1.0
Defines conformance and assessment criteria for verifying that an organization requests Telecommunications Service Priority for all telecommunications services used for national security emergency preparedness in the event that the primary and/or alternate telecommunications services are provided by a common carrier.
1.0
Defines conformance and assessment criteria for verifying that an organization's incident response reporting and handling procedures address scenarios the total loss of mobile devices.
1.0
Addresses the requirement for the validity period of PKI certificates being renewed to meet the operational period time limits specified within the organization's certificate policy.
1.0
Defines conformance and assessment criteria for verifying that the organization has established appropriate administrative, technical and physical safeguards to ensure the security and confidentiality of stored sensitive information.
1.0
Specifies requirements in accordance with Identity Ecosystem Framework (IDEF) requirement USABLE-6: USABILITY FEEDBACK.
1.0
Defines conformance and assessment criteria for verifying that an organization provides effective notice to the public and to individuals regarding its authority for collecting PII.
1.0
Defines privacy requirements for an organization's SAR process to include safeguards to ensure that only information consistent with criminal activities associated with terrorism will be documented and shared.
1.0
Addresses backup handling for keys used with PKI.
1.0
Defines conformance and assessment criteria for verifying that NCIC and III transaction logs include appropriate content.
1.0
Defines conformance and assessment criteria for verifying that an organization determines mean time to failure (MTTF) for organization-defined information system components in specific environments of operation.
1.0
Defines conformance and assessment criteria for verifying that an organization virtually or physically insulate its wireless network from its operational wired infrastructure.
1.0
Addresses the requirement for all communications among an organization's PKI authorities supporting the certificate application and issuance process are authenticated.
1.0
Defines conformance and assessment criteria for verifying that an organization provides appropriate means for individuals to understand the consequences of decisions to approve or decline the authorization of the retention of PII.
1.0
Addresses the requirement for Organization Cas to maintain a record of the subscriber acknowledgement of receipt of tokens.
1.0
Defines conformance and assessment criteria for verifying that an organization retains each collection of personally identifiable information (PII) for organization-defined time period to fulfill the purpose(s) identified in the notice or as required by law.
1.0
This page is also available as JSON and XML.