Trustmark Definitions (276-300 of 3325)

Trustmark Definition Name Version
Defines conformance and assessment criteria for compliance with minimum security requirements for defined mechanisms for hardware token-based authentication as related to overall identification and authentication requirements.
1.0
Defines conformance and assessment criteria for compliance with minimum security requirements for review of accounts as related to overall access control requirements.
1.0
Defines conformance and assessment criteria for verifying that an organization monitors organization-defined open source information and/or information sites at an organization-defined frequency for evidence of unauthorized disclosure of organizational information.
1.0
Addresses backup handling for keys used with PKI.
1.0
Specifies requirements for contents of the business associate contract between a covered entity and its business associate(s). The business associate must report to the covered entity any unauthorized use or disclosure (breaches) of PHI.
1.0
Defines conformance and assessment criteria for compliance with minimum security requirements for continuous monitoring response actions as related to overall certification accreditation and security assessments requirements.
1.0
Specifies requirements for part of the contents of the privacy notice for individuals. If the organization limits uses or disclosures more than provided by the privacy notice requirements, the organization may not include in its notice a limitation affecting its right to make a use or disclosure to avert a serious threat to health or safety.
1.0
Defines conformance and assessment criteria for compliance with minimum security requirements for review of security assessment and authorization policy as related to overall certification accreditation and security assessments requirements.
1.0
Defines privacy requirements for organizations to promote accountability for how sensitive information is shared.
1.0
Defines conformance and assessment criteria for compliance with minimum security requirements for assignment of identifiers as related to overall identification and authentication requirements.
1.0
Defines conformance and assessment criteria for verifying that an organization protects against unauthorized physical connections at organization-defined managed interfaces.
1.0
Addresses the requirement for organization PKI certificate authorities to revoke all certificates that express an organizational affiliation when affiliation information is no longer provided.
1.0
This Trustmark Definition addresses organizational requirements to implement information integrity verification tools for information systems.
1.0
Specifies that a health care related organization must have policies to safeguard the facility and the equipment therein from unauthorized physical access, tampering, and theft.
1.0
Specifies that a health care related organization must have policies to respond to suspected or known security incidents.
1.0
Defines conformance and assessment criteria for verifying that an organization's baseline security awareness training for authorized personnel with access to sensitive information addresses personally owned equipment.
1.0
Defines conformance and assessment criteria for compliance with minimum security requirements for reporting of suspected security weaknesses as related to overall incident response requirements.
1.0
Defines conformance and assessment criteria for verifying that an organization publishes rules and regulations governing how individuals may request access to records maintained in a Privacy Act system of records.
1.0
Defines conformance and assessment criteria for verifying that an organization requires the developer of the information system, system component, or information system service to correct flaws identified during security testing/evaluation.
1.0
Specifies best practices in accordance with Identity Ecosystem Framework (IDEF) best practice INTEROP-BP-E: RECOMMENDED MODULARITY.
1.0
Defines conformance and assessment criteria for verifying that an organization develops policies that minimize the use of personally identifiable information (PII) for research.
1.0
Defines conformance and assessment criteria for compliance with minimum security requirements for authenticator strength as related to overall identification and authentication requirements.
1.0
Defines conformance and assessment criteria for verifying that an information system verifies the correct operation of organization-defined security functions.
1.0
Defines conformance and assessment criteria for verifying that an organization has signed agreements with all organizations that provide it access to sensitive information.
1.0
Defines conformance and assessment criteria for compliance with minimum security requirements for documentation of individuals' specific information system security training as related to overall awareness and training requirements.
1.0
This page is also available as JSON and XML.