Definitions
Missouri Personally Identifiable Information (PII)
Missouri PII refers to personally identifiable information (PII) as defined by the state of Missouri.
National Institute of Standards and Technology (NIST)
In cybersecurity, NIST is extremely well known for the NIST Cybersecurity Framework, as well the NIST Risk Management Framework (RMF), NIST 800-53 control guidance, NIST Digital Identity Guidelines and others.
Nuclear Regulatory Commission (NRC)
The Nuclear Regulatory Commission outlines regulations to protect information related to U.S. government programs for the physical protection and safeguarding of nuclear materials or facilities.
Office for Human Research Protections
The OHRP provides guidance and leadership to ensure human subjects’ safety and well-being and oversees regulatory implementation.
Payment Card Industry Data Security Standard (PCI DSS)
The Payment Card Industry Data Security Standard was developed by the major credit card companies as a guideline to help organizations that process card payments.
Privacy
Data or information privacy is about how much control a person or organization has over their information being collected, stored, used, or shared with a third party.
Protected Data
Protected data refers to data regulated by federal, state, and local legislation.
Protected Health Information (PHI)
Protected health information (PHI) refers to health data created, kept, or shared by HIPAA-covered entities and their commercial partners in the provision of healthcare, healthcare operations, and payment for such services.
Public Data
Public data may be shared openly and does not have regulatory or industry requirements on its control and use.
Ransomware
Ransomware is malicious software that renders data and systems unusable until the targeted individual or organization pays a ransom.
Regulated Data
See also: Protected Data. Regulated data is protected by local, state, national, or international laws and regulations.
Regulatory Controls
Controls, rules, and regulations established by a regulatory body and applied to entities or activities.
Remote Access
Remote access refers to the ability to access a device or a network from any geographic location.
Removable Media
Data storage devices or media that can be easily removed (i.e. are portable) from the reader device (e.g. disk drive, optical drive, USB port, hub/cradle).
Example: USB flash drive, digital memory card, CD/DVD, floppy disks, ZIP disks, external hard drive
Research
Research is creative and systematic work undertaken to contribute to the stock of knowledge . . .
Research Data
Any information generated during the research process is considered “research data.”
Research Protocol
A research protocol is a detailed plan that outlines how a scientific study will be conducted.
Scientific Data
Scientific Data are generated by systemic research and are usually published in a peer-reviewed journal.
Sensitive Data
The word “sensitive” describes data that, if disclosed without authorization, could result in harm.
Sensitive Data Control Plan
A sensitive data control plan outlines how sensitive files and data will be monitored and restricted to reduce the risk of accidental data loss.
Transcribe
In the context of research and information security, to “transcribe” is to write down or
record a copy of language..
Transcribe
In the context of research and information security, to “transcribe” is to write down or record a copy of language...
WashU Community
The phrase "WashU Community" refers to all WashU faculty, staff, and students. It also applies for all other agents of the university. . .