Protective measures against unauthorized access to or interference with computer operating systems, telecommunications, or data structures, especially the modification, deletion, destruction, or release of data in computers. It includes methods of forestalling interference by computer viruses or so-called computer hackers aiming to compromise stored data.
United States Social Security Administration
An independent agency within the Executive Branch of the United States Government. It administers a national social insurance program whereby employees, employers, and the self-employed pay contributions into pooled trust funds. Part of the contributions go into a separate hospital insurance trust fund for workers at age 65 to provide help with medical expenses. Other programs include the supplemental social security income program for the aged, blind, and disabled and the Old Age Survivors and Disability Insurance Program. It became an independent agency March 31, 1995. It had previously been part of the Department of Health, Education, and Welfare, later the Department of Health and Human Services. (From United States Government Manual, 1994-95)
Systems composed of a computer or computers, peripheral equipment, such as disks, printers, and terminals, and telecommunications capabilities.
Various units or machines that operate in combination or in conjunction with a computer but are not physically part of it. Peripheral devices typically display computer data, store data from the computer and return the data to the computer on demand, prepare data for human use, or acquire data from a source and convert it to a form usable by a computer. (Computer Dictionary, 4th ed.)
Computer Communication Networks
The privacy of information and its protection against unauthorized disclosure.
Familiarity and comfort in using computers efficiently.
Medical Records Systems, Computerized
Insurance designed to compensate persons who lose wages because of illness or injury; insurance providing periodic payments that partially replace lost wages, salary, or other income when the insured is unable to work because of illness, injury, or disease. Individual and group disability insurance are two types of such coverage. (From Facts on File Dictionary of Health Care Management, 1988, p207)
A method of differentiating individuals based on the analysis of qualitative or quantitative biological traits or patterns. This process which has applications in forensics and identity theft prevention includes DNA profiles or DNA fingerprints, hand fingerprints, automated facial recognition, iris scan, hand geometry, retinal scan, vascular patterns, automated voice pattern recognition, and ultrasound of fingers.
The process of pictorial communication, between human and computers, in which the computer input and output have the form of charts, drawings, or other appropriate pictorial representation.
Patient Identification Systems
Old Age Assistance
The electronic transmission of radiological images from one location to another for the purposes of interpretation and/or consultation. Users in different locations may simultaneously view images with greater access to secondary consultations and improved continuing education. (From American College of Radiology, ACR Standard for Teleradiology, 1994, p3)
Small computers that lack the speed, memory capacity, and instructional capability of the full-size computer but usually retain its programmable flexibility. They are larger, faster, and more flexible, powerful, and expensive than microcomputers.
Health Insurance Portability and Accountability Act
Medical Identity Theft
Emergency Service, Hospital
Physical motion, i.e., a change in position of a body or subject as a result of an external force. It is distinguished from MOVEMENT, a process resulting from biological activity.