Enterprise Information Security Policy
Across
- 2. A record of information or events in an organized system, usually sequenced in the order in which the events occurred.
- 3. Any entity, excluding an Agent, Agent Team Member or External Associate, that has a contractual relationship with State Farm
- 5. Verifying the identity of a user, machine, software component, device, or other entity.
- 7. a computer service.
- 8. Any type of storage device that can be removed from a computer while the system is running.
- 9. A type of software program designed to prevent, detect and remediate malicious programming on individual computing devices and IT systems.
- 11. The physical elements of a computer system
- 12. Protected Health Information acronym
- 14. A person or persons responsible for supervising people or work.
- 15. Interference, including the absence of technology, with the ability to continue critical operations and processes and/or to conduct business as usual.
Down
- 1. All data collected, created, processed, stored, used, or transmitted in any media or form, whether electronic or non-electronic.
- 4. Measures to protect against destruction, loss, or damage of customer information due to potential environmental hazards, such as fire and water damage or technological failures.
- 6. ____ is compromised of 60 standards
- 10. _____ implements standards to protect Protected Health Information (PHI).
- 12. A Credential established by a sequence of characters used as a secret key for
- 13. The set of characteristics by which a Person is definitively recognizable or known.
- 16. A piece of Software intended to update an electronic Information Resource.