Enterprise Information Security Policy

12345678910111213141516
Across
  1. 2. A record of information or events in an organized system, usually sequenced in the order in which the events occurred.
  2. 3. Any entity, excluding an Agent, Agent Team Member or External Associate, that has a contractual relationship with State Farm
  3. 5. Verifying the identity of a user, machine, software component, device, or other entity.
  4. 7. a computer service.
  5. 8. Any type of storage device that can be removed from a computer while the system is running.
  6. 9. A type of software program designed to prevent, detect and remediate malicious programming on individual computing devices and IT systems.
  7. 11. The physical elements of a computer system
  8. 12. Protected Health Information acronym
  9. 14. A person or persons responsible for supervising people or work.
  10. 15. Interference, including the absence of technology, with the ability to continue critical operations and processes and/or to conduct business as usual.
Down
  1. 1. All data collected, created, processed, stored, used, or transmitted in any media or form, whether electronic or non-electronic.
  2. 4. Measures to protect against destruction, loss, or damage of customer information due to potential environmental hazards, such as fire and water damage or technological failures.
  3. 6. ____ is compromised of 60 standards
  4. 10. _____ implements standards to protect Protected Health Information (PHI).
  5. 12. A Credential established by a sequence of characters used as a secret key for
  6. 13. The set of characteristics by which a Person is definitively recognizable or known.
  7. 16. A piece of Software intended to update an electronic Information Resource.