Week One Learning

Terms - Matching

Terms

Confidentiality
Integrity
Availability
Risk-Based Management
Supply Chain Security
Third-Party Risk
GDPR
HIPAA
Contractual Obligations
Evidence Preservation
Chain of Custody
Administrative Investigations
Criminal Investigations
Civil Investigations
Regulatory Investigations
Drop Term Here
Waiting for term and definition...
Drop Definition Here

Definitions

Ensuring that information is accessible only to those authorized to have access.
Maintaining the accuracy and completeness of data and systems.
Ensuring that authorized users have access to information and systems when needed.
A decision-making approach that considers risk when allocating resources and selecting strategies.
Safeguarding supply chain components and vendors to prevent compromise.
Potential threats from vendors, partners, or service providers.
A European privacy regulation governing data protection and individual rights.
A U.S. law ensuring healthcare data privacy and security.
Requirements agreed to by contract, including SLAs and data handling clauses.
Maintaining the integrity of data that may be used in legal proceedings.
The documented process for handling and securing evidence from collection through presentation.
Internal reviews often involving policy violations or employee misconduct.
Investigations intended to determine violations of law.
Investigations to resolve non-criminal disputes, such as business or personal conflicts.
Investigations by a government or industry body to ensure compliance.
Process / Lifecycle Flows

Process Flow Challenge Tool

Drag from Element Pool
Build the Correct Flow

This is a placeholder for helpful tips, definitions, or additional reading related to each step in the process. You can populate this area dynamically based on what the user is working on or keep it static with foundational concepts and reminders.

  • Tips on best practices
  • Key terms glossary
  • Examples from real-world scenarios
Flashcards