Glossary of Compliance

Compliance Glossary

Our list of curated compliance glossary offers everything you to know about compliance in one place.

Glossary » HIPAA » Limited Data Set

Limited Data Set

A limited data set is detailed as health information that excludes certain listed direct identifiers but that may include city;  ZIP Code; state; elements of date; telephone numbers, fax numbers and other characteristics, numbers, or codes not listed as direct identifiers.

The direct identifiers defined in the Privacy Rule’s limited data lays down provisions that apply both to information about the individual as well as to information about the individual’s employers, relatives, or household members. The following list of identifiers must be deleted from health information if the data is to be permitted as a limited data set:

– Medical record numbers

– Names

– Postal address information

– Electronic mail addresses

– Social security numbers

– Certificate/license numbers

– Health plan beneficiary numbers

– Account numbers

– Telephone numbers

– Fax numbers

– Vehicle serial numbers and identifiers, including license plate numbers.

– Biometric identifiers, including fingerprints and voiceprints.

– Device identifiers and serial numbers

– Web universal resource locators (URLs)

– Full-face photographic images and any comparable images

– Internet protocol (I.P.) address numbers

Additional reading

SOC 2 type 2

How to get SOC 2 Type 2 Certification

Getting a SOC 2 type 2 certification is critical to building trust and demonstrating to your customers that you take data security and protection seriously. While there isn’t any legal obligation to comply with SOC 2, getting your organization SOC 2 attested has many advantages.  For one, it helps you stand out and removes friction…
SOC 2 Change management

Change Management for SOC 2: AICPA Guidelines

If your organization’s SOC 2 audit is around the corner, everyone in your team has surely worked hard to get that SOC 2 certificate. A ton of effort went into ensuring that the organization is demonstrating compliance for applicable Trust Service Criteria (TSC).  In your SOC 2 journey, are you ready to demonstrate evidence for…
how to prepare for soc 2 audit

How To Prepare For SOC 2 Audit

We’ve all been there: You hear from a business partner or customer that you need to pass a SOC 2 audit, and your mind races. How do you create an environment where the auditors feel confident in your security protocols?  So, how to prepare for SOC 2 audit? What steps can you take to ensure…

Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.