Glossary of Compliance

Compliance Glossary

Our list of curated compliance glossary offers everything you to know about compliance in one place.

Glossary » HIPAA » Limited Data Set

Limited Data Set

A limited data set is detailed as health information that excludes certain listed direct identifiers but that may include city;  ZIP Code; state; elements of date; telephone numbers, fax numbers and other characteristics, numbers, or codes not listed as direct identifiers.

The direct identifiers defined in the Privacy Rule’s limited data lays down provisions that apply both to information about the individual as well as to information about the individual’s employers, relatives, or household members. The following list of identifiers must be deleted from health information if the data is to be permitted as a limited data set:

– Medical record numbers

– Names

– Postal address information

– Electronic mail addresses

– Social security numbers

– Certificate/license numbers

– Health plan beneficiary numbers

– Account numbers

– Telephone numbers

– Fax numbers

– Vehicle serial numbers and identifiers, including license plate numbers.

– Biometric identifiers, including fingerprints and voiceprints.

– Device identifiers and serial numbers

– Web universal resource locators (URLs)

– Full-face photographic images and any comparable images

– Internet protocol (I.P.) address numbers

Additional reading

ERM software

Top 10 ERM Software: Compare Features, Pros, and Cons

Back in August 2021, fast food giant KFC failed to meet their meat demands and had to take down menu items due to supply chain disruptions. In 2018, they shut down 900 UK outlets after delivery issues – all due to poor risk visibility. While such incidents cannot be fully avoided, it can be minimized…
SOC 2 Trust Principles

A Beginner’s Guide to the SOC 2 Trust Principles

One of the first decisions you would make after deciding to get SOC 2 compliant is selecting the SOC 2 Trust Service Principles for your audit. The SOC 2 Principles, also called the Trust Services Criteria, form the foundation on which the entire scope, process, and audit of the framework is built. It is, therefore,…
ISO 27001 Requirements

ISO 27001 Requirements – A Comprehensive List

Compliance with ISO 27001 requires familiarity with the standard, diligent planning, and committed implementation. To facilitate the process, you need to fulfill the necessary ISO 27001 certification requirements. The ISO 27001 requirements guide discusses the ISMS policies and procedures you must implement to demonstrate compliance with the clauses (4-10) listed in the ISO 27001 compliance…

Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.