3. Glossary
- AFT-BFL
After Body Fluid Exposure Risk After Body Fluid Exposure Risk
- AFT-PAT
After Patient Contact
- AFT-PAT/ENV
After Patient/Patient environment Contact
- AFT-TPS
After Contact with Patient Surroundings
- Audit Session
Is a group of observations completed by an auditor in a single patient care area that were completed in one “sitting”
- BEF-ASP
Before Aseptic Procedure Before Aseptic Task
- BEF-PAT
Before Patient Contact
- BEF-PAT/ENV
Before Initial Patient / Patient Environment Contact
- Firewall
A firewall is a device or set of devices designed to permit or deny network transmissions based on a set of rules and is frequently used to protect networks from unauthorized access while permitting legitimate communications to pass.
- HCP
Health Care Professional
- HCW
Health Care Worker
- Indicator
See moment
- MoHLTC
Ministry of Health and Long Term Care
- Moment
For facilities following the “Just Clean Your Hands” program
Moment 1 : BEF-PAT/ENVMoment 2 : BEF-ASPMoment 3 : AFT-BFLMoment 4 : AFT-PAT/ENVFor facilities and organizations following the WHO guidelines
Moment 1 : BEF-PATMoment 2 : BEF-ASPMoment 3 : AFT-BFLMoment 4 : AFT -PATMoment 5 : AFT-ATS- NTP
Network Time Protocol
- Observation
An auditor observing a Health Care Professional or Health Care Worker performing an hand hygiene event.
- Opportunity
See Moment
- PHO
Public Health Ontario
- POP
Post Office Protocol - Email
- Ports
in computer networking a port is an application-specific or process-specific software construct serving as a communications endpoint in a computer’s host operating system. A port is associated with an IP address of the host, as well as the type of protocol used for communication. The protocols that primarily use the ports are the Transport Layer protocols, such as the Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP) of the Internet Protocol Suite. A port is identified for each address and protocol by a 16-bit number, commonly known as the port number. The port number completes the destination address for a communications session. Thus, different IP addresses or protocols may use the same port number for communication, e.g. on a given host or interface UDP and TCP may use the same port number, or on a host with two interfaces, both addresses are associated with a port having the same number.
- RSA
RSA is an algorithm for public-key cryptography that is based on the presumed difficulty of factoring large integers, the factoring problem. RSA stands for Ron Rivest, Adi Shamir and Leonard Adleman, who first publicly described the algorithm in 1977. Clifford Cocks, an English mathematician, had developed an equivalent system in 1973, but it wasn’t declassified until 1997.
- RSS
RSS (Rich Site Summary); originally RDF Site Summary; often dubbed Really Simple Syndication, uses a family of standard web feed formats to publish frequently updated information: blog entries, news headlines, audio, video. An RSS document (called “feed”, “web feed”, or “channel”) includes full or summarized text, and metadata, like publishing date and author’s name. RSS feeds enable publishers to syndicate data automatically. A standard XML file format ensures compatibility with many different machines/programs. RSS feeds also benefit users who want to receive timely updates from favourite websites or to aggregate data from many sites. Subscribing to a website RSS removes the need for the user to manually check the web site for new content. Instead, their browser constantly monitors the site and informs the user of any updates. The browser can also be commanded to automatically download the new data for the user. Software termed “RSS reader”, “aggregator”, or “feed reader”, which can be web-based, desktop-based, or mobile-device-based, present RSS feed data to users. Users subscribe to feeds either by entering a feed’s URI into the reader or by clicking on the browser’s feed icon. The RSS reader checks the user’s feeds regularly for new information and can automatically download it, if that function is enabled. The reader also provides a user interface.
- Services
A network service is a service hosted on a computer network. Network services provide some functionality for members or users of the network. Services are usually based on a defined service protocol. Network services are hosted by servers to provide shared resources to client computers. The service software is often referred to as a port, daemon, or listener. A specific kind of service is often mapped to a specific port number for the underlying transmission protocol (e.g. Internet Protocol, Transmission Control Protocol, User Datagram Protocol). An examples of a network services would include Domain Name System (DNS), DHCP, NetBIOS, and HTTP.
- SMTP
Simple Mail Transfer Protocol -Email
- SNMP
Simple Network Monitoring Protocol
- SSL
SSL stands for “Secure Sockets Layer”. SSL Definition; Secure Sockets Layer is a protocol designed to enable applications to transmit information back and forth securely. Applications that use the Secure Sockets Layer protocol inherently know how to give and receive encryption keys with other applications, as well as how to encrypt and decrypt data sent between the two.
- TCP
The Transmission Control Protocol (TCP) is one of the core protocols of the Internet Protocol Suite. TCP is one of the two original components of the suite, complementing the Internet Protocol (IP), and therefore the entire suite is commonly referred to as TCP/IP. TCP provides reliable, ordered delivery of a stream of bytes from a program on one computer to another program on another computer. TCP is the protocol used by major Internet applications such as the World Wide Web, email, remote administration and file transfer. Other applications, which do not require reliable data stream service, may use the User Datagram Protocol (UDP), which provides a datagram service that emphasizes reduced latency over reliability.
- TLS
Transport Layer Security (TLS) is a cryptographic protocol designed to provide communications security over a computer network, such as the Internet. The protocol is widely used in applications such as email, instant messaging, and voice over IP, but its use in securing HTTPS remains the most publicly visible. The TLS protocol aims primarily to provide security, including privacy (confidentiality), integrity, and authenticity through the use of cryptography, such as the use of certificates, between two or more communicating computer applications. It runs in the presentation layer and is itself composed of two layers: the TLS record and the TLS handshake protocols. The closely related Datagram Transport Layer Security (DTLS) is a communications protocol that provides security to datagram-based applications. In technical writing, references to “(D)TLS” are often seen when it applies to both versions.[1] TLS is a proposed Internet Engineering Task Force (IETF) standard, first defined in 1999, and the current version is TLS 1.3, defined in August 2018. TLS builds on the now-deprecated SSL (Secure Sockets Layer) specifications (1994, 1995, 1996) developed by Netscape Communications for adding the HTTPS protocol to their Netscape Navigator web browser.
- UDP
The User Datagram Protocol (UDP) is one of the core members of the Internet Protocol Suite, the set of network protocols used for the Internet. With UDP, computer applications can send messages, in this case referred to as datagrams, to other hosts on an Internet Protocol (IP) network without requiring prior communications to set up special transmission channels or data paths. The protocol was designed by David P. Reed in 1980 and formally defined in RFC 768. UDP uses a simple transmission model without implicit handshaking dialogues for providing reliability, ordering, or data integrity. Thus, UDP provides an unreliable service and datagrams may arrive out of order, appear duplicated, or go missing without notice. UDP assumes that error checking and correction is either not necessary or performed in the application, avoiding the overhead of such processing at the network interface level. Time-sensitive applications often use UDP because dropping packets is preferable to waiting for delayed packets, which may not be an option in a real-time system.[1] If error correction facilities are needed at the network interface level, an application may use the Transmission Control Protocol (TCP) or Stream Control Transmission Protocol (SCTP) which are designed for this purpose. UDP’s stateless nature is also useful for servers answering small queries from huge numbers of clients. Domain Name System (DNS), streaming media applications such as IPTV, Voice over IP (VoIP), Trivial File Transfer Protocol (TFTP), IP tunneling protocols and many online games.
- WHO
World Health Organization
- XML
Extensible Markup Language (XML) is a markup language that defines a set of rules for encoding documents in a format that is both human-readable and machine-readable.