As used in this article:

Ask a business law question, get an answer ASAP!
Thousands of highly rated, verified business lawyers.
Click here to chat with a lawyer about your rights.

Terms Used In West Virginia Code 5A-6B-2

  • Assets: (1) The property comprising the estate of a deceased person, or (2) the property in a trust account.
  • Information custodian: means a department, agency or person that has the actual custody of, or is responsible for the accountability for a set of data assets. See West Virginia Code 5A-6B-2
  • Security controls: means safeguards or countermeasures to avoid, detect, counteract or minimize security risks to physical property, information, computer systems or other assets. See West Virginia Code 5A-6B-2
  • State: when applied to a part of the United States and not restricted by the context, includes the District of Columbia and the several territories, and the words "United States" also include the said district and territories. See West Virginia Code 2-2-10

“Cybersecurity framework” means computer technology security guidance for organizations to assess and improve their ability to prevent, detect, and respond to cyber incidents.

“Cyber incident” means any event that threatens the security, confidentiality, integrity, or availability of information assets, information systems, or the networks that deliver the information.

“Cyber risk assessment” means the process of identifying, analyzing and evaluating risk and applying the appropriate security controls relevant to the information custodians.

“Cyber risk management service” means technologies, practices and policies that address threats and vulnerabilities in networks, computers, programs and data, flowing from or enabled by connection to digital infrastructure, information systems or industrial control systems, including, but not limited to, information security, supply chain assurance, information assistance and hardware or software assurance.

“Enterprise” means the collective departments, agencies and boards within state government that provide services to citizens and other state entities.

“Information custodian” means a department, agency or person that has the actual custody of, or is responsible for the accountability for a set of data assets.

“Plan of action and milestones” means a remedial plan, or the process of accepting or resolving risk, which helps the information custodian to identify and assess information system security and privacy weaknesses, set priorities and monitor progress toward mitigating the weaknesses.

“Privacy impact assessment” means a procedure or tool for identifying and assessing privacy risks throughout the development life cycle of a program or system.

“Security controls” means safeguards or countermeasures to avoid, detect, counteract or minimize security risks to physical property, information, computer systems or other assets.