Browse Definitions:

Americans with Disabilities Act (ADA) compliance

Contributor(s): Matthew Haughn

Americans with Disabilities Act (ADA) compliance is adherence to the standards put forth forth in the United States legislation.

The ADA mandates accessibility for disabled persons and applies to all public businesses and entities that provide “places of public accommodation.” The Act includes the internet in “places of public accommodation.” Access to information and information technology (IT) are therefore covered by the act.

The ADA was originally signed into law by George H.W. Bush in July 26, 1990. The Act is one of the most comprehensive pieces of legislation put forth in the U.S. The ADA ensures persons with physical or mental disabilities have accessibility to mainstream American life including employment opportunities, the ability to purchase goods and services and the ability to participate in State and local government programs and services free from discrimination. The Act is modeled on the Civil Rights Act of 1964, which was designed to ensure freedom from discrimination due to race, skin color, religion or national origin. ADA also includes elements of the Rehabilitation Act of 1973. 

While most commonly applied to the real world, the Act also applies to IT and the internet. ADA may apply to individual websites although specific regulations have not yet been created. After an accessibility case involving Netflix, the Act was revised in 2010. A statement was released regarding individual sites: "The Department is currently developing regulations specifically addressing the accessibility of goods and services offered via the web by entities covered by the ADA. The fact that the regulatory process is not yet complete in no way indicates that web services are not already covered by title III." — Statement of Interest of the United States Department of Justice in NAD v. Netflix (page 10)

This was last updated in December 2017

Continue Reading About Americans with Disabilities Act (ADA) compliance

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.


File Extensions and File Formats

Powered by:


  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...


  • federated identity management (FIM)

    Federated identity management (FIM) is an arrangement that can be made among multiple enterprises to let subscribers use the same...

  • cross-site scripting (XSS)

    Cross-site scripting (XSS) is a type of injection security attack in which an attacker injects data, such as a malicious script, ...

  • firewall

    In computing, a firewall is software or firmware that enforces a set of rules about what data packets will be allowed to enter or...



  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...


  • all-flash array (AFA)

    An all-flash array (AFA), also known as a solid-state storage disk system, is an external storage array that uses only flash ...

  • volume manager

    A volume manager is software within an operating system (OS) that controls capacity allocation for storage arrays.

  • external storage device

    An external storage device, also referred to as auxiliary storage and secondary storage, is a device that contains all the ...


  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.