Browse SHR - XCC
-
- shrink wrap license - A shrink wrap license is an end user ag...
- SIM - Security information management (SIM) is the practice of collecting, mo...
- SNOMED CT - SNOMED CT (Systematized Nomenclature of Medicine -- Clinica...
- SNOMED CT (Systematized Nomenclature of Medicin...
- Soc 1 - A Service Organization Control 1 or Soc 1 (pronounced "sock one") r...
- Soc 1 (Service Organization Control 1)
- Soc 2 - A Service Organization Control 2 (Soc 2) reports on various organiz...
- Soc 2 (Service Organization Control 2)
- Soc 3 - A Service Organization Control 3 (Soc 3) report outlines informatio...
- Soc 3 (Service Organization Control 3)
- softlifting - Softlifting is a common type of software piracy in whic...
- SOPA and PIPA - The Stop Online Piracy Act (SOPA), also known as Ho...
- SOX - The Sarbanes-Oxley Act of 2002 (often shortened to SOX) is legislation ...
- SOX Section 404 - SOX Section 404 (Sarbanes-Oxley Act Section 404...
- SOX Section 404 (Sarbanes-Oxley Act Section 404)
- spoliation - Spoliation is the destruction, alteration, or mutilation ...
- SRE - A serious reportable event (SRE) is an incident involving death or seri...
- SRM - Sustainability risk management (SRM) is a business strategy that aligns...
- SSAE 16 - SSAE 16, also called Statement on Standards for Attestation Eng...
- statutory reporting - Statutory reporting is the mandatory su...
- Stop Online Piracy Act (SOPA) and PIPA
- Stop Online Piracy Act and PIPA - The Stop Online...
- subpoena - A subpoena is a command issued by a court in which a person o...
- Super DMCA - The Digital Millennium Copyright Act (DMCA) is a controve...
- sustainability risk management - Sustainability ri...
- sustainability risk management (SRM) - Susta...
- SWIFT FIN message - SWIFT FIN is a message type (MT) that trans...
- Systematized Nomenclature of Medicine -- Clinic...
- Systematized Nomenclature of Medicine Clinical ...
- The Computer Fraud and Abuse Act - The Computer ...
- the Indian Computer Emergency Response Team
- TIC - Trusted Internet Connections (TIC) is a mandate from the Office of Mana...
- tokenization - Tokenization is the process of replacing sensitive da...
- Top searches of 2008 - What were people searching the WhatIs...
- triple bottom line - The triple bottom line (3BL) is an expand...
- triple bottom line (3BL) - The triple bottom line (3BL) ...
- Trusted Internet Connections - Trusted Internet Conn...
- Trusted Internet Connections (TIC) - Trusted I...
- U.K. Data Protection Act 1998 (DPA 1998)
- UK Data Protection Act 1998 - The Data Protection Act...
- United Kingdom Climate Change Act - The United ...
- USA Patriot Act - The Patriot Act was enacted by the U.S. Congres...
- USAPA - The Patriot Act was enacted by the U.S. Congress on October 26, 200...
- Video Privacy Protection Act of 1988 - The V...
- Volcker rule - The Volcker rule is a section of the Dodd–Frank Act t...
- WGA - Windows Genuine Advantage (WGA) is a program that investigates Windows ...
- whistleblower - A whistleblower is a person who voluntarily provide...
- Windows Genuine Advantage - Windows Genuine Advantage (...
- Windows Genuine Advantage (WGA) - Windows Genuine...
- XCCDF - XCCDF (Extensible Configuration Checklist Description Format) is a ...
- XCCDF (Extensible Configuration Checklist Descr...