Browse HIT - REG
-
- HIT - Health IT (information technology) is the area of IT involving the desi...
- HITECH Act - The Health Information Technology for Economic and Clinic...
- HITECH Act (Health Information Technology for E...
- HITSP - HITSP (Healthcare Information Technology Standards Panel) is an org...
- hold orders - Litigation hold is a stipulation requiring a company to...
- Hosted CRM - Hosted CRM is an arrangement in which a company outsource...
- IAM - Integrated access management (IAM) is a combination of business process...
- ICD-9-CM - The International Classification of Diseases, Ninth Revision,...
- ICD-9-CM (International Classification of Disea...
- ICO - The Information Commissioner's Office (ICO) is an independent authority...
- ideation management - Ideation management refers to creating,...
- impact-based advertising - What is impact-based advertis...
- implicit data - Implicit data is information that is not provided i...
- inbound call - An inbound call is one that a customer initiates to a...
- Information Commissioner's Office - The Informa...
- Information Commissioner's Office (ICO)
- integrated access management - Integrated access man...
- integrated access management (IAM) - Integrate...
- intelligent video - Intelligent video is digital video technolo...
- internal cloud - Private cloud (also called internal cloud) is a m...
- International Classification of Diseases 9
- ISO/IEC 38500 - ISO/IEC 38500 is an international standard created ...
- KBA - Knowledge-based authentication (KBA) is an authentication scheme where ...
- key value pair - A key-value pair (KVP) is a set of two linked dat...
- key-value pair - A key-value pair (KVP) is a set of two linked dat...
- key-value pair (KVP) - A key-value pair (KVP) is a set of tw...
- knowledge based authentication - Knowledge-based a...
- knowledge process outsourcing - Knowledge process o...
- knowledge process outsourcing (KPO) - Knowled...
- knowledge-based authentication - Knowledge-based a...
- knowledge-based authentication (KBA) - Knowl...
- KPO - Knowledge process outsourcing (KPO) is the allocation of relatively hig...
- KVP - A key-value pair (KVP) is a set of two linked data items: a key, which ...
- lead - A lead is a potential sales contact -- an individual or organization ...
- lead generator - A lead generator is any marketing-related activit...
- Learn IT: Defeating Spam in the Enterprise
- legal health record - A legal health record is the record of ...
- LevelUp - LevelUp is a mobile payment (m-payment) and rewards service for...
- litigation hold - Litigation hold is a stipulation requiring a co...
- litigation hold (preservation orders or hold or...
- longitudinal study - A longitudinal study is an observational ...
- loyalty card program - A loyalty card program is an incentiv...
- loyalty punch card - A loyalty punch card is a token that lets...
- malvertizement - A malvertizement is malicious coding served throu...
- man in the middle - A man-in-the-middle (MitM) attack is an exp...
- man in the middle attack - A man-in-the-middle (MitM) at...
- man-in-the-middle - A man-in-the-middle (MitM) attack is an exp...
- man-in-the-middle (MitM) attack - A man-in-the-mi...
- man-in-the-middle attack - A man-in-the-middle (MitM) at...
- managed file transfer - What is managed file transfer (MFT)...
- managed file transfer (MFT) - What is managed file tr...
- market segmentation - Customer segmentation is the practice o...
- Massachusetts data protection law - What is the...
- MFT - What is managed file transfer (MFT)?Managed file transfer (MFT) is a ty...
- micropayment - A micropayment is an e-commerce transaction involving...
- Microsoft System Center - Microsoft System Center is a su...
- mitm - A man-in-the-middle (MitM) attack is an exploit in which an intruder ...
- MitM - Active man-in-the-middle (MitM) is an attack method that allows an in...
- MitM attack - A man-in-the-middle (MitM) attack is an exploit in whic...
- NASSCOM - The National Association of Software and Services Companies (NA...
- NASSCOM (National Association of Software and S...
- National Association of Software and Services C...
- National eGovernance Service Delivery Gateway
- National eGovernance Service Delivery Gateway (...
- National Health Service - The National Health Service (NH...
- National Health Service (NHS) - The National Health...
- NHS - The National Health Service (NHS) is the publicly funded national healt...
- NSDG - National eGovernance Service Delivery Gateway (NSDG) is a mission mod...
- Online Customer Privacy - Consumer privacy, also known as...
- order management - Order management is the administration of bus...
- PAN truncation - PAN (primary account number) truncation is a tech...
- PAN truncation (primary account number)
- partner portal - A partner portal is a Web-based application that ...
- Personal Data Privacy - Consumer privacy, also known as cus...
- personal health information - Personal health informa...
- personal health information (PHI) - Personal he...
- personal health record - A personal health record (PHR) is...
- personal health record (PHR) - A personal health rec...
- personally identifiable financial information
- personally identifiable financial information (...
- personally identifiable information - Persona...
- personally identifiable information (PII)
- PHI - Personal health information (PHI), also referred to as protected health...
- PHR - A personal health record (PHR) is a collection of health-related inform...
- PIFI - Personally identifiable financial information (PIFI) is any type of p...
- PII - Personally identifiable information (PII) is any data about an individu...
- predictive analytics - Predictive analytics is the branch of...
- predictive model - In customer relationship management (CRM), pr...
- predictive modeling - In customer relationship management (CR...
- predictor - Predictive analytics is the branch of data mining concerned...
- preservation orders - Litigation hold is a stipulation requir...
- primary account number - PAN (primary account number) trun...
- primary account number truncation - PAN (primar...
- private cloud - Private cloud (also called internal cloud) is a mar...
- private cloud (internal cloud or corporate cloud)
- privilege bracketing - Privilege bracketing is the practice ...
- QSA - A Qualified Security Assessor (QSA) is a person who has been certified ...
- Qualified Security Assessor - A Qualified Security As...
- Qualified Security Assessor (QSA) - A Qualified...
- RDC - Remote deposit capture (RDC) is a system that allows a customer to scan...
- Real-time CRM Analytics - CRM (customer relationship mana...
- registered health information technician
- registered health information technician (RHIT)