Browse Definitions:

SearchCompliance

SearchCompliance.com's editorial staff, along with leading industry experts, provide unbiased original daily news, expert tips, discussion forums, webcasts and customized research that will help you develop, design and implement compliance initiatives.

View the complete archive of Compliance Management news, research and expert advice.

Go to:  SearchCompliance

Recently on  SearchCompliance

Government, business cybersecurity cooperation still faces roadblocks

Panelists speaking at a session titled Right Hand, Left Hand: Transparency, Communication and Conflict at the recent Cambridge Cyber Summit agreed that the government and private industry must ...

More Highlights
Definitions
  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine how well it conforms to a set of specific criteria.

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if it occurs: loss.

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

Browse Compliance Topics

Regulatory compliance needs

Find the latest information, news and resources that CIOs and other IT professionals use to asses regulatory compliance needs. Learn which compliance regulations apply to which industries, including which systems are affected.

Recent Definitions

  • Data Protection Bill 2017

    The Data Protection Bill 2017 is legislation that will replace the Data Protection Act of 1998. It is designed to balance the privacy needs of United Kingdom (UK) and European Union (EU) citizens with the interests of business.

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if it occurs: loss.

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

Highlights

More Regulatory compliance needs Topics

Back to Top

Compliance software and solutions

As compliance has become a priority for organizations of all sizes, the regulatory compliance software and solutions market has grown to meet the increasing need. Learn more about evaluating compliance software and solutions with news, advice and other resources related to policy, content and document management software; financial and accounting tools; and log management software.

Recent Definitions

  • going dark

    Going dark describes a scenario in which communication appears to have ceased, but in reality has just moved from a public communication channel to a private, encrypted channel.

  • RegTech

    RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of regulatory compliance.

  • predictive coding

    Predictive coding software can be used to automate portions of an e-discovery document review. The goal of predictive coding is to reduce the number of irrelevant and non-responsive documents that need to be reviewed manually.

Highlights

More Compliance software and solutions Topics

Back to Top

Managing compliance

Compliance has become part of the day-to-day operations at many organizations. Learn about the various aspects of managing compliance operations at your company, with news, advice and best practices related to managing compliance teams, handling compliance reporting, automating processes, responding to audits and more.

Recent Definitions

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine how well it conforms to a set of specific criteria.

  • forensic image

    A forensic image (forensic copy) is a bit-by-bit, sector-by-sector direct copy of a physical storage device, including all files, folders and unallocated, free and slack space.

  • trademark

    A trademark is a logo, image, symbol, word(s), letter(s) or color(s) that is used and sometimes legally registered as a representation of a company.

Highlights

More Managing compliance Topics

Back to Top

-ADS BY GOOGLE

SearchCompliance

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • phishing

    Phishing is a form of fraud in which an attacker masquerades as a reputable entity or person in email or other communication ...

  • vulnerability disclosure

    Vulnerability disclosure is the practice of publishing information about a computer security problem, and a type of policy that ...

  • incident response

    Incident response is an organized approach to addressing and managing the aftermath of a security breach or cyberattack, also ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

  • flash memory

    Flash memory, also known as flash storage, is a type of nonvolatile memory that erases data in units called blocks.

  • NAND flash memory

    NAND flash memory is a type of nonvolatile storage technology that does not require power to retain data.

  • NOR flash memory

    NOR flash memory is one of two types of nonvolatile storage technologies.

SearchSolidStateStorage

  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close