Browse Definitions:

SearchCompliance

SearchCompliance.com's editorial staff, along with leading industry experts, provide unbiased original daily news, expert tips, discussion forums, webcasts and customized research that will help you develop, design and implement compliance initiatives.

View the complete archive of Compliance Management news, research and expert advice.

Go to:  SearchCompliance

Recently on  SearchCompliance

IT Priorities 2017 survey: Compliance initiatives in full throttle

Regulatory compliance initiatives remain at the top of GRC professionals' lists of priorities this year, according to TechTarget's annual IT Priorities survey.

More Highlights
Definitions
  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • audit program (audit plan)

    An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate that an organization is in conformance with compliance regulations.

  • PCI DSS compliance (Payment Card Industry Data Security Standard compliance)

    Payment Card Industry Data Security Standard (PCI DSS) compliance is adherence to the set of policies and procedures developed to protect credit, debit and cash card transactions and prevent the misuse of cardholders' personal information.

Browse Compliance Topics

Regulatory compliance needs

Find the latest information, news and resources that CIOs and other IT professionals use to asses regulatory compliance needs. Learn which compliance regulations apply to which industries, including which systems are affected.

Recent Definitions

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • Initiative for a Competitive Online Marketplace (ICOMP)

    Initiative for a Competitive Online Marketplace (ICOMP) is a Microsoft-sponsored lobbying organization for companies and organizations that engage in online business.

  • end-to-end principle

    The end-to-end principle is a network design method in which application-specific features are kept at communication end points.

Highlights

More Regulatory compliance needs Topics

Back to Top

Compliance software and solutions

As compliance has become a priority for organizations of all sizes, the regulatory compliance software and solutions market has grown to meet the increasing need. Learn more about evaluating compliance software and solutions with news, advice and other resources related to policy, content and document management software; financial and accounting tools; and log management software.

Recent Definitions

  • RegTech

    RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of regulatory compliance.

  • going dark

    Going dark describes a scenario in which communication appears to have ceased, but in reality has just moved from a public communication channel to a private, encrypted channel.

  • predictive coding

    Predictive coding software can be used to automate portions of an e-discovery document review. The goal of predictive coding is to reduce the number of irrelevant and non-responsive documents that need to be reviewed manually.

Highlights

More Compliance software and solutions Topics

Back to Top

Managing compliance

Compliance has become part of the day-to-day operations at many organizations. Learn about the various aspects of managing compliance operations at your company, with news, advice and best practices related to managing compliance teams, handling compliance reporting, automating processes, responding to audits and more.

Recent Definitions

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • audit program (audit plan)

    An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate that an organization is in conformance with compliance regulations.

  • PCI DSS compliance (Payment Card Industry Data Security Standard compliance)

    Payment Card Industry Data Security Standard (PCI DSS) compliance is adherence to the set of policies and procedures developed to protect credit, debit and cash card transactions and prevent the misuse of cardholders' personal information.

Highlights

More Managing compliance Topics

Back to Top

-ADS BY GOOGLE

SearchCompliance

SearchSecurity

  • black hat

    Black hat refers to a hacker who breaks into a computer system or network with malicious intent.

  • copyright

    Copyright is a legal term describing ownership of control of the rights to the use and distribution of certain works of creative ...

  • keylogger (keystroke logger or system monitor)

    A keylogger, sometimes called a keystroke logger or system monitor, is a type of surveillance technology used to monitor and ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

  • mass notification system (MNS)

    A mass notification system is a platform that sends one-way messages to inform employees and the public of an emergency.

SearchStorage

  • open source storage

    Open source storage is data storage software developed in a public, collaborative manner that permits the free use, distribution ...

  • CompactFlash card (CF card)

    A CompactFlash card (CF card) is a memory card format developed by SanDisk in 1994 that uses flash memory technology to store ...

  • email archiving

    Email archiving (also spelled e-mail archiving) is a systematic approach to saving and protecting the data contained in email ...

SearchSolidStateStorage

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close