Browse Definitions :
Definition

Americans with Disabilities Act (ADA) compliance

Americans with Disabilities Act (ADA) compliance is adherence to the standards put forth forth in the United States legislation.

The ADA mandates accessibility for disabled persons and applies to all public businesses and entities that provide “places of public accommodation.” The Act includes the Internet in “places of public accommodation.” Access to information and information technology (IT) are therefore covered by the act.

The ADA was originally signed into law by George H.W. Bush in July 26, 1990. The Act is one of the most comprehensive pieces of legislation put forth in the U.S. The ADA ensures persons with physical or mental disabilities have accessibility to mainstream American life including employment opportunities, the ability to purchase goods and services and the ability to participate in State and local government programs and services free from discrimination. The Act is modeled on the Civil Rights Act of 1964, which was designed to ensure freedom from discrimination due to race, skin color, religion or national origin. ADA also includes elements of the Rehabilitation Act of 1973. 

While most commonly applied to the real world, the Act also applies to IT and the internet. ADA may apply to individual websites although specific regulations have not yet been created. After an accessibility case involving Netflix, the Act was revised in 2010. A statement was released regarding individual sites: "The Department is currently developing regulations specifically addressing the accessibility of goods and services offered via the web by entities covered by the ADA. The fact that the regulatory process is not yet complete in no way indicates that web services are not already covered by title III." — Statement of Interest of the United States Department of Justice in NAD v. Netflix (page 10)

This was last updated in December 2017

Continue Reading About Americans with Disabilities Act (ADA) compliance

SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • DOS (disk operating system)

    A DOS, or disk operating system, is an operating system that runs from a disk drive. The term can also refer to a particular ...

  • private key

    A private key, also known as a secret key, is a variable in cryptography that is used with an algorithm to encrypt and decrypt ...

  • security token

    A security token is a physical or digital device that provides two-factor authentication for a user to prove their identity in a ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • What is RAID 6?

    RAID 6, also known as double-parity RAID, uses two parity stripes on each disk. It allows for two disk failures within the RAID ...

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

  • VRAM (video RAM)

    VRAM (video RAM) refers to any type of random access memory (RAM) specifically used to store image data for a computer display.

Close