Browse Definitions :
Definition

corporate business glossary

Contributor(s): Matthew Haughn

A corporate business glossary is a collection of terms commonly used within a business, along with standard definitions specific to the industry and organization.

Pinning down the meanings of terms within the organization helps to clarify communications involving topics that employees discuss most and minimizes the risk of misinterpretation and error. Clearer information and the ability to link terms to company assets promotes a sharing and collaborative environment, enables better data governance and better supports regulatory compliance efforts with business standards such as Basel II.

With consensus on how terms are used, the standardized terms and definitions also facilitate access to comprehensively categorized bodies of information. A corporate business glossary makes it possible to share new findings where needed and to search existing knowledge more effectively through tagging. Reliably finding information on a topic helps ensure that the best data and assets are available and used consistently.

Beyond tagging and reference, terms are often linked within documents for quick reference. Linking terms to assets makes it possible to click through to the project teams working on related projects. That interdepartmental transparency improves accountability and enables quick contact to inquire about specific projects. Glossaries support the annotations and notes of teams, improving communication between team members and promoting better productivity and innovation.

This was last updated in October 2017

Continue Reading About corporate business glossary

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance framework

    A compliance framework is a structured set of guidelines that details an organization's processes for maintaining accordance with...

SearchSecurity

  • Trojan horse (computing)

    In computing, a Trojan horse is a program downloaded and installed on a computer that appears harmless, but is, in fact, ...

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

  • DNS over HTTPS (DoH)

    DNS over HTTPS (DoH) is a relatively new protocol that encrypts domain name system traffic by passing DNS queries through a ...

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification and is used in internally mounted ...

  • kilobyte (KB or Kbyte)

    A kilobyte (KB or Kbyte) is a unit of measurement for computer memory or data storage used by mathematics and computer science ...

  • virtual memory

    Virtual memory is a memory management capability of an operating system (OS) that uses hardware and software to allow a computer ...

Close