Browse Definitions :

Compliance, risk and governance

This glossary contains definitions related to compliance. Some definitions explain the meaning of words used in compliance regulations. Other definitions are related to the strategies that compliance officers use to mitigate risk and create a manageable compliance infrastructure.

ACC - DUE

  • access governance (AG) - Access governance (AG) is an aspect of information technology (IT) security management that seeks to reduce the risks associated with excessive access rights, inactive users and orphan accounts.
  • access recertification - Access recertification is an information technology (IT) control that involves auditing user access rights to determine if they are correct and adhere to the organization’s internal policies and compliance regulations.
  • Accessible Transportation Technologies Research Initiative (ATTRI) - The Accessible Transportation Technologies Research Initiative (ATTRI) is a five-year, multi-agency research and development (R&D) program aimed at helping injured veterans, older adults and others in the United States with visual, hearing, cognitive and mobility challenges to plan and execute their travel using technology.
  • accountability - Accountability means being held responsible or answerable for one's actions (or perhaps lack of action where one should have been taken).
  • accounting error - What is an accounting error?An accounting error is a non-fraudulent discrepancy in financial documentation.
  • agreed-upon procedures (AUP) - Agreed-upon procedures are the standards a company or client outlines when it hires an external party to perform an audit on specific tests or business process and then report on the results.
  • Allscripts - Allscripts is a vendor of electronic health record systems for physician practices, hospitals and healthcare systems.
  • alternative fuel vehicle (AFV) - An alternative fuel vehicle (AFV) is a vehicle that runs on substances other than the conventional petroleum gas and diesel.
  • Amazon Simple Storage Service (Amazon S3) - Amazon Simple Storage Service (Amazon S3) is a scalable, high-speed, web-based cloud storage service.
  • Americans with Disabilities Act (ADA) compliance - Americans with Disabilities Act (ADA) compliance is the adherence to the standards put forth forth in the United States legislation.
  • anti-competitive practice - An anti-competitive practice is an action conducted by one or more businesses to make it difficult or impossible for other companies to enter or succeed in their market.
  • antitrust - Antitrust is a group of laws established to regulate business practices in order to ensure that fair competition occurs in an open-market economy for the benefit of consumers.
  • audit log (AL) - An audit log is a document that records an event in an information (IT) technology system.
  • audit program (audit plan) - An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate that an organization is in conformance with compliance regulations.
  • Bank Secrecy Act (BSA) - The Bank Secrecy Act (BSA), also known as the Currency and Foreign Transactions Reporting Act, is legislation passed by the United States Congress in 1970 that requires U.
  • Basel Committee on Banking Supervision (BCBS) - The Basel Committee on Banking Supervision (BCBS) is a group of international banking authorities who work to strengthen the regulation, supervision and practices of banks and improve financial stability worldwide.
  • Better Business Bureau (BBB) - The Better Business Bureau (BBB) is a non-profit accreditor of ethical businesses.
  • blackout period - A blackout period is a duration of time when access to something usually available is prohibited.
  • BS 10012:2009 (British Standard 10012:2009) - British Standard 10012:2009 (BS 10012:2009) is a standard enacted by the U.
  • business continuity policy - Business continuity policy is the set of standards and guidelines an organization enforces to ensure resilience and proper risk management.
  • business sustainability - Business sustainability is the management and coordination of environmental, social and financial demands and concerns to ensure responsible, ethical and ongoing success.
  • Can Spam Act of 2003 - The Can Spam Act of 2003 is a commonly used name for the United States Federal law more formally known as S.
  • Canadian anti-spam legislation (CASL) - Canadian anti-spam legislation (CASL) is enacted regulations that require marketers and fundraisers that communicate through email, text messages or social media to obtain permission from recipients in that country.
  • Capex (capital expenditure) - A capital expenditure (Capex) is money invested by a company to acquire or upgrade fixed, physical, non-consumable assets, such as buildings and equipment or a new business.
  • cartel - A cartel is a body of independent producers that work together to decide production levels and prices.
  • CCHIT - Certification Commission for Healthcare Information Technology - The Certification Commission for Healthcare Information Technology (CCHIT) is an independent, not-for-profit group that certifies electronic health records (EHR) and networks for health information exchange (HIE) in the United States.
  • Center for Internet Security (CIS) - The Center for Internet Security (CIS) is a nonprofit organization focused on improving public- and private-sector cybersecurity readiness and response.
  • CERT-In (the Indian Computer Emergency Response Team) - CERT-In (the Indian Computer Emergency Response Team) is a government-mandated information technology (IT) security organization.
  • Certified in the Governance of Enterprise IT (CGEIT) - Certified in the Governance of Enterprise IT (CGEIT) is a vendor-neutral certification for experienced tech professionals looking to expand their knowledge and skills in enterprise information technology (IT) governance.
  • Certified Information Systems Auditor (CISA) - The Certified Information Systems Auditor (CISA) is a certification and globally recognized standard for appraising an IT auditor's knowledge, expertise and skill in assessing vulnerabilities and instituting IT controls in an enterprise environment.
  • Certified Information Systems Risk and Compliance Professional (CISRCP) - A Certified Information Systems Risk and Compliance Professional (CISRCP) is a person in the information technology (IT) field that has passed an examination on risk and compliance topics developed by the International Association of Risk and Compliance Professionals (IARCP).
  • chief data officer (CDO) - A chief data officer (CDO) is a C-level executive who is responsible for an organization's data use and data governance.
  • Chief Privacy Officer (CPO) - A chief privacy officer (CPO) is a corporate executive charged with developing and implementing policies designed to protect customer data from unauthorized access.
  • chief risk officer (CRO) - The chief risk officer (CRO) is the corporate executive tasked with assessing and mitigating significant competitive, regulatory and technological threats to an enterprise's capital and earnings.
  • chilling effect - The chilling effect is the suppression of free speech and legitimate forms of dissent among a population because of fear of repercussion.
  • CHIME (College of Healthcare Information Management Executives) - The College of Healthcare Information Management Executives (CHIME) is an organization created to serve the professional development needs of CIOs working in the healthcare industry and to promote effective information management within that industry.
  • Class C2 - Class C2 is a security rating established by the U.
  • clean desk policy (CDP) - A clean desk policy (CDP) is a corporate directive that specifies how employees should leave their working space when they leave the office.
  • clinical decision support system (CDSS) - A clinical decision support system (CDSS) is an application that analyzes data to help healthcare providers make decisions and improve patient care.
  • clinical trial - A clinical trial, also known as a clinical research study, is a protocol to evaluate the effects and efficacy of experimental medical treatments or behavioral interventions on health outcomes.
  • CloudAudit - CloudAudit is a specification for the presentation of information about how a cloud computing service provider addresses control frameworks.
  • COBIT - COBIT is an IT governance framework for businesses wanting to implement, monitor and improve IT management best practices.
  • COBIT 5 - COBIT 5 is the fifth iteration of a popular framework that's used for managing and governing information technology (IT).
  • Code of Connection (CoCo) - In the U.K.
  • commercial electronic message (CEM) - A commercial electronic message (CEM) is a communication soliciting business, funding or support for something that is sent through any electronic channel, including email, social media, voicemail, text and instant messages.
  • commercial motor vehicle (CMV) - A commercial motor vehicle (CMV) is any vehicle used to transport goods or passengers for the profit of an individual or business.
  • Committee on Trade and Environment (CTE) - The Committee on Trade and the Environment (CTE) is a group within the World Trade Organization (WTO) tasked with identifying and understanding the balance of environmental concerns against the interests of international trade.
  • Common Criteria Evaluation and Validation Scheme for IT Security (CCEVS) - Common Criteria Evaluation and Validation Scheme for IT Security (CCEVS) is program for evaluating IT products' conformance to international IT security standards.
  • competition law - Competition law is the body of legislation intended to prevent market distortion caused by anti-competitive practices on the part of businesses.
  • compliance - Compliance is the act of being in alignment with guidelines, regulations and/or legislation.
  • compliance audit - A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.
  • compliance automation - Compliance automation, also known as automated compliance, is a category of software applications that use artificial intelligence (AI) features and technology to simplify compliance procedures.
  • compliance burden - Compliance burden, also called regulatory burden, is the administrative cost of a regulation in terms of dollars, time and complexity.
  • compliance framework - A compliance framework is a structured set of guidelines that details an organization's processes for maintaining accordance with established regulations, specifications or legislation.
  • compliance risk - Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting from its failure to act in accordance with industry laws and regulations, internal policies or prescribed best practices.
  • compliance validation - In compliance, validation is a formal procedure to determine how well an official or prescribed plan or course of action is being carried out.
  • computational law - Computational law is the area of legal informatics focusing on the automation of formerly manual processes and the integration of legal information with other applications and systems.
  • Computer Fraud and Abuse Act (CFAA) - The Computer Fraud and Abuse Act (CFAA) of 1986 is United States legislation that made it a federal crime to access a protected computer without proper authorization.
  • concentration ratio (CR) - A concentration ratio (CR) is a metric used in economics to express the distribution of companies in a particular industry relative to the size of the market.
  • confidentiality - Confidentiality is a set of rules or a promise that limits access or places restrictions on certain types of information.
  • consumer privacy (customer privacy) - Consumer privacy, also known as customer privacy, involves the handling and protection of the sensitive personal information provided by customers in the course of everyday transactions.
  • container (disambiguation) - This page explains how the term container is used in software development, storage, data center management and mobile device management.
  • content marketing - Content marketing is the publication of material designed to promote a brand, usually through a more oblique and subtle approach than that of traditional push advertising.
  • content services platform - A content services platform is cloud-based SaaS software that enables users to create, share, collaborate on and store text, audio and video content.
  • contingency plan - In business continuity and risk management, a contingency plan is a process that prepares an organization to respond coherently to an unplanned event.
  • Continuity of Care Record (CCR) - The Continuity of Care Record, or CCR, is a standard for the creation of electronic summaries of patient health.
  • control framework - A control framework is a data structure that organizes and categorizes an organization’s internal controls, which are practices and procedures established to create business value and minimize risk.
  • cooperative (co-op) - A cooperative, often shortened to “co-op,” is a business that is owned and operated by and for the benefit of its members.
  • COPPA (Children's Online Privacy Protection Act ) - The Children's Online Privacy Protection Act (COPPA) is a law passed by the U.
  • copyright - Copyright is a legal term describing ownership of control of the rights to the use and distribution of certain works of creative expression, including books, video, movies, music and computer programs.
  • corporate activism - Corporate activism is a public stance taken by a large enterprise to positively impact social change or legislation.
  • corporate governance - Corporate governance is the combination of rules, processes or laws by which businesses are operated, regulated or controlled.
  • corporate performance - Corporate performance is a composite assessment of how well an organization executes on its most important parameters, typically financial, market and shareholder performance.
  • corporate social responsibility (CSR) - Corporate social responsibility is an umbrella term used to describe voluntary corporate initiatives concerned with community development, the environment and human rights.
  • corporation (C corporation, C corp) - A corporation is a large and complex organization that is owned by its shareholders and governed by a board of directors.
  • critical infrastructure - Critical infrastructure is the body of systems, networks and assets that are so essential that their continued operation is required to ensure the security of a given nation, its economy, and the public’s health and/or safety.
  • data breach - A data breach is a cyber attack in which sensitive, confidential or otherwise protected data has been accessed and/or disclosed in an unauthorized fashion.
  • data classification - Data classification is the process of organizing data into categories that make it is easy to retrieve, sort and store for future use.
  • data life cycle management (DLM) - Data life cycle management (DLM) is a policy-based approach to managing the flow of an information system's data throughout its life cycle: from creation and initial storage to the time when it becomes obsolete and is deleted.
  • data masking - Data masking is a method of creating a structurally similar but inauthentic version of an organization's data that can be used for purposes such as software testing and user training.
  • data privacy (information privacy) - Data privacy, also called information privacy, is the aspect of information technology (IT) that deals with the ability an organization or individual has to determine what data in a computer system can be shared with third parties.
  • Data Protection Bill 2017 - The Data Protection Bill 2017 is legislation that will replace the Data Protection Act of 1998.
  • data protection impact assessment (DPIA) - A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, procedures or technologies affect individuals’ privacy and eliminate any risks that might violate compliance.
  • data protection management (DPM) - Data protection management (DPM) comprises the administration, monitoring and management of backup processes to ensure backup tasks run on schedule and data is securely backed up and recoverable.
  • data sovereignty - Data sovereignty is the concept that information which has been converted and stored in binary digital form is subject to the laws of the country in which it is located.
  • Daylight Saving Time patch - A Daylight Saving Time patch is a modular piece of code created to update systems, devices and programs for compatibility with new start and end dates for Daylight Saving Time (DST) in the United States, Canada and Bermuda.
  • Deferred Action for Childhood Arrivals (DACA) - Deferred Action for Childhood Arrivals (DACA) is a program run by the United States Department of Homeland Security which allowed specific illegal immigrants who came to the country as children, known as Dreamers, to defer removal action for two years, a time period which could then be renewed.
  • digital due process - Digital due process is an adaptation and extension of that legal concept to protect the rights of individuals with regard to online communications.
  • Digital Millennium Copyright Act (DMCA) - The Digital Millennium Copyright Act (DMCA) is a controversial United States digital rights management (DRM) law enacted October 28, 1998 by then-President Bill Clinton.
  • direct digital marketing (DDM) - Direct digital marketing (DDM) is the electronic delivery of relevant communications to specific recipients.
  • disaster recovery plan (DRP) - A disaster recovery plan (DRP) is a documented, structured approach that describes how an organization can quickly resume work after an unplanned incident.
  • discovery mailbox - A discovery mailbox is used to perform e-discovery searches for Exchange Server and Exchange Online environments.
  • disk image - A disk image is a copy of the entire contents of a storage device, such as a hard drive, DVD, or CD.
  • document capture - Document capture is any one of several processes used to convert a physical document to another format, typically a digital representation.
  • document sanitization - In addition to making sure the document text doesn’t openly divulge anything it shouldn’t, document sanitization includes removing document metadata that could pose a privacy or security risk.
  • Dodd-Frank Act - The Dodd-Frank Act (fully known as the Dodd-Frank Wall Street Reform and Consumer Protection Act) is a United States federal law that places regulation of the financial industry in the hands of the government.
  • Dossia - Dossia is a Web-based framework for storing and managing personal health records (PHR).
  • due process - Due process is a legal principle designed to protect the rights of citizens to fair treatment at the hands of the government.
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • Secure Shell (SSH)

    SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system ...

  • NIST Cybersecurity Framework

    The NIST Cybersecurity Framework (NIST CSF) is a policy framework surrounding IT infrastructure security.

  • Advanced Encryption Standard (AES)

    The Advanced Encryption Standard (AES) is a symmetric block cipher chosen by the U.S. government to protect classified ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • secondary storage

    Secondary storage is persistent storage for noncritical data that doesn't need to be accessed as frequently as data in primary ...

  • optical storage

    Optical storage is any storage type in which data is written and read with a laser.

  • JBOD (just a bunch of disks)

    JBOD, which stands for 'just a bunch of disks,' is a type of multilevel configuration for disks.

Close