Browse Definitions :

Customer data management

Terms related to customer data management, including customer data integration (CDI) technology definitions and words and phrases about data quality and data governance.

DO - RXN

  • do not call list - The "do not call" list is a registry of phone numbers in the United States that telemarketers are prohibited from calling in most circumstances.
  • Do Not Track (DNT) - Do Not Track (DNT) is a browser setting that sends a message to websites and advertising networks requesting that they don't track the user.
  • doxing - Doxing is the act of gathering information about a target individual or organization and making it public.
  • e-prescribing (eRx) incentive program - The Electronic Prescribing (eRx) Incentive Program is a US government program that provides financial incentives to physicians, practitioners and therapists who meet certain criteria for the use of qualified e-prescribing systems.
  • e-score - The e-score is a consumer rating metric used to to determine an individual's potential value as a customer and to use that information to guide marketing efforts.
  • EDIFACT - EDIFACT (ISO 9735) is the international standard for electronic data interchange (EDI).
  • Electronic Commerce (EC Directive) Regulations 2002 - The Electronic Commerce (EC Directive) Regulations 2002 establishes legal rules that online retailers and service providers must comply with when dealing with consumers in the 27 member countries of the European Union (EU).
  • emotions analytics (EA) - Emotions analytics (EA) software collects data on how a person communicates verbally and nonverbally to understand the person's mood or attitude.
  • EMV card - An EMV card is a credit or debit card with an embedded computer chip and associated technology designed to enable secure payment at compatible point of sale (POS) terminals; EMV stands for Europay, Mastercard and Visa, the three companies responsible for the standard.
  • encryption key management - Encryption key management is the administration of tasks involved with protecting, storing, backing up and organizing encryption keys.
  • enterprise search - There are a number of kinds of enterprise search including local installations, hosted versions, and search appliances, sometimes called “search in a box.
  • EU Data Protection Directive (Directive 95/46/EC) - EU Data Protection Directive (also known as Directive 95/46/EC) is a regulation adopted by the European Union to protect the privacy and protection of all personal data collected for or about citizens of the EU, especially as it relates to processing, using or exchanging such data.
  • explicit data - Explicit data is data that is provided intentionally and taken at face value rather than analyzed or interpreted for further meaning.
  • FERPA (Family Educational Rights and Privacy Act of 1974) - FERPA (Family Educational Rights and Privacy Act of 1974) is legislation that protects the privacy of students' personally identifiable information (PII).
  • field-level encryption - Field-level encryption is the ability to encrypt data based on entire fields.
  • file shredder - A file shredder, also known as a virtual or digital shredder, is a program designed to render computer-based files unreadable, just as a conventional shredder makes physical documents unreadable.
  • FIX protocol (Financial Information Exchange protocol) - The Financial Information Exchange (FIX) protocol is an open specification intended to streamline electronic communications in the financial securities industry.
  • focus group - A focus group is a small and typically diverse panel of people selected to survey for their opinions on a given subject.
  • forensic - Forensic, in a general sense, means "related to or used in courts of law" or "used for formal public debate or discussion.
  • four eyes principle - The four eyes principle is a requirement that two individuals review and approve some action before it can be taken.
  • Freedom of Information Act 2000 - The Freedom of Information Act 2000 is an act of the United Kingdom (UK) Parliament defining the ways in which the public may obtain access to government-held information.
  • General Architecture for Text Engineering (GATE) - General Architecture for Text Engineering (GATE) is a development environment for writing software that can process human-language text.
  • geolocation - Geolocation is the detection of the physical location of an Internet connected computing device.
  • going dark - Going dark describes a scenario in which communication appears to have ceased, but in reality has just moved from a public communication channel to a private, encrypted channel.
  • golden record - A golden record is a single, well-defined version of all the data entities in an organizational ecosystem.
  • Google Analytics - Google Analytics is a free Web analytics service that provides statistics and basic analytical tools for search engine optimization (SEO) and marketing purposes.
  • Google Analytics dashboard - The Google Analytics dashboard is a user interface to the company’s Web analytics product.
  • Google Health - Google Health is a personal health record (PHR) service that allows users to centrally store and manage their health information online.
  • Gramm-Leach-Bliley Act (GLBA) - The Gramm-Leach-Bliley Act (GLB Act or GLBA), also known as the Financial Modernization Act of 1999, is a federal law enacted in the United States to control the ways that financial institutions deal with the private information of individuals.
  • health informatics - Health informatics is the practice of acquiring, studying and managing health data and applying medical concepts in conjunction with health information technology systems to help clinicians provide better healthcare.
  • Health IT (health information technology) - Health IT (health information technology) is the area of IT involving the design, development, creation, use and maintenance of information systems for the healthcare industry.
  • historical data - Historical data, in a broad context, is collected data about past events and circumstances pertaining to a particular subject.
  • HITECH (Health Information Technology for Economic and Clinical Health) Act of 2009 - The HITECH (Health Information Technology for Economic and Clinical Health) Act of 2009 is legislation that was created to stimulate the adoption of electronic health records (EHR) and the supporting technology in the United States.
  • HITSP - HITSP (Healthcare Information Technology Standards Panel) is an organization created to promote standardization and broad scale interoperability among healthcare applications and information systems.
  • Hosted CRM - Hosted CRM is an arrangement in which a company outsources some or all of its customer relationship management (CRM) functions to an application service provider (ASP).
  • ICD-9-CM (International Classification of Diseases, Ninth Revision, Clinical Modification) - ICD-9-CM is the current medical coding standard used in hospitals in the United States.
  • ideation management - Ideation management refers to creating, gathering, analyzing, disseminating and executing on idea generation within the enterprise.
  • impact-based advertising - What is impact-based advertising?Impact-based advertising is a form of advertising designed to have a lasting psychological effect on viewers so they will remember the product or vendor.
  • implicit data - Implicit data is information that is not provided intentionally but gathered from available data streams.
  • inbound call - An inbound call is one that a customer initiates to a call center or contact center.
  • incidence - Incidence, in statistics, is the rate of occurrence of something within a population, or the number of times it occurs.
  • Information Commissioner's Office (ICO) - The Information Commissioner's Office (ICO) is an independent authority in the UK that promotes openness of public information and protection of private information.
  • intelligent video - Intelligent video is digital video technology integrated with analytical software.
  • Internet of Things privacy (IoT privacy) - Internet of Things privacy is the special considerations required to protect the information of individuals from exposure in the IoT environment, in which almost any physical or logical entity or object can be given a unique identifier and the ability to communicate autonomously over the Internet or similar network.
  • ISO/IEC 38500 - ISO/IEC 38500 is an international standard created to guide corporate governance of information technology (IT).
  • key-value pair (KVP) - A key-value pair (KVP) is a set of two linked data items: a key, which is a unique identifier for some item of data, and the value, which is either the data that is identified or a pointer to the location of that data.
  • knowledge process outsourcing (KPO) - Knowledge process outsourcing (KPO) is the allocation of relatively high-level tasks to an outside organization or a different group within the same organization.
  • knowledge-based authentication (KBA) - In a KBA scheme, the user is asked to answer at least one "secret" question before being allowed to change account settings or reset a password.
  • lead generation - Lead generation is the use of a computer program, a database, the Internet, or a specialized service to obtain or receive information for the purpose of expanding the scope of a business, increasing sales revenues, looking for a job or for new clients, or conducting specialized research.
  • lead generator - A lead generator is any marketing-related activity intended to publicize the availability of a vendor's product or service.
  • lead-to-revenue management (L2RM) - Lead-to-revenue management (L2RM) is a collection of sales and marketing processes that aims to maximize the income gained from each stage of the customer journey.
  • legal health record - A legal health record is the record of patient health that is created by a health care organization for its own business record.
  • LevelUp - LevelUp is a mobile payment (m-payment) and rewards service for consumer business transactions using smartphones.
  • litigation hold (preservation orders or hold orders) - Litigation hold is a stipulation requiring a company to preserve all data that may relate to a legal action involving the company.
  • location-based marketing (LBM) - Location-based marketing (LMS) is a direct marketing strategy that uses a mobile device's location to alert the device's owner about an offering from a near-by business.
  • longitudinal study - A longitudinal study is an observational research method in which data is gathered for the same subjects repeatedly over a period of time.
  • loyalty card program - A loyalty card program is an incentive plan that allows a retail business to gather data about its customers.
  • loyalty punch card - A loyalty punch card is a token that lets a customer earn free merchandise or discounts after a certain number of purchases.
  • managed file transfer (MFT) - Managed file transfer (MFT) is a type of software used to provide secure internal, external and ad-hoc data transfers through a network.
  • market basket analysis - Market basket analysis is a data mining technique used by retailers to increase sales by better understanding customer purchasing patterns.
  • marketing-qualified lead (MQL) - A marketing-qualified lead (MQL) is a website visitor whose engagement levels indicate that he is likely to become a customer.
  • Massachusetts data protection law - What is the Massachusetts data protection law?The Massachusetts data protection law is legislation that stipulates security requirements for organizations that handle the private data of residents.
  • micropayment - A micropayment is an e-commerce transaction involving a very small sum of money in exchange for something made available online, such as an application download, a service or Web-based content.
  • Microsoft Dynamics 365 - Microsoft Dynamics 365 is a cloud-based business applications platform that combines components of customer relationship management (CRM) and enterprise resource planning (ERP), along with productivity applications and artificial intelligence tools.
  • Microsoft System Center - Microsoft System Center is a suite of individually sold systems management products.
  • microtrend - A microtrend is a tendency in the direction of some phenomenon that is fairly pervasive within a given sphere of influence and lasts for a few years.
  • mobile location analytics (MLA) - Mobile location analytics is a method used by retailers to track the movements of shoppers throughout their stores.
  • NASSCOM (National Association of Software and Services Companies) - The National Association of Software and Services Companies (NASSCOM) is a not-for-profit Indian consortium created to promote the development of the country's IT (information technology) and business process outsourcing (BPO) industries.
  • National eGovernance Service Delivery Gateway (NSDG) - National eGovernance Service Delivery Gateway (NSDG) is a mission mode project (MMP) under the National e-Governance Plan (NeGP) that acts as a central repository for government data.
  • National Health Service (NHS) - The National Health Service (NHS) is the publicly funded national healthcare system in the United Kingdom.
  • NetApp Data Fabric - The products and services that compose NetApp’s Data Fabric are designed to provide customers with the agility they need to quickly and efficiently move data to and from the cloud.
  • order management - Order management is the administration of business processes related to orders for goods or services.
  • PAN truncation (primary account number) - PAN (primary account number) truncation is a technology that prevents most of the digits in a credit card, debit card or bank account number from appearing on printed receipts issued to customers.
  • passenger name record (PNR) - A passenger name record (PNR) is a collection of data pertaining to an individual air traveler or a group of individuals travelling together.
  • pay for privacy - Pay for privacy is a business model in which customers are charged a fee to ensure that their data will not be shared and is secure from third-party access.
  • personal health record (PHR) - A personal health record (PHR) is a collection of health-related information that is documented and maintained by the individual it pertains to.
  • personally identifiable financial information (PIFI) - Personally identifiable financial information (PIFI) is any type of personally identifiable information (PII) that is linked to that person's finances.
  • personally identifiable information (PII) - Personally identifiable information (PII) is any data that could potentially identify a specific individual.
  • POS malware (point-of-sale malware) - Point-of-sale malware (POS malware) is malicious software expressly written to steal customer payment data -- especially credit card data -- from retail checkout systems.
  • predictive analytics - Predictive analytics is a form of advanced analytics that uses both new and historical data to forecast activity, behavior and trends.
  • predictive modeling - Predictive modeling, also called predictive analytics, is a mathematical process that seeks to predict future events or outcomes by analyzing patterns that are likely to forecast future results.
  • predictive personalization - Predictive personalization is the effort and ability to predict the actions of users, based on their previous behaviors online.
  • Privacy Shield (EU-US Privacy Shield) - EU-US Privacy Shield is a framework for adherence to E.
  • private cloud (internal cloud or corporate cloud) - Private cloud is a type of cloud computing that delivers similar advantages to public cloud, including scalability and self-service, but through a proprietary architecture.
  • privilege bracketing - Privilege bracketing is the practice of limiting temporarily increased permission levels to the briefest possible time period.
  • progressive profiling - Progressive profiling is a marketing technique that involves gradually collecting information about leads, or prospective customers, with iterative releases of forms asking questions intended to advance the sales cycle.
  • protected health information (PHI) or personal health information - Protected health information (PHI), also referred to as personal health information, generally refers to demographic information, medical histories, test and laboratory results, mental health conditions, insurance information, and other data that a healthcare professional collects to identify an individual and determine appropriate care.
  • Qualified Security Assessor (QSA) - A Qualified Security Assessor (QSA) is a person who has been certified by the PCI Security Standards Council to audit merchants for Payment Card Industry Data Security Standard (PCI DSS) compliance.
  • recommendation engine - Recommendation engines are common among online retail websites, such as Amazon.
  • reference data - Reference data, in the context of data management, are the data objects relevant to transactions, consisting of sets of values, statuses or classification schema.
  • registered health information technician (RHIT) - A registered health information technician (RHIT) is a certified professional who stores and verifies the accuracy and completeness of electronic health records.
  • relationship marketing - Relationship marketing is a customer relationship management strategy designed to encourage strong, lasting customer connections to a brand.
  • remote deposit capture (RDC) - Remote deposit capture (RDC) is a system that allows a customer to scan checks remotely and transmit the check images to a bank for deposit, usually via an encrypted Internet connection.
  • remote desktop - Remote desktop is a program or an operating system feature that allows a user to connect to a computer in another location, see that computer's desktop and interact with it as if it were local.
  • removable media - Removable media is any type of storage device that can be removed from a computer while the system is running.
  • Report on Compliance (ROC) - A Report on Compliance (ROC) is a form that must be completed by all Level 1 Visa merchants undergoing a PCI DSS audit.
  • reputation management - Reputation management is the practice of attempting to shape public perception of a person or organization by influencing online information about that entity.
  • RFID skimming - RFID skimming is the wireless interception of information from RFID chip-based debit, credit and ID cards and other documents, such as passports.
  • RxNorm - RxNorm is a catalog of the standard names given to clinical drugs and drug delivery devices in the United States to enable interoperability and clear communication between electronic systems, regardless of software and hardware compatibility.

SearchCompliance

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • cyber espionage

    Cyber espionage, also called cyber spying, is a form of cyber attack that is carried out against a competitive company or ...

  • virus (computer virus)

    A computer virus is malicious code that replicates by copying itself to another program, computer boot sector or document and ...

  • honeypot (computing)

    A honeypot is a network-attached system set up as a decoy to lure cyber attackers and detect, deflect and study hacking attempts ...

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

Close