Browse Definitions :

Government IT

Terms related to government IT, including definitions about specific federal, state and local government programs as well as words and phrases about policy and compliance.

AAD - NEB

  • Aadhaar - Aadhaar is a 12-digit unique identification number issued by the Indian government to every individual resident of India in the form of a card.
  • accountability - Accountability means being held responsible or answerable for one's actions (or perhaps lack of action where one should have been taken).
  • administrator code - In government contracting, an administrator code (AC), like a buyer code (BC), is a code assigned to each Post Award Administrator.
  • Advanced Encryption Standard (AES) - The Advanced Encryption Standard (AES) is a symmetric block cipher chosen by the U.
  • Agency for Healthcare Research and Quality (AHRQ) - The Agency for Healthcare Research and Quality (AHRQ) is a U.
  • Americans with Disabilities Act (ADA) compliance - Americans with Disabilities Act (ADA) compliance is the adherence to the standards put forth forth in the United States legislation.
  • Army Knowledge Online (AKO) - Army Knowledge Online (AKO) is the United States Army intranet.
  • Australian Assistance and Access Bill - The Australian Assistance and Access Bill is legislation introduced and passed in 2018 by the Parliament of Australia to support law enforcement and security agencies in their ability to collect evidence from electronic devices.
  • Automated License Plate Recognition (ALPR) - Automated License Plate Recognition (ALPR) is a technology that uses optical character recognition (OCR) to automatically read license plate characters.
  • Biosense - Biosense is the first foray into the field of bioinformatics for the Centers for Disease Control and Prevention (CDC).
  • Blue Origin - Blue Origin is a privately funded aerospace company focused on developing and flying rocket-powered vertical-takeoff and vertical-landing (VTVL) vehicles for providing access to suborbital and orbital space.
  • Centers for Disease Control and Prevention (CDC) - Promoting a healthy general public and sharing data about chronic diseases are main goals of the Centers for Disease Control and Prevention (CDC).
  • Central Identities Data Repository (CIDR) - Central Identities Data Repository (CIDR) is a government agency in India that stores and manages data for the country's Aadhaar project.
  • certified 8(a) firm - In defense contracting, a Certified 8(a) Firm is a firm that is eligible to receive eligible to receive federal contracts under the Small Business Administration's 8(a) Business Development Program because it is owned and operated by socially and economically disadvantaged individuals.
  • change control - Change control is a systematic approach to managing all changes made to a product or system.
  • change request - A change request is a formal proposal for an alteration to some product or system.
  • Chief Social Scientist (Senior Social Scientist) - A Chief (or Senior) Social Scientist is a sociologist who provides advice to government officials or corporate executives concerning the roles of individuals and institutions in human society.
  • citizen relationship management (CRM) - Citizen relationship management is a growing effort at all levels of government to respond quickly, succinctly and accurately to citizen requests or inquiries for answers to questions and general information about policies, practices, and procedures.
  • COBOL (Common Business Oriented Language) - COBOL (Common Business-Oriented Language) is a high-level programming language for business applications.
  • Committee on Trade and Environment (CTE) - The Committee on Trade and the Environment (CTE) is a group within the World Trade Organization (WTO) tasked with identifying and understanding the balance of environmental concerns against the interests of international trade.
  • common access card (CAC) - A common access card (CAC) is a Unites States Department of Defense (DoD) smart card for multifactor authentication.
  • Common Criteria (CC) for Information Technology Security Evaluation - Common Criteria (CC) is an international set of guidelines and specifications developed for evaluating information security products, specifically to ensure they meet an agreed-upon security standard for government deployments.
  • Common Service Center (CSC) - A Common Service Center (CSC) is an information and communication technology (ICT) access point created under the National e-Governance Project of the Indian government.
  • compliance - Compliance is the state of being in accordance with established guidelines or specifications, or the process of becoming so.
  • compliance audit - A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.
  • Consumer Price Index (CPI) - The Consumer Price Index (CPI) is a measure of the weighted average change in the price that U.
  • COTS, MOTS, GOTS, and NOTS - COTS, MOTS, GOTS, and NOTS are abbreviations that describe pre-packaged software or hardware purchase alternatives.
  • critical infrastructure - Critical infrastructure is the body of systems, networks and assets that are so essential that their continued operation is required to ensure the security of a given nation, its economy, and the public’s health and/or safety.
  • cyber espionage - Cyber espionage, also called cyber spying, is a form of cyber attack that is carried out against a competitive company or government entity.
  • Cybersecurity Information Sharing Act (CISA) - Cybersecurity Information Sharing Act (CISA) is proposed legislation that will allow United States government agencies and non-government entities to share information with each other as they investigate cyberattacks.
  • cyberterrorism - According to the U.
  • cyberwarfare - The generally accepted definition of cyberwarfare is the use of cyber attacks against a nation-state, causing it significant harm, up to and including physical warfare, disruption of vital computer systems and loss of life.
  • data breach - A data breach is a cyber attack in which sensitive, confidential or otherwise protected data has been accessed and/or disclosed in an unauthorized fashion.
  • Defense Acquisition Regulatory Council (DARC) - The Defense Acquisition Regulatory Council (DARC) is a group composed of representatives from each Military department, the Defense Logistics Agency, and the National Aeronautics and Space Administration.
  • Defense Contract Management Agency (DCMA) - The Defense Contract Management Agency (DCMA) is a component of the United States Department of Defense (DoD) that works with defense contractors to ensure government services and supplies are delivered on time, come at the expected cost and satisfy all performance requirements.
  • defense contractor - A defense contractor is any person who enters into a contract with a federal government of the United States for the production of material or for the performance of services for national defense.
  • Defense Information Systems Agency (DISA) - Defense Information Systems Agency (DISA) is a U.
  • Department of Space (India) - The Department of Space (DoS) is a department created by the Indian government to manage their space program and oversee a number of related agencies and institutes.
  • DGS&D (DGS&D rate contracts) - DGS&D is the central purchase organization of the Indian government, functioning under the Ministry of Commerce & Industry.
  • digital evidence presentation system (DEPS) - A digital evidence presentation system (DEPS) is a system with an overhead camera and a liquid crystal display (LCD) used in courts to present and record evidence digitally.
  • digital profiling - Digital profiling is the process of gathering and analyzing information about an individual that exists online.
  • DNS Security Extensions (DNSSEC) - DNS Security Extensions (DNSSEC) are a set of Internet Engineering Task Force (IETF) standards created to address vulnerabilities in the Domain Name System (DNS) and protect it from online threats.
  • document capture - Document capture is any one of several processes used to convert a physical document to another format, typically a digital representation.
  • Driver's Privacy Protection Act (DPPA) - The Driver's Privacy Protection Act (DPPA) is a United States federal law designed to protect the personal information of licensed drivers from improper use or disclosure.
  • e-prescribing (eRx) incentive program - The Electronic Prescribing (eRx) Incentive Program is a US government program that provides financial incentives to physicians, practitioners and therapists who meet certain criteria for the use of qualified e-prescribing systems.
  • EDRM (electronic discovery reference model) - The Electronic Discovery Reference Model (EDRM) is a framework that outlines standards for the recovery and discovery and of digital data.
  • Energy Star - Energy Star is a government-backed labeling program that helps people and organizations save money and reduce greenhouse gas emissions by identifying factories, office equipment, home appliances and electronics that have superior energy efficiency.
  • ENISA (European Network and Information Security Agency) - The European Network and Information Security Agency (ENISA) is a European Union (EU) agency dedicated to preventing and addressing network security and information security problems.
  • European Cloud Computing Strategy (ECCS) - The European Cloud Computing Strategy (ECCS) is an initiative established by the European Commission to promote the adoption of cloud computing services.
  • fair opportunity - Fair opportunity is a requirement that U.
  • Federal Acquisition Regulation (FAR) - Federal Acquisition Regulation (FAR) is the body of laws that govern the U.
  • Federal Deposit Insurance Corporation (FDIC) - The Federal Deposit Insurance Corporation (FDIC) is an independent agency of the United States (U.
  • Federal Emergency Management Agency (FEMA) - Federal Emergency Management Agency (FEMA) is a United States government agency with the purpose to coordinate aid and respond to disasters around the nation when local resources are insufficient.
  • Federal Energy Regulatory Commission (FERC) - The Federal Energy Regulatory Commission (FERC) is a United States government agency, established in 1977 to oversee the country's interstate transmission and pricing of a variety of energy resources, including electricity, natural gas and oil.
  • Federal Health Architecture (FHA) - The Federal Health Architecture (FHA) is an initiative led by the Office of the National Coordinator for Health IT (ONC) to coordinate the health information technology efforts of the nearly two dozen federal agencies that provide health care services.
  • Federal Information Processing Standards (FIPS) - Federal Information Processing Standards (FIPS) is a standard for adoption and use by United States Federal departments and agencies that has been developed within the Information Technology Laboratory and published by the National Institute of Standards and Technology (NIST), a part of the U.
  • Federal Information Security Management Act (FISMA) - The Federal Information Security Management Act (FISMA) is United States legislation that defines a framework of guidelines and security standards to protect government information, operations and assets.
  • FedRAMP (Federal Risk and Authorization Management Program) - The Federal Risk and Authorization Management Program (FedRAMP) is a risk management program that provides a standardized approach for assessing and monitoring the security of cloud products and services.
  • FedRAMP 3PAO (third-party assessment organization) - A 3PAO is an organization that has been certified to help cloud service providers and government agencies meet FedRAMP compliance regulations.
  • FIPS (Federal Information Processing Standards) - FIPS (Federal Information Processing Standards) are a set of standards that describe document processing, encryption algorithms and other information technology standards for use within non-military government agencies and by government contractors and vendors who work with the agencies.
  • four eyes principle - The four eyes principle is a requirement that two individuals review and approve some action before it can be taken.
  • Freedom of Information Act - The Freedom of Information Act (FOIA) is a United States federal law that grants the public access to information possessed by government agencies.
  • full and open competition - With respect to a contract action, "full and open" competition means that all responsible sources are permitted to compete.
  • G-Cloud (Government Cloud) - Government Cloud, also referred to as G-Cloud, is a U.
  • GASB - GASB (Governmental Accounting Standards Board) is private not-for-profit organization that seeks to establish and improve the standards of accounting and financial reporting for U.
  • GFEBS (General Fund Enterprise Business System) - GFEBS (General Fund Enterprise Business System) is a Web-based enterprise resource planning (ERP) system for the United States Army.
  • Government Accountability Office (GAO) - The U.S.
  • Government Information Security Reform Act - The Government Information Security Reform Act (formerly known as the Thompson-Liebermann Act) is a federal law that required U.
  • government to government (G2G) - Government to government (G2G) is the electronic sharing of data and/or information systems between government agencies, departments or organizations.
  • government Trojan - A government Trojan is spyware installed on a computer or network by a law enforcement agency for the purpose of capturing information relevant to a criminal investigation.
  • governmentwide acquisition contract (GWAC) - A governmentwide acquisition contract (GWAC) is a contract between a commercial IT service or product vendor and the U.
  • gross domestic product (GDP) - Gross domestic product (GDP) is the total amount of dollars made within a given location in the selling of all goods and services before deductions.
  • GSA IT Schedule 70 - IT Schedule 70 is a long-term contract issued by the United States government.
  • Indian Institute of Information Technology (IIIT) - The Indian Institute of Information Technology is a group of educational centers in India that focus on information technology and associated business requirements.
  • Indian Institute of Technology (IIT) - The Indian Institute of Technology (IIT) is a group of educational institutes in India set up by the government to produce high quality scientists, engineers and technologists.
  • intelligent transportation system (ITS) - Intelligent transportation system (ITS) is the application of sensing, analysis, control and communications technologies to ground transportation in order to improve safety, mobility and efficiency.
  • international financial reporting standards (IFRS) - International financial reporting standards (IFRS) are specific organizational and monetary standards and frameworks for financial reporting that have been adopted in 113 countries including India, Australia and the European Union.
  • IT controls - An IT control is a procedure or policy that provides a reasonable assurance that the information technology (IT) used by an organization operates as intended, that data is reliable and that the organization is in compliance with applicable laws and regulations.
  • ITAR and EAR compliance - The International Traffic in Arms Regulations (ITAR) and the Export Administration Regulations (EAR) are two important United States export control laws that affect the manufacturing, sales and distribution of technology.
  • Joint Enterprise Defense Infrastructure (JEDI cloud) - Joint Enterprise Defense Infrastructure (JEDI) is the proposed Department of Defense (DoD) cloud infrastructure network.
  • L3 Harris Technologies - L3 Harris Technologies is a military technology company.
  • Laboratory Data Sharing Interoperability (LDSI) - Laboratory Data Sharing Interoperability (LDSI) is an initiative that allows chemistry and hematology lab tests and results to be shared between the Veterans Administration, the Department of Defense and private or commercial laboratories.
  • Large Hadron Collider (LHC) - The Large Hadron Collider (LHC) is a particle accelerator under development by CERN, the world's largest organization devoted to particle physics.
  • LEED (Leadership in Energy and Environmental Design) - LEED (Leadership in Energy and Environmental Design) is an ecology-oriented building certification program run under the auspices of the U.
  • Maintenance Management Information System (MMIS) - Maintenance Management Information System (MMIS) is a mechanized claims processing and information retrieval system for Medicaid that's required by the federal government.
  • market distortion - Market distortion is the lack of free and open competition in a market, whether through intentional actions or prevailing market conditions.
  • mission mode project (MMP) - A mission mode project (MMP) is an individual project within the National e-Governance Plan (NeGP) that focuses on one aspect of electronic governance, like banking, land records or commercial taxes.
  • multi-user spaceport - Multi-user spaceport is a term that NASA is employing as it transitions its facilities from government-only launch sites (or spaceports) as part of a new business model in which the agency attracts partner companies and organizations to invest in space centers to operate their programs.
  • NASA Solutions for Enterprise-Wide Procurement (SEWP) IV - NASA Solutions for Enterprise-Wide Procurement (SEWP) IV is a contract issued by NASA's SEWP BOWL (Solutions for Enterprise-Wide Procurement Business Operations and Workstation Laboratory) to a commercial technology vendor.
  • National Committee on Vital and Health Statistics (NCVHS) - The National Committee on Vital and Health Statistics (NCVHS) is an advisory body to the U.
  • National Data Warehouse of Official Statistics - The National Data Warehouse of Official Statistics is a central repository of the statistical data gathered by India’s central ministries, state governments and union territories.
  • National eGovernance Plan (NeGP) - National eGovernance Plan (NeGP) is an initiative by the government of India to combine various e-governance systems around the country to create a national network that provides government services to all citizens electronically.
  • National eGovernance Service Delivery Gateway (NSDG) - National eGovernance Service Delivery Gateway (NSDG) is a mission mode project (MMP) under the National e-Governance Plan (NeGP) that acts as a central repository for government data.
  • National Emergency Communications Plan (NECP) - The National Emergency Communications Plan (NECP) is a strategic plan for improving emergency response communications and efforts in the United States.
  • national identity card - A national identity card is a portable document, typically a plasticized card with digitally-embedded information, that someone is required or encouraged to carry as a means of confirming their identity.
  • National Informatics Centre (NIC) - The National Informatics Centre (NIC) is an institute set up by the Indian government in 1976 to drive its technology and e-governance initiatives.
  • National Security Agency (NSA) - The National Security Agency (NSA) is a federal government intelligence agency that is part of the United States Department of Defense and is managed under the authority of the director of national intelligence (DNI).
  • National Technical Research Organisation (NTRO) - The National Technical Research Organisation (NTRO) is an Indian technical intelligence agency.
  • native advertising - Native advertising is the integration of marketing content with a website in such a way that it is not distinct from the rest of the site in terms of its content, format, style or placement.
  • Nebula - Nebula is an open source cloud computing program that provides on-demand computing power for NASA researchers and scientists.
SearchCompliance
  • ISO 31000 Risk Management

    The ISO 31000 Risk Management framework is an international standard that provides businesses with guidelines and principles for ...

  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

SearchSecurity
  • Twofish

    Twofish is a symmetric-key block cipher with a block size of 128 bits and variable-length key of size 128, 192 or 256 bits.

  • walled garden

    On the internet, a walled garden is an environment that controls the user's access to network-based content and services.

  • potentially unwanted program (PUP)

    A potentially unwanted program (PUP) is a program that may be unwanted, despite the possibility that users consented to download ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • Remote Direct Memory Access (RDMA)

    Remote Direct Memory Access (RDMA) is a technology that enables two networked computers to exchange data in main memory without ...

  • storage (computer storage)

    Data storage is the collective methods and technologies that capture and retain digital information on electromagnetic, optical ...

  • storage medium (storage media)

    In computers, a storage medium is a physical device that receives and retains electronic data for applications and users and ...

Close