Browse Definitions :

Government IT

Terms related to government IT, including definitions about specific federal, state and local government programs as well as words and phrases about policy and compliance.

AAD - IDE

  • Aadhaar - Aadhaar is a 12-digit unique identification number issued by the Indian government to every individual resident of India in the form of a card.
  • Aakash tablet computer - Aakash is a government-subsidized Android tablet computer developed by the Indian Institute of Technology in conjunction with a UK-based company called DataWind.
  • accountability - Accountability means being held responsible or answerable for one's actions (or perhaps lack of action where one should have been taken).
  • administrator code - In government contracting, an administrator code (AC), like a buyer code (BC), is a code assigned to each Post Award Administrator.
  • Advanced Encryption Standard (AES) - The Advanced Encryption Standard, or AES, is a symmetric block cipher used by the U.
  • Agency for Healthcare Research and Quality (AHRQ) - The Agency for Healthcare Research and Quality (AHRQ) is a U.
  • Americans with Disabilities Act (ADA) compliance - Americans with Disabilities Act (ADA) compliance is the adherence to the standards put forth forth in the United States legislation.
  • Army Knowledge Online (AKO) - Army Knowledge Online (AKO) is the United States Army intranet.
  • Automated Best Value System (ABVS) - Automated Best Value System is a calculated formula that assesses past performance based on quality, delivery and packaging performance.
  • Automated License Plate Recognition (ALPR) - Automated License Plate Recognition (ALPR) is a technology that uses optical character recognition (OCR) to automatically read license plate characters.
  • B2G (Business2Government or Business-to-Government) - On the Internet, B2G is business-to-government (a variation of the term B2B or business-to-business), the concept that businesses and government agencies can use central Web sites to exchange information and do business with each other more efficiently than they usually can off the Web.
  • Be a Martian! - is a government 2.
  • Biosense - Biosense is the first foray into the field of bioinformatics for the Centers for Disease Control and Prevention (CDC).
  • Blue Origin - Blue Origin is a privately funded aerospace company focused on developing and flying rocket-powered vertical-takeoff and vertical-landing (VTVL) vehicles for providing access to suborbital and orbital space.
  • CALEA (Communications Assistance for Law Enforcement Act) - CALEA (Communications Assistance for Law Enforcement Act) is a United States federal law that enables the government to intercept wire and electronic communications and call-identifying information under certain circumstances -- in particular, when it is necessary in order to protect national security.
  • Centers for Disease Control and Prevention (CDC) - Promoting a healthy general public and sharing data about chronic diseases are main goals of the Centers for Disease Control and Prevention (CDC).
  • Central Identities Data Repository (CIDR) - Central Identities Data Repository (CIDR) is a government agency in India that stores and manages data for the country's Aadhaar project.
  • certified 8(a) firm - In defense contracting, a Certified 8(a) Firm is a firm that is eligible to receive eligible to receive federal contracts under the Small Business Administration's 8(a) Business Development Program because it is owned and operated by socially and economically disadvantaged individuals.
  • CESG - CESG is the UK government's national technical authority for information assurance (IA).
  • CESG Good Practice Guides (GPG) - Good Practice Guides (GPG) are documents created by the CESG, which provides guidance on aspects of information assurance (IA) to help organisations manage risk effectively.
  • change control - Change control is a systematic approach to managing all changes made to a product or system.
  • change request - A change request is a formal proposal for an alteration to some product or system.
  • Chief Social Scientist (Senior Social Scientist) - A Chief (or Senior) Social Scientist is a sociologist who provides advice to government officials or corporate executives concerning the roles of individuals and institutions in human society.
  • citizen relationship management (CRM) - Citizen relationship management is a growing effort at all levels of government to respond quickly, succinctly and accurately to citizen requests or inquiries for answers to questions and general information about policies, practices, and procedures.
  • COBOL (Common Business Oriented Language) - COBOL (Common Business-Oriented Language) is a high-level programming language for business applications.
  • Committee on Trade and Environment (CTE) - The Committee on Trade and the Environment (CTE) is a group within the World Trade Organization (WTO) tasked with identifying and understanding the balance of environmental concerns against the interests of international trade.
  • common access card (CAC) - A common access card (CAC) is a Unites States Department of Defense (DoD) smart card for multifactor authentication.
  • Common Criteria (CC) for Information Technology Security Evaluation - Common Criteria (CC) is an international set of guidelines and specifications developed for evaluating information security products, specifically to ensure they meet an agreed-upon security standard for government deployments.
  • Common Service Center (CSC) - A Common Service Center (CSC) is an information and communication technology (ICT) access point created under the National e-Governance Project of the Indian government.
  • compliance - Compliance is the act of being in alignment with guidelines, regulations and/or legislation.
  • compliance audit - A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.
  • Compliance: Glossary - A printable glossary of compliance-related terms.
  • Consumer Price Index (CPI) - The Consumer Price Index (CPI) is a measure of the weighted average change in the price that U.
  • COTS, MOTS, GOTS, and NOTS - COTS, MOTS, GOTS, and NOTS are abbreviations that describe pre-packaged software or hardware purchase alternatives.
  • CRC Energy Efficiency Scheme - The CRC Energy Efficiency Scheme is the United Kingdom's mandate to reduce greenhouse gases by reducing energy use at private and public organisations.
  • critical infrastructure - Critical infrastructure is the body of systems, networks and assets that are so essential that their continued operation is required to ensure the security of a given nation, its economy, and the public’s health and/or safety.
  • CyberCemetery - CyberCemetery is an online archive of websites, videos and documents that serves as an historic record for over 50 defunct United States government agencies and commissions.
  • cybersecurity - Cybersecurity is the protection of internet-connected systems, including hardware, software and data, from cyberattacks.
  • Cybersecurity Enhancement Act of 2009 (S.773) - The Cybersecurity Enhancement Act of 2009 (S.
  • Cybersecurity Information Sharing Act (CISA) - Cybersecurity Information Sharing Act (CISA) is proposed legislation that will allow United States government agencies and non-government entities to share information with each other as they investigate cyberattacks.
  • cyberterrorism - According to the U.
  • cyberwarfare - Cyberwarfare is computer- or network-based conflict involving politically motivated attacks by a nation-state on another nation-state.
  • data breach - A data breach is a confirmed incident in which sensitive, confidential or otherwise protected data has been accessed and/or disclosed in an unauthorized fashion.
  • Defense Acquisition Regulatory Council (DARC) - The Defense Acquisition Regulatory Council (DARC) is a group composed of representatives from each Military department, the Defense Logistics Agency, and the National Aeronautics and Space Administration.
  • Defense Contract Management Agency (DCMA) - The Defense Contract Management Agency is the government agency that overseas administration of origin inspection contracts, dispatches quality assurance reports and audits/monitors subcontracting plans.
  • defense contractor - A defense contractor is any person who enters into a contract with a federal government of the United States for the production of material or for the performance of services for national defense.
  • Defense Information Systems Agency (DISA) - Defense Information Systems Agency (DISA) is a U.
  • Defense Message System (DMS) - The Defense Message System (DMS) is a secure X.
  • Department of Space (India) - The Department of Space (DoS) is a department created by the Indian government to manage their space program and oversee a number of related agencies and institutes.
  • DGS&D (DGS&D rate contracts) - DGS&D is the central purchase organization of the Indian government, functioning under the Ministry of Commerce & Industry.
  • digital evidence presentation system (DEPS) - A digital evidence presentation system (DEPS) is a system with an overhead camera and a liquid crystal display (LCD) used in courts to present and record evidence digitally.
  • digital profiling - Digital profiling is the process of gathering and analyzing information about an individual that exists online.
  • DNS Security Extensions (DNSSEC) - DNS Security Extensions (DNSSEC) are a set of Internet Engineering Task Force (IETF) standards created to address vulnerabilities in the Domain Name System (DNS) and protect it from online threats.
  • document capture - Document capture is any one of several processes used to convert a physical document to another format, typically a digital representation.
  • Driver's Privacy Protection Act (DPPA) - The Driver's Privacy Protection Act (DPPA) is a United States federal law designed to protect the personal information of licensed drivers from improper use or disclosure.
  • e-prescribing (eRx) incentive program - The Electronic Prescribing (eRx) Incentive Program is a US government program that provides financial incentives to physicians, practitioners and therapists who meet certain criteria for the use of qualified e-prescribing systems.
  • EDRM (electronic discovery reference model) - The Electronic Discovery Reference Model (EDRM) is a framework that outlines standards for the recovery and discovery and of digital data.
  • EINSTEIN - EINSTEIN monitors and analyzes Internet traffic when it moves in and out of U.
  • Energy Star - Energy Star is a government-backed labeling program that helps people and organizations save money and reduce greenhouse gas emissions by identifying factories, office equipment, home appliances and electronics that have superior energy efficiency.
  • ENISA (European Network and Information Security Agency) - The European Network and Information Security Agency (ENISA) is a European Union (EU) agency dedicated to preventing and addressing network security and information security problems.
  • European Cloud Computing Strategy (ECCS) - The European Cloud Computing Strategy (ECCS) is an initiative established by the European Commission to promote the adoption of cloud computing services.
  • fair opportunity - Fair opportunity is a requirement that U.
  • Federal Acquisition Regulation (FAR) - Federal Acquisition Regulation (FAR) is the body of laws that govern the U.
  • Federal Deposit Insurance Corporation (FDIC) - The Federal Deposit Insurance Corporation (FDIC) is an independent agency of the United States (U.
  • Federal Desktop Core Configuration (FDCC) - Federal Desktop Core Configuration (FDCC) is a checklist for mandatory configuration settings on desktop and laptop computers owned by the United States government.
  • Federal Emergency Management Agency (FEMA) - Federal Emergency Management Agency (FEMA) is a United States government agency with the purpose to coordinate aid and respond to disasters around the nation when local resources are insufficient.
  • Federal Energy Regulatory Commission (FERC) - The Federal Energy Regulatory Commission (FERC) is a United States government agency, established in 1977 to oversee the country's interstate transmission and pricing of a variety of energy resources, including electricity, natural gas and oil.
  • Federal Health Architecture (FHA) - The Federal Health Architecture (FHA) is an initiative led by the Office of the National Coordinator for Health IT (ONC) to coordinate the health information technology efforts of the nearly two dozen federal agencies that provide health care services.
  • Federal Information Processing Standardization 140 - Federal Information Processing Standardization 140 is a standard that specifies security requirements for cryptographic modules used by the U.
  • Federal Information Processing Standards (FIPS) - Federal Information Processing Standards (FIPS) is a standard for adoption and use by United States Federal departments and agencies that has been developed within the Information Technology Laboratory and published by the National Institute of Standards and Technology (NIST), a part of the U.
  • Federal Information Security Management Act (FISMA) - The Federal Information Security Management Act (FISMA) is United States legislation that defines a comprehensive framework to protect government information, operations and assets against natural or man-made threats.
  • federal portfolio management - Federal portfolio management is a methodology used by the Chief Information Officers (CIOs) of U.
  • Federal Rules of Civil Procedure (FRCP) - The Federal Rules of Civil Procedure (FRCP) are rules that specify procedures for civil legal suits within United States federal courts.
  • FedRAMP (Federal Risk and Authorization Management Program) - The Federal Risk and Authorization Management Program (FedRAMP) is a risk management program that provides a standardized approach for assessing and monitoring the security of cloud products and services.
  • FedRAMP 3PAO (third-party assessment organization) - A 3PAO is an organization that has been certified to help cloud service providers and government agencies meet FedRAMP compliance regulations.
  • FIPS (Federal Information Processing Standards) - FIPS (Federal Information Processing Standards) are a set of standards that describe document processing, encryption algorithms and other information technology standards for use within non-military government agencies and by government contractors and vendors who work with the agencies.
  • Fortezza - Fortezza, Italian for "fortress," is a family of security products trademarked by the US government's National Security Agency.
  • four eyes principle - The four eyes principle is a requirement that two individuals review and approve some action before it can be taken.
  • FRCP Rule 41 - FRPC Rule 41 is the part of the United States Federal Rules of Criminal Procedure that covers the search and seizure of physical and digital evidence.
  • Freedom of Information Act - The Freedom of Information Act (FOIA) is a United States federal law that grants the public access to information possessed by government agencies.
  • full and open competition - With respect to a contract action, "full and open" competition means that all responsible sources are permitted to compete.
  • G-Cloud (Government Cloud) - Government Cloud, also referred to as G-Cloud, is a U.
  • GARUDA - GARUDA is India’s national grid computing initiative, a Centre for Development of Advanced Computing (CDAC) program funded by the Department of Information Technology (DIT) to deploy a networked infrastructure to labs and industries throughout India.
  • GASB - GASB (Governmental Accounting Standards Board) is private not-for-profit organization that seeks to establish and improve the standards of accounting and financial reporting for U.
  • GFEBS (General Fund Enterprise Business System) - GFEBS (General Fund Enterprise Business System) is a Web-based enterprise resource planning (ERP) system for the United States Army.
  • Global Network Enterprise Construct (GNEC) - The Global Network Enterprise Construct (GNEC) is a strategy to move the U.
  • Government Accountability Office (GAO) - The U.S.
  • government cloud computing plan - The United States government cloud computing plan, officially called the Federal Cloud Computing Initiative, is a plan to transition the US federal government's information technology infrastructure to web-based IT services.
  • Government Information Awareness (GIA) - Government Information Awareness (GIA) is a Web site dedicated to making it easy for U.
  • Government Information Security Reform Act - The Government Information Security Reform Act (formerly known as the Thompson-Liebermann Act) is a federal law that required U.
  • government to government (G2G) - Government to government (G2G) is the electronic sharing of data and/or information systems between government agencies, departments or organizations.
  • government Trojan - A government Trojan is spyware installed on a computer or network by a law enforcement agency for the purpose of capturing information relevant to a criminal investigation.
  • governmentwide acquisition contract (GWAC) - A governmentwide acquisition contract (GWAC) is a contract between a commercial IT service or product vendor and the U.
  • gross domestic product (GDP) - Gross domestic product (GDP) is the total amount of dollars made within a given location in the selling of all goods and services before deductions.
  • GSA IT Schedule 70 - IT Schedule 70 is a long-term contract issued by the United States government.
  • GSA SmartBUY - SmartBUY is a United States federal procurement program.
  • high value government data - According to the Open Government Directive, high value government data is any data that can increase agency accountability and responsiveness; improve public knowledge of the agency and its operations; further the core mission of the agency; create economic opportunity; or respond to need and demand as identified through public consultation.
  • HSPD-7 (Homeland Security Presidential Directive No. 7) - HSPD-7 (Homeland Security Presidential Directive No.
  • I-SPY Act -- Internet Spyware Prevention Act of 2005 (H.R. 744) - The I-SPY Act, formally known as the Internet Spyware Prevention Act of 2005 (H.
  • Identity Ecosystem - Identity Ecosystem, more formally known as the National Strategy for Trusted Identities in Cyberspace, is a proposal from the United States federal government to improve identity authentication on the Internet and make online transactions safer.

-ADS BY GOOGLE

SearchCompliance

  • California Consumer Privacy Act (CCPA)

    The California Consumer Privacy Act (CCPA) is legislation in the state of California that supports an individual's right to ...

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

SearchSecurity

  • BlueKeep (CVE-2019-0708)

    BlueKeep (CVE-2019-0708) is a vulnerability in the Remote Desktop (RDP) protocol that affects Windows 7, Windows XP, Server 2003 ...

  • endpoint detection and response (EDR)

    Endpoint detection and response (EDR) is a category of tools and technology used for protecting computer hardware devices–called ...

  • ransomware

    Ransomware is a subset of malware in which the data on a victim's computer is locked, typically by encryption, and payment is ...

SearchHealthIT

SearchDisasterRecovery

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

  • business continuity software

    Business continuity software is an application or suite designed to make business continuity planning/business continuity ...

SearchStorage

  • blockchain storage

    Blockchain storage is a way of saving data in a decentralized network which utilizes the unused hard disk space of users across ...

  • disk mirroring (RAID 1)

    RAID 1 is one of the most common RAID levels and the most reliable. Data is written to two places simultaneously, so if one disk ...

  • RAID controller

    A RAID controller is a hardware device or software program used to manage hard disk drives (HDDs) or solid-state drives (SSDs) in...

Close