Browse Definitions :
1,507 results for:

responsible disclosure

vulnerability disclosure

Definition | SearchSecurity

Vulnerability disclosure is the practice of publishing information about a computer security problem, and a type of policy that stipulates guidelines...

Credit CARD Act (Credit Card Accountability, Responsibility, and Disclosure Act of 2009)

Definition | SearchCompliance

The Credit CARD Act is legislation governing the behavior of credit card companies in the United States. The self-stated purpose of the Act is "To ...

dot com disclosures (.com disclosures)

Definition |

The dot com disclosures are the Federal Trade Commission's guidelines for applying its regulations to online marketing activities. The FTC's original...

Regulation Fair Disclosure (Regulation FD or Reg FD)

Definition | SearchCompliance

Regulation Fair Disclosure is a rule passed by the U.S. Securities and Exchange Commission that aims to prevent selective disclosure of information ...

non-disclosure agreement (NDA)

Definition |

A non-disclosure agreement (NDA), also known as a confidentiality agreement (CA), is a signed legally binding contract in which one party agrees to ...


Definition | SearchOracle

In an Oracle environment, a responsibility is a defined user right, similar to the word privilege in some other settings.

response time

Definition | SearchNetworking

According to the IBM Dictionary of Computing (which cites International Organization for Standardization Information Technology Vocabulary as the ...

challenge-response authentication

Definition | SearchSecurity

In information security, challenge-response authentication is a type of authentication protocol where one entity presents a challenge or question, ...

responsive design

Definition |

Responsive design is an approach to web page creation that makes use of flexible layouts, flexible images and cascading style sheet media queries.

incident response

Definition | SearchSecurity

Incident response is an organized approach to addressing and managing the aftermath of a security breach or cyberattack, also known as an IT incident...




  • computer worm

    A computer worm is a type of malicious software program whose primary function is to infect other computers while remaining ...

  • Single Sign-On (SSO)

    Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials (e.g., ...

  • Certified Information Systems Auditor (CISA)

    Certified Information Systems Auditor (CISA) is a certification issued by ISACA to people in charge of ensuring that an ...



  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider.