Browse Definitions :

SearchCompliance

SearchCompliance.com's editorial staff, along with leading industry experts, provide unbiased original daily news, expert tips, discussion forums, webcasts and customized research that will help you develop, design and implement compliance initiatives.

View the complete archive of Compliance Management news, research and expert advice.

Go to:  SearchCompliance

Recently on  SearchCompliance

Top cloud compliance standards and how to use them

Get guidance on how to select relevant cloud compliance standards, along with tips on evaluating third-party providers' cloud compliance and governance efforts.

More Highlights
Definitions
  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be easily retrieved in the event of a compliance audit or subpoena.

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to optimize the security of credit, debit and cash card transactions and protect cardholders against misuse of their personal information.

Browse Compliance Topics

Regulatory compliance needs

Find the latest information, news and resources that CIOs and other IT professionals use to assess regulatory compliance needs. Learn which compliance regulations apply to which industries, including which systems are affected.

Recent Definitions

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be easily retrieved in the event of a compliance audit or subpoena.

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • COSO cube

    The COSO cube is a diagram that shows the relationship among all parts of an internal control system.

Highlights

More Regulatory compliance needs Topics

Back to Top

Compliance software and solutions

As compliance has become a priority for organizations of all sizes, the regulatory compliance software and solutions market has grown to meet the increasing need. Learn more about evaluating compliance software and solutions with news, advice and other resources related to policy, content and document management software; financial and accounting tools; and log management software.

Recent Definitions

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be easily retrieved in the event of a compliance audit or subpoena.

  • privacy compliance

    Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or legislation.

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies or assets between parties under certain conditions.

Highlights

More Compliance software and solutions Topics

Back to Top

Managing compliance

Compliance has become part of the day-to-day operations at many organizations. Learn about the various aspects of managing compliance operations at your company, with news, advice and best practices related to managing compliance teams, handling compliance reporting, automating processes, responding to audits and more.

Recent Definitions

  • ITIL (Information Technology Infrastructure Library)

    The ITIL (Information Technology Infrastructure Library) is a framework designed to standardize the selection, planning, delivery, maintenance, and overall lifecycle of IT services within a business.

  • Federal Information Security Management Act (FISMA)

    The Federal Information Security Management Act (FISMA) is United States legislation that defines a framework of guidelines and security standards to protect government information, operations and assets.

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

Highlights

More Managing compliance Topics

Back to Top

SearchCompliance

SearchSecurity

  • cyber attack

    A cyber attack is any attempt to gain unauthorized access to a computer, computing system or computer network with the intent to ...

  • backdoor (computing)

    A backdoor is a means to access a computer system or encrypted data that bypasses the system's customary security mechanisms.

  • post-quantum cryptography

    Post-quantum cryptography, also called quantum encryption, is the development of cryptographic systems for classical computers ...

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

  • cloud SLA (cloud service-level agreement)

    A cloud SLA (cloud service-level agreement) is an agreement between a cloud service provider and a customer that ensures a ...

  • NOR flash memory

    NOR flash memory is one of two types of non-volatile storage technologies.

  • RAM (Random Access Memory)

    RAM (Random Access Memory) is the hardware in a computing device where the operating system (OS), application programs and data ...

Close