Compliance Management Definitions

  • I

    information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and metrics that treat information as a valuable business asset.

  • information silo

    An information silo exists when an organization's departments and systems cannot, or do not, communicate freely with one another and encourage the sharing of business-relevant items.

  • inherent risk

    Inherent risk is a category of threat that describes potential losses or pitfalls that exist before internal security controls or mitigating factors are implemented.

  • internal audit (IA)

    An internal audit is an organizational initiative to monitor and analyze its own business operations in order to determine how well it conforms to a set of specific criteria. 

  • internal control

    An internal control is a business practice, policy or procedure that is established within an organization to create value or minimize risk.

  • International Accounting Standards Board

    The International Accounting Standards Board is the independent standard-setting body of the IFRS Foundation.

  • intrusion detection system (IDS)

    An intrusion detection system (IDS) is a device or software application that alerts an administrator of a security breach, policy violation or other compromise that may adversely affect the administrator's information technology (IT) network. 

  • ISACA

    ISACA is an independent, nonprofit, global association that engages in the development, adoption and use of globally accepted information system (IS) knowledge and practices.

  • ISO 27002 (International Organization for Standardization 27002)

    The ISO 27002 standard is a collection of information security guidelines that are intended to help an organization implement, maintain, and improve its information security management.

  • IT audit (information technology audit)

    An IT audit is the examination and evaluation of an organization's information technology infrastructure, policies and operations.

  • IT controls

    An IT control is a procedure or policy that provides a reasonable assurance that the information technology (IT) used by an organization operates as intended, that data is reliable and that the organization is in compliance with applicable laws and regulations. Continued...

  • IT Governance Institute (ITGI)

    The IT Governance Institute (ITGI) is an arm of ISACA that provides research, publications and resources on IT governance and related topics.

  • M

    mobile governance

    Mobile governance refers to the processes and policies used to manage mobile device access to an organization's network or its data.

  • N

    National Information Assurance Partnership (NIAP)

    The National Information Assurance Partnership (NIAP) is a U.S. government program designed to meet the security testing needs of information technology consumers and developers. The

  • NERC CIP (critical infrastructure protection)

    The NERC CIP (critical infrastructure protection) plan is a set of requirements designed to secure assets vital to reliably operating North America's bulk electric system.

-ADS BY GOOGLE

SearchCIO

SearchHealthIT

SearchCloudComputing

SearchDataCenter

SearchDataManagement

SearchSecurity

Close