Regulatory compliance needs Definitions

  • A

    agreed-upon procedures (AUP)

    Agreed-upon procedures are the standards a company or client outlines when it hires an external party to perform an audit on specific tests or business process and then report on the results.

  • AICPA (American Institute of Certified Public Accountants)

    The AICPA (American Institute of Certified Public Accountants) is a member association for the accounting profession that sets ethical standards for accountants, as well as U.S. auditor standards for private companies, nonprofit organizations and the government.

  • Altman Z-score

    The Altman Z-score is a statistic that is useful for evaluating the financial health of a publicly traded manufacturing company. 

  • B

    Basel Committee on Banking Supervision (BCBS)

    The Basel Committee on Banking Supervision (BCBS) is a group of international banking authorities who work to strengthen the regulation, supervision and practices of banks and improve financial stability worldwide.

  • C

    California Consumer Privacy Act (CCPA)

    The California Consumer Privacy Act (CCPA) is legislation in the state of California that supports an individual's right to control their own personally identifiable information (PII).

  • Can Spam Act of 2003

    The Can Spam Act of 2003 is a commonly used name for the United States Federal law more formally known as S. 877 or the "Controlling the Assault of Non-Solicited Pornography and Marketing Act of 2003." The law took effect on January 1, 2004. The Can Spam Act allows courts to set damages of up to $2 million when spammers break the law.

  • Center for Internet Security (CIS)

    The Center for Internet Security (CIS) is a nonprofit organization focused on improving public- and private-sector cybersecurity readiness and response.

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • compliance risk

    Compliance risk is exposure to legal penalties, financial forfeiture and material loss an organization faces when it fails to act in accordance with industry laws and regulations, internal policies or prescribed best practices.

  • compliance validation

    In compliance, validation is a formal procedure to determine how well an official or prescribed plan or course of action is being carried out. Continued...

  • COMSEC (communications security)

    Communications security (COMSEC) is the prevention of unauthorized access to telecommunications traffic, or to any information that is transmitted or transferred.

  • COPPA (Children's Online Privacy Protection Act )

    The Children's Online Privacy Protection Act (COPPA) is a law passed by the U.S. Congress in 1998 to specifically protect the privacy of children under the age of 13 by requesting parental consent for the collection or use of any personal information of Web site users. The Act officially took effect in April 2000. COPPA specifies what a number of steps that Web site operators take. (...continued)

  • corporate social responsibility (CSR)

    Corporate social responsibility is an umbrella term used to describe voluntary corporate initiatives concerned with community development, the environment and human rights. 

  • Credit CARD Act (Credit Card Accountability, Responsibility, and Disclosure Act of 2009)

    The Credit CARD Act is legislation governing the behavior of credit card companies in the United States. The self-stated purpose of the Act is "To amend the Truth in Lending Act to establish fair and transparent practices relating to the extension of credit under an open end consumer credit plan, and for other purposes." The Act is more formally known as the Credit Card Accountability, Responsibility, and Disclosure Act of 2009.

  • D

    data governance policy

    A data governance policy is an organization’s set of information management processes that are designed to assist business administration and protect company assets.

-ADS BY GOOGLE

SearchCIO

SearchHealthIT

SearchCloudComputing

SearchDataCenter

SearchDataManagement

SearchSecurity

Close