Compliance Management Definitions

This glossary explains the meaning of key words and phrases that information technology (IT) and business professionals use when discussing compliance strategy and related software products. You can find additional definitions by visiting WhatIs.com or using the search box below.

  • D

    data governance policy

    A data governance policy is an organization’s set of information management processes that are designed to assist business administration and protect company assets.

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, procedures or technologies affect individuals’ privacy and eliminate any risks that might violate compliance.

  • Dossia

    Dossia is a Web-based framework for storing and managing personal health records (PHR). With Dossia, a qualified individual can aggregate his medical data from insurance claims and pharmacy records and store them in a private, encrypted electronic health record that can be securely accessed over the Internet.

  • E

    EDRM (electronic discovery reference model)

    The Electronic Discovery Reference Model (EDRM) is a framework that outlines standards for the recovery and discovery and of digital data.

  • Electronic Communications Privacy Act (ECPA)

    The Electronic Communications Privacy Act (ECPA) is a United States federal statute that prohibits a third party from intercepting or disclosing communications without authorization.

  • electronically stored information (ESI)

    Electronically stored information (ESI) is data created, altered, communicated and stored in digital form.

  • enterprise document management (EDM)

    Enterprise document management is a strategy for overseeing an organization's paper and electronic documents so they can be easily retrieved in the event of a compliance audit or subpoena.

  • enterprise security governance

    Enterprise security governance is a company's strategy to reduce risk by protecting systems and information, as well as its execution of that strategy.

  • Event log management software (ELMS)

    Event log management software (ELMS) is an application used to monitor change management and prepare for compliance audits at enterprises.

  • event log manager (ELM)

    An event log manager (ELM) is an application that tracks changes in an organization's IT infrastructure.

  • F

    Fair Credit Reporting Act (FCRA)

    The Fair Credit Reporting Act (FCRA) is United States federal legislation that promotes accuracy, fairness and privacy for data used by consumer reporting agencies.

  • FASAB (Federal Accounting Standards Advisory Board)

    The Federal Accounting Standards Advisory Board (FASAB) is an advisory committee that develops accounting standards for U.S. government agencies.

  • Financial Industry Regulatory Authority (FINRA)

    The Financial Industry Regulatory Authority (FINRA) is an independent regulator securities firms doing business in the United States. Securities are financial instruments, such as stocks or bonds, that can be traded freely on the open market. 

  • FPCA (Foreign Corrupt Practices Act)

    The Foreign Corrupt Practices Act (FCPA) is a federal U.S. law aimed at preventing the bribery of foreign government officials in an effort to obtain or retain business.

  • FTC (Federal Trade Commission)

    The FTC (Federal Trade Commission) is a United States federal regulatory agency designed to monitor and prevent anticompetitive, deceptive or unfair business practices.

-ADS BY GOOGLE

SearchCIO

SearchHealthIT

SearchCloudComputing

SearchDataCenter

SearchDataManagement

SearchSecurity

Close