Shared Assessments
  • Membership
    • Why Shared Assessments?
    • Members and Subscribers
    • Licensees
    • Assessment Firms
    • Success Story
    • Committees
  • Products
    • SIG
    • SCA
    • VRMMM
    • Data Governance
    • Request a Demo
    • Get Support
    • Access Products
  • Certification
    • CTPRP
    • CTPRA
    • Success Stories
  • Training & Events
    • TPRM Fundamentals
    • SIG Fundamentals
    • Upcoming Webinars
    • On-Demand Webinars
    • Summit
  • Learn
    • Blog
    • Papers
    • Studies
    • Framework
    • Glossary
  • Login
  • My Account
    • Logout
  • Demo
Select Page

Glossary

The Shared Assessments Third-Party Risk Management (TPRM) definitions are TPRM specific and Shared Assessments Program centric.

Register to Download

Browse Alphabetically

  • #
  • a
  • b
  • c
  • d
  • e
  • f
  • g
  • h
  • i
  • j
  • k
  • l
  • m
  • n
  • o
  • p
  • q
  • r
  • s
  • t
  • u
  • v
  • w
  • x
  • y
  • z

Showing search result for "d"

  • Data Actions
  • Data Breach
  • Data Classification Program
  • Data Controller (EU Directive & GDPR-specific)
  • Data Element
  • Data Flow (GDPR-specific)
  • Data Integrity
  • Data Inventory
  • Data Lineage and Data Provenance
  • Data Loss Prevention (DLP) program
  • Data Masking (See also Obfuscation)
  • Data Mining
  • Data Mirroring
  • Data Portability (HIPAA, GDPR)
  • Data Privacy and Security Addendums
  • Data Processing Agreement (DPA) (GDPR)
  • Data Processing Ecosystem
  • Data Processor (GDPR)
  • Data Protection Impact Assessment (DPIA)
  • Data Repository
  • Data Room
  • Data Segmentation
  • Data Subject
  • Data Subject Access Requests (DSARs)
  • Data Subject Category
  • Data Synchronization
  • De minimus
  • Deep Learning
  • Defense-in-depth
  • Degree of Assurance
  • Demilitarized Zone (DMZ)
  • Dependency Chart
  • Detective Control
  • Disaster Recovery (DR)
  • Distributed Denial of Service (DDoS)
  • Diversity, Equity, and Inclusion (DEI)
  • Dow Jones Sustainability Index (DJSI)
  • Due Diligence for Service Provider Selection
  • Due Diligence Process
  • Dynamic Application Security Testing (DAST)
close
Term:
Acceptable use policy
Definition:
A set of rules applied by the owner or manager of a network, website, service, or large computer system that restricts the ways in which the network, website, or system may be used. It may include password management, software licenses and online intellectual property, as well as basic interpersonal etiquette, particularly in email and bulletin board conversations. It should also clearly define the sanctions applied if a user violates the policy.

Shared Assessments

login contact request demo

  • Twitter

Products

  • SIG
  • SCA
  • VRMMM
  • Data Governance
  • Support

certifications

  • CTPRP
  • CTPRA

About Us

  • Our Mission
  • Leadership Team
  • Advisory Board
  • Steering Committee
  • News
  • Awards

OUR POLICIES

  • Terms
  • Privacy
  • Cookies Settings
  • Event Terms & Conditions
  • Diversity, Equity & Inclusion
  • Neutrality Statement

join our newsletter

Learn more about upcoming events, special offers from our partners and more.

© 2023 Shared Assessments LLC

×

Terms of Use

I have read and agree to the Terms of Use

Agree Cancel
×

Terms of Use

I have read and agree to the Terms of Use

Agree Cancel
×

Oh No!

It looks like you don't have access to this tool. You can gain access by becoming a member or a subscriber.

Become a Member Subscribe


Support