Shared Assessments
  • Membership
    • Why Shared Assessments?
    • Members and Subscribers
    • Licensees
    • Assessment Firms
    • Success Story
    • Committees
  • Products
    • SIG
    • SCA
    • VRMMM
    • Data Governance
    • ESG SIG
    • Request a Demo
    • Get Support
    • Access Products
  • Education
    • TPRM Fundamentals
    • SIG Fundamentals
    • CTPRP Certification
    • CTPRA Certification
    • Success Stories
  • Events
    • Upcoming Webinars
    • On-Demand Webinars
    • Summit
  • Learn
    • Blog
    • Papers
    • Studies
    • Framework
    • Glossary
  • Login
  • My Account
    • Portal
    • Logout
  • Demo
Select Page

Glossary

The Shared Assessments Third-Party Risk Management (TPRM) definitions are TPRM specific and Shared Assessments Program centric.

Register to Download

Browse Alphabetically

  • #
  • a
  • b
  • c
  • d
  • e
  • f
  • g
  • h
  • i
  • j
  • k
  • l
  • m
  • n
  • o
  • p
  • q
  • r
  • s
  • t
  • u
  • v
  • w
  • x
  • y
  • z

Showing search result for "e"

  • e-Privacy (EU-specific)
  • EEO Data Collections
  • Electronic Health Records (EHR – also called Electronic Medical Record - EMR)
  • Electronic System
  • Emergency Periods
  • Encryption
  • End-Point Security
  • Enterprise Risk Management (ERM)
  • Environmental Management System (EMS)
  • Environmental Risk
  • Environmental, Social and Governance risks (ESG risks)
  • Environmental, Social, and Corporate Governance (ESG)
  • Equal Employment Opportunity Commission (EEOC)
  • ESG Performance
  • Ethical Sourcing
  • EU (European Union) Directive
  • EU Non-Financial Reporting Directive
  • EU Regulation on Sustainability-Related Disclosures in the Financial Services Sector (SFDR)
  • Event
  • Exclusion (and Exception)
  • Exit Strategy
  • External Parties
  • External Vulnerability Scan
  • Externally Facing
  • Extranet
close
Term:
Acceptable use policy
Definition:
A set of rules applied by the owner or manager of a network, website, service, or large computer system that restricts the ways in which the network, website, or system may be used. It may include password management, software licenses and online intellectual property, as well as basic interpersonal etiquette, particularly in email and bulletin board conversations. It should also clearly define the sanctions applied if a user violates the policy.

Shared Assessments

login contact request demo

  • Twitter

Products

  • SIG
  • SCA
  • VRMMM
  • Data Governance
  • Support

certifications

  • CTPRP
  • CTPRA

About Us

  • Our Mission
  • Leadership Team
  • Advisory Board
  • Steering Committee
  • News
  • Awards

OUR POLICIES

  • Terms
  • Privacy
  • Cookies Settings
  • Event Terms & Conditions
  • Diversity, Equity & Inclusion
  • Neutrality Statement

join our newsletter

Learn more about upcoming events, special offers from our partners and more.

© 2023 Shared Assessments LLC

×

Terms of Use

I have read and agree to the Terms of Use

Agree Cancel
×

Terms of Use

I have read and agree to the Terms of Use

Agree Cancel
×

Oh No!

It looks like you don't have access to this tool. You can gain access by becoming a member or a subscriber.

Become a Member Subscribe


Support