Shared Assessments
  • Membership
    • Why Shared Assessments?
    • Members and Subscribers
    • Licensees
    • Assessment Firms
    • Success Story
    • Committees
  • Products
    • SIG
    • SCA
    • VRMMM
    • Data Governance
    • Request a Demo
    • Get Support
    • Access Products
  • Certification
    • CTPRP
    • CTPRA
    • Success Stories
  • Training & Events
    • TPRM Fundamentals
    • SIG Fundamentals
    • Upcoming Webinars
    • On-Demand Webinars
    • Summit
  • Learn
    • Blog
    • Papers
    • Studies
    • Framework
    • Glossary
  • Login
  • My Account
    • Logout
  • Demo
Select Page

Glossary

The Shared Assessments Third-Party Risk Management (TPRM) definitions are TPRM specific and Shared Assessments Program centric.

Register to Download

Browse Alphabetically

  • #
  • a
  • b
  • c
  • d
  • e
  • f
  • g
  • h
  • i
  • j
  • k
  • l
  • m
  • n
  • o
  • p
  • q
  • r
  • s
  • t
  • u
  • v
  • w
  • x
  • y
  • z

Showing search result for "i"

  • Identity Proofing
  • Immediate Perimeter
  • Incident
  • Incident Communication Management
  • Incident Response Plan
  • Incident Severity
  • Information Assets
  • Information Assurance and Security
  • Information Fragmentation
  • Information Security
  • Infrastructure as a Service (IaaS)
  • Inherent Risk
  • Institutional Investors Group on Climate Change
  • Integrated Risk Management (IRM) Platform
  • Integrity
  • Interactive Application Security Testing (IAST)
  • Intermediate Distribution Frame IDF
  • Internal Vulnerability Scan
  • International Integrated Reporting Council (IIRC)
  • International Labour Organization (ILO)
  • International Organization for Standardization (ISO)
  • Internet Protocol (IP)
  • Internet Protocol Address (IP Address)
  • Internet-Facing
  • Intranet
  • Introspection Service
  • Intrusion Detection Systems (IDS)
  • Intrusion Protection System (IPS)
  • Inventory (See also Register)
  • IoT (Internet of Things)
  • ISO
  • Issue
  • IT Operations Management
close
Term:
Acceptable use policy
Definition:
A set of rules applied by the owner or manager of a network, website, service, or large computer system that restricts the ways in which the network, website, or system may be used. It may include password management, software licenses and online intellectual property, as well as basic interpersonal etiquette, particularly in email and bulletin board conversations. It should also clearly define the sanctions applied if a user violates the policy.

Shared Assessments

login contact request demo

  • Twitter

Products

  • SIG
  • SCA
  • VRMMM
  • Data Governance
  • Support

certifications

  • CTPRP
  • CTPRA

About Us

  • Our Mission
  • Leadership Team
  • Advisory Board
  • Steering Committee
  • News
  • Awards

OUR POLICIES

  • Terms
  • Privacy
  • Cookies Settings
  • Event Terms & Conditions
  • Diversity, Equity & Inclusion
  • Neutrality Statement

join our newsletter

Learn more about upcoming events, special offers from our partners and more.

© 2023 Shared Assessments LLC

×

Terms of Use

I have read and agree to the Terms of Use

Agree Cancel
×

Terms of Use

I have read and agree to the Terms of Use

Agree Cancel
×

Oh No!

It looks like you don't have access to this tool. You can gain access by becoming a member or a subscriber.

Become a Member Subscribe


Support