Shared Assessments
  • Membership
    • Why Shared Assessments?
    • Members
    • Licensees
    • Assessment Firms
    • Success Story
    • Committees
  • Products
    • SIG
    • SCA
    • VRMMM
    • Data Governance
    • Request a Demo
    • Get Support
    • Access Products
  • Certification
    • CTPRP
    • CTPRA
    • Success Stories
  • Training & Events
    • TPRM Fundamentals
    • SIG Fundamentals
    • Upcoming Webinars & Workshops
    • On-Demand Webinars & Workshops
    • Summit
  • Learn
    • Blog
    • Papers
    • Studies
    • Framework
    • Glossary
  • Login
  • My Account
    • Logout
  • Demo
Select Page

Glossary

The Shared Assessments Third-Party Risk Management (TPRM) definitions are TPRM specific and Shared Assessments Program centric.

Register to Download

Browse Alphabetically

  • #
  • a
  • b
  • c
  • d
  • e
  • f
  • g
  • h
  • i
  • j
  • k
  • l
  • m
  • n
  • o
  • p
  • q
  • r
  • s
  • t
  • u
  • v
  • w
  • x
  • y
  • z

Showing search result for "t"

  • Tabletop Exercises
  • Target Data (See also Scoped Data)
  • Target Residual Risk
  • Target Risk
  • Target System
  • Task Force on Climate-related Financial Disclosures (TCFD)
  • Technology Service Provider (TSP)
  • Third-Party
  • Third-Party Data
  • Third-Party Inventory (in certain jurisdictions referred to as a Third-Party Register)
  • Third-Party Risk
  • Third-Party Risk Management (See Vendor Risk Management)
  • Third-Party Risk Management Return on Investment (ROI)
  • Third-Party Risk Rating
  • Third-Party Risk Register
  • Threat Impact Calculation Method
  • Threat Intelligence
  • Threat Management
  • Threat Modeling
  • Threat Probability Calculation Method
  • Token
  • Transition Risk
  • Transmission Control Protocol (TCP)
  • Transport Layer Security (TLS)
  • True Ceiling
  • True Floor
  • Trusted Path
  • Two-factor Authentication (See Multi-Factor Authentication)
close
Term:
Acceptable use policy
Definition:
A set of rules applied by the owner or manager of a network, website, service, or large computer system that restricts the ways in which the network, website, or system may be used. It may include password management, software licenses and online intellectual property, as well as basic interpersonal etiquette, particularly in email and bulletin board conversations. It should also clearly define the sanctions applied if a user violates the policy.

Shared Assessments

login contact request demo

  • Twitter

Products

  • SIG
  • SCA
  • VRMMM
  • Data Governance
  • Support

certifications

  • CTPRP
  • CTPRA

About Us

  • Our Mission
  • Leadership Team
  • Advisory Board
  • Steering Committee
  • News
  • Awards

OUR POLICIES

  • Terms
  • Privacy
  • Cookies Settings
  • Event Terms & Conditions
  • Diversity, Equity & Inclusion
  • Neutrality Statement

join our newsletter

Learn more about upcoming events, special offers from our partners and more.

© 2023 Shared Assessments LLC

×

Terms of Use

I have read and agree to the Terms of Use

Agree Cancel
×

Terms of Use

I have read and agree to the Terms of Use

Agree Cancel
×

Oh No!

It looks like you don't have access to this tool. You can gain access by becoming a member or a subscriber.

Become a Member Subscribe


Support