Escrow
Escrow Agreement An arrangement with a mutual 3rd party who will hold the source code of an application, or other data, under contact. Under agreed circumstances, for example when a software developer goes out of business, the 3rd party will…
Escrow Agreement An arrangement with a mutual 3rd party who will hold the source code of an application, or other data, under contact. Under agreed circumstances, for example when a software developer goes out of business, the 3rd party will…
Customer Relationship Management Software used to retain information about a customer including corporate data, contact information and sales activities.
Mobile Device Management Software or Security policy to manage information deployed on mobile devices. May include remote locking and erasing capabilities.
Bring Your Own Device The culture of employees using their own laptop, phones and other devices for work purposes. Organisation’s may apply varying levels of control over personal devices, with the consent of the owner.
Internet of Things The popular name for connecting household, and everyday, objects to the Internet and each other.
Transport Layer Security A protocol to provide a secure connection, often used for email and other data transfers.
Secure Socket Layer A secure Internet connection which established an encrypted link between the user and web server to protect data in transit and verify the source.
Active Directory A Microsoft network technology allowing central management of users, security policy and network services.
Standard Operating Procedure A documented guide for carrying out routine operations.
SAQ Self Assessment Questionnaire A PCI requirement for an organisation to complete a questionnaire and make a attestation of compliance. Usually for lower volumes of card transactions.