A | B |
audit | Process by which an organization’s accounts and records are verified |
business continuity | An organization’s ability to function during and after a disaster |
compliance | Fulfilling the requirements of the law |
consistency | Stability; regularity |
data | Facts and figures |
data processing | Converting facts and figures into useful information |
decision-making | Choosing among alternatives |
hack | Unauthorized access to a computer system |
information | Data presented in a useful form |
information management | The process of accessing, processing, maintaining, evaluating, and disseminating knowledge, facts, or data for the purpose of assisting business decision-making |
information overload | Communication that is too much and/or comes too fast to process at one time |
management information system | An integrated technology that assists with an organization’s information management needs |
outsourcing | Acquiring assistance from outside organizations/consultants to obtain goods or services to accomplish business objectives or perform primary business activities |
proprietary information | Private information that belongs to an organization and cannot be released to the public |
Sarbanes-Oxley Act | A U.S. regulation mandating that public businesses comply with specific accounting requirements |
spam | Junk email that the recipient did not request; also known as unsolicited commercial email |
trade secret | Undisclosed information within a particular business or industry |
viruses | Computer programs that download to your computer or network without your permission; programs designed to disrupt computer operations |
wireless network | A computer network connected without the use of wires or cables |