World Intellectual Property Office (WIPO)
World Intellectual Property Organization (WIPO): An international organization that promotes and facilitates the protection and enforcement of intellectual property rights globally through services such as the registration and protection of trademarks, patents, and copyrights under international treaties and systems.
Zachman framework
Zachman framework: A system for categorizing and organizing the components of an enterprise architecture. It is used by organizations to help plan, design, and implement complex information systems and to ensure alignment with business goals and strategies. Examples of Zachman framework components include data, function, network, people, and time.
Wassenaar Arrangement
Wassenaar Arrangement: An international accord that governs the export of conventional arms and dual-use goods and technologies, such as advanced cryptographic systems, which can have both civilian and military applications. Its purpose is to prevent the proliferation of arms and sensitive technologies that could be misused to undermine security and stability, ensuring that transfers do […]
Whistleblowing
Whistleblowing: The act of reporting illegal or unethical behavior within an organization. It is often used in the field of IT security to report issues such as cyber-attacks, data breaches, or unauthorized access to sensitive information. Examples of whistleblowing in IT security might include reporting a colleague who has accessed company data without permission or […]
USA PATRIOT Act of 2001
USA PATRIOT Act of 2001: Officially the Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act, it’s a legislative act signed into law to enhance law enforcement investigatory tools following the September 11 terrorist attacks. The act increased the ability of law enforcement agencies to search telephone, email communications, […]
User ID
User ID: A unique identifier assigned to a user to authenticate their identity when accessing a system or network. It is used in authentication systems to verify a user’s identity and grant them access to appropriate resources. Examples include a username, employee ID, and social security number.