UK Corporate Governance Code (formerly known as the Combined Code)

UK Corporate Governance Code (formerly known as the Combined Code): A framework that sets out standards for good practice in relation to board leadership, effectiveness, remuneration, and accountability in the governance of UK-listed companies. It operates under a ‘comply or explain’ approach, whereby companies must publicly state their compliance with the code’s principles or provide […]

Unclassified

Unclassified: Information that does not require any special protection or handling procedures. This data can be freely shared or distributed without significant risk of harm or violation of privacy. Despite its designation, unclassified information should still be managed responsibly to maintain the integrity and reputation of an organization.

USA PATRIOT Act of 2001

USA PATRIOT Act of 2001: Officially the Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act, it’s a legislative act signed into law to enhance law enforcement investigatory tools following the September 11 terrorist attacks. The act increased the ability of law enforcement agencies to search telephone, email communications, […]

User awareness

User awareness: The knowledge and understanding of security risks and best practices among users of a system or network. It is an essential element of an effective security program, as users are often the first line of defense against threats. Examples include educating users on password security, phishing scams, and safe browsing habits.

Transitive access

Transitive access: The ability to access a resource through another resource that the user has access to. It is used in access control systems to grant access to multiple resources based on a single permission. Examples -transitive access through group membership in Active Directory, transitive access through role-based access control, transitive access through access control […]

Transparency

Transparency: The principle of allowing users, stakeholders, and the public to understand and review the processes, protocols, and practices used to secure systems, services, and data. This openness is crucial for building trust, as it assures that measures are implemented to protect data and maintain privacy.