Browse — Sensitivity · Confidential
21 terms
TermTypeDefinitionClassificationsUpdated
Access MatrixnounAn Access Matrix uses rows to represent subjects and columns to represent objects with privileges listed in each cell.ArtifactConfidential
Assurance CasenounA structured set of arguments and a body of evidence showing that an information system satisfies specific claims with respect to a given quality attribute.ArtifactConfidential
Business ValuenounHow much a business is worth. Business value is a highly subjective measure because it involves estimating the value of intangible assets like trade secrets and brand recognition. It adds to this the value of tangible assets like machinery and stockholder equity. Business value is especially important for potential investors or buyers.MetricConfidentialIP
contractnounA document that records the terms and conditions of a legally binding agreement.ArtifactConfidential
contractual requirementnounWritten and signed stipulations (within the said contract) employed in controlling, directing, or managing an activity, organization, or system.RequirementConfidential
Engagement LetternounThis record contains formal agreements to perform services in exchange for compensation.ArtifactConfidential
formal contractnounAn officially recognized agreement between two or more parties.RequirementConfidentialIP
Intangible assetnounAn asset that is not physical in nature Scope Note: Examples include: intellectual property (patents, trademarks, copyrights, processes), goodwill, and brand recognitionArtifactConfidentialIP
internal auditnounAn audit that is performed for the management and other internal purposes by individuals who are employed by the organization.ProcessConfidential
internal audit reportnounA report issued by an independent auditor within an organization that expresses an opinion about whether the financial statements present fairly a company's financial position, operating results, and cash flows in accordance with generally accepted accounting principles.ArtifactConfidential
network diagramnounA description of any kind of locality in terms of its physical layout. In the context of communication networks, a topology describes pictorially the configuration or arrangement of a network, including its nodes and connecting communication lines.ArtifactConfidential
outsourcing contractnounThe outsourcing contract is one of the most important document in an outsourcing relationship. The contract, terms and the quality of the contract will largely influence the outsourcing relations, governance and overall the success of the outsourcing venture.RequirementConfidential
Outsourcing Service ContractnounThis record contains acquisition or outsourcing contracts for IT services.ArtifactConfidential
Privacy Impact AssessmentnounAn analysis of how information is handled: 1) to ensure handling conforms to applicable legal, regulatory, and policy requirements regarding privacy; 2) to determine the risks and effects of collecting, maintaining, and disseminating information in identifiable form in an electronic information system; and 3) to examine and evaluate protections and alternative processes for handling information to mitigate potential privacy risks.ArtifactConfidentialPII
Risk Assessment ReportnounThe report which contains the results of performing a risk assessment or the formal output from the process of assessing risk.ArtifactConfidential
security assessment reportnounAny published finding of security component audits such as a vulnerability assessment.ArtifactConfidential
Source codenounSoftware program instructions written in a format (language) readable by humans.DataConfidentialIP
third party contractnounMeans a contract or purchase order awarded by the Recipient or subrecipient to a vendor or contractor.RequirementConfidential