Back to Resources

Glossary

Definitions of key terms in AI governance, compliance certifications, and regulated industry procurement.

A

Air-gapped

Deployment

A deployment where the system is completely isolated from external networks, including the internet. Air-gapped deployments are used for highly sensitive applications requiring maximum security.

Related: On-Premise, Network Isolation

B

BAA

Privacy

A Business Associate Agreement is a contract between a HIPAA covered entity and a business associate that establishes permitted uses and disclosures of PHI and security safeguards.

Related: HIPAA, PHI, Covered Entity

Bias Testing

AI & ML

The process of evaluating an AI system for unfair bias across different demographic groups. Bias testing helps identify and mitigate discriminatory outcomes in AI decision-making.

Related: Fairness, Demographic Parity, Red Teaming

C

CCPA

Privacy

The California Consumer Privacy Act gives California residents rights over their personal information, including the right to know what data is collected, delete it, and opt out of its sale.

Related: GDPR, CPRA, Privacy Rights

D

DPA

Privacy

A Data Processing Agreement is a legally binding contract between a data controller and data processor, required under GDPR when personal data processing is outsourced.

Related: GDPR, Data Controller, Data Processor

E

Explainability

AI & ML

The degree to which an AI system's decisions can be understood by humans. Explainable AI (XAI) helps users understand how and why a model made a particular prediction or decision.

Related: Model Card, Black Box, Interpretability

F

FedRAMP

Certifications

The Federal Risk and Authorization Management Program is a US government-wide program that provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services used by federal agencies.

Related: StateRAMP, ATO, JAB

G

GDPR

Privacy

The General Data Protection Regulation is a comprehensive data privacy law that applies to organizations operating in the European Union or processing data of EU residents.

Related: CCPA, Data Privacy, DPA

H

HIPAA

Certifications

The Health Insurance Portability and Accountability Act sets standards for protecting sensitive patient health information (PHI). HIPAA compliance is mandatory for covered entities and their business associates.

Related: PHI, HIPAA BAA, HITRUST

HITRUST

Certifications

The HITRUST CSF (Common Security Framework) is a certifiable framework that harmonizes requirements from various regulations and standards, commonly used in healthcare to demonstrate comprehensive security practices.

Related: HIPAA, CSF

I

ISO 27001

Certifications

An international standard for information security management systems (ISMS). Organizations certified to ISO 27001 have implemented a systematic approach to managing sensitive information.

Related: ISO 27701, ISMS

M

Model Card

AI & ML

Documentation that provides information about an ML model, including its intended use, performance characteristics, limitations, and ethical considerations. Model cards promote transparency and responsible AI development.

Related: Explainability, AI Transparency

O

On-Premise

Deployment

Deployment model where software is installed and runs on computers at the customer's physical location, giving organizations complete control over their infrastructure and data.

Related: SaaS, Hybrid, Self-Hosted

P

PCI DSS

Certifications

The Payment Card Industry Data Security Standard is a set of security standards designed to ensure that all companies that accept, process, store, or transmit credit card information maintain a secure environment.

Related: PCI, Credit Card Security

PHI

Privacy

Protected Health Information is individually identifiable health information held or transmitted by a covered entity or business associate, including demographic data, medical records, and payment information.

Related: HIPAA, ePHI, Covered Entity

PII

Privacy

Personally Identifiable Information is any data that could potentially identify a specific individual, such as name, address, social security number, or biometric data.

Related: PHI, Personal Data

R

Red Teaming

AI & ML

An adversarial testing approach where a team attempts to find vulnerabilities, biases, or harmful outputs in an AI system. Red teaming helps identify risks before deployment.

Related: Bias Testing, Adversarial Testing

S

SaaS

Deployment

Software as a Service is a cloud-based delivery model where software is hosted by a provider and accessed by customers over the internet, typically via subscription.

Related: Cloud, On-Premise, PaaS

SOC 2

Certifications

Service Organization Control 2 is an auditing procedure developed by the AICPA that evaluates how well a service provider manages data based on five Trust Service Criteria: security, availability, processing integrity, confidentiality, and privacy.

Related: SOC 2 Type II, AICPA, Trust Service Criteria

SOC 2 Type II

Certifications

A SOC 2 audit that evaluates the operating effectiveness of controls over a period of time (typically 6-12 months), as opposed to Type I which only evaluates control design at a point in time.

Related: SOC 2, SOC 2 Type I

StateRAMP

Certifications

A security authorization program for cloud service providers serving state and local government agencies. Similar to FedRAMP but with requirements tailored for non-federal government use.

Related: FedRAMP

V

VPC

Deployment

A Virtual Private Cloud is an isolated cloud environment dedicated to a single organization. VPCs provide enhanced security and control while maintaining cloud scalability.

Related: Private Cloud, Cloud, Network Isolation

Missing a Term?

Let us know if there's a term you'd like us to add to the glossary.

Suggest a Term