Are you puzzled by Business Technology terms or abbreviations? Are you looking for a dictionary that explains these Business Technology terms in plain English? Then you are at the right place. Reintivity’s Business Technology Glossary lists and explains the most commonly used terms in Business Technology news, content and resources. This is the best place for Business Technology beginners to start and familiarize themselves with Business Technology lingo.
- AaaS
- Accountable Care Organization
- ACO
- Advanced Encryption Standard
- AES
- BaaS
- BCP
- BEC
- BIA
- Biometric Information Privacy Act
- BIPA
- Border Gateway Protocol
- BPaaS
- Brute Force Password Attack
- Business Continuity Plan
- Business Email Compromise
- Business Impact Analysis
- CaaS
- CARE Framework
- CARE Modernization Framework
- CARE Modernization™ Framework
- CASBaaS
- CCaaS
- C-CDA
- CDNaaS
- Centers for Medicare & Medicaid Services
- Certificate Authority
- Certificate Signing Request
- Chicago .NET Users Group
- Children‘s Online Privacy Protection Act
- CISA
- Citizen Developer
- Citizen Development
- CMS
- Computerized Provider Order Entry
- Computer Security Incident Response Team
- Consolidated Clinical Document Architecture
- Consolidated Health Informatics
- COPPA
- CPaaS
- CPOE
- CSIRT
- CSR
- Cybersecurity and Infrastructure Security Agency
- Cybersecurity Framework
- DaaS
- Data Loss Prevention
- DBaaS
- DDoS
- DDoSaaS
- Decision-Support System
- DEMaaS
- Denial-of-service
- Denial of Service
- Department of Homeland Security
- DHS
- DKIM
- DLaaS
- DLP
- DLPaaS
- DMARC
- DNS
- DNSaaS
- Domain-based Message Authentication, Reporting, and Conformance
- DomainKeys Identified Mail
- Domain Name System
- DoS
- DRaaS
- DSS
- DWaaS
- EaaS
- EdgeaaS
- EDR
- EdTech-aaS
- EHR
- Electronic Health Record
- Electronic Prescribing
- ELTaaS
- Endpoint Detection and Response
- Endpoint Protection Platform
- EPP
- eRx
- EternalBlue
- ETLaaS
- EUEMaaS
- FaaS
- Family Educational Rights and Privacy Act
- Federal Health Architecture
- FERPA
- FHA
- FWaaS
- GaaS
- General Services Administration
- GISaaS
- GLBA
- Gramm-Leach-Bliley Act
- GSA
- HaaS
- Healthcare Information Technology Standards Panel
- Health Information Exchange
- Health Information Technology
- Health Information Technology Advisory Committee
- Health Information Technology for Economic and Clinical Health
- Health Insurance Portability and Accountability Act
- Health Level Seven
- HIE
- HIPAA
- HITAC
- HITECH
- HITSP
- HL7
- HPCaaS
- HRaaS
- IaaS
- ICT
- IDaaS
- IDS
- IETF
- IHE
- Incident Response Plan
- Information and Communications Technology
- Information Systems Security
- Information Technology
- INFOSEC
- Integrating the Healthcare Enterprise
- Internet Engineering Task Force
- Internet of Things
- Internet Protocol
- Internet Protocol Version 6
- Internet Service Provider
- Intrusion Detection System
- Intrusion Prevention System
- IoT
- IoTaaS
- IP
- iPaaS
- IPS
- IPv6
- IRP
- ISP
- KaaS
- KBV
- Knowledge-Based Authentication
- Knowledge-Based Proofing
- Knowledge-Based Verification
- LAN
- Legal-aaS
- LLMaaS
- Local Area Network
- MaaS
- Malvertising
- MAMaaS
- Man-in-the-Middle
- Man In The Middle
- Master Data Management
- MDM
- MDMaaS
- Mean Time to Respond
- MFA
- MFAaaS
- MiTM
- MLaaS
- Mobile Device Management
- Model Privacy Notice
- MPN
- MS-ISAC
- Multi-Factor Authentication
- Multi-State Information Sharing and Analysis Center
- NaaS
- National Center for Education Statistics
- National Institutes of Health
- National Institutes of Health Information Technology Acquisition and Assessment Center
- NCES
- Network Operations Center
- NIH
- NITAAC
- NOC
- OaaS
- One-Time Password
- Open Source Intelligence
- OSINT
- OTP
- PaaS
- PAMaaS
- Passkey
- Passkeys
- Patient Data Management System
- Payment Card Industry Data Security Standard
- PCI-DSS
- PDMS
- Personal Computer
- Personal Health Record
- Personal Identification Number
- Personal Information Protection Act
- Personally Identifiable Information
- PHI
- Phishing
- PHR
- PII
- PIPA
- PKIaaS
- Protected Health Information
- PSaaS
- PSTN
- Public Switched Telephone Network
- Qa/aS
- QMS
- Qualitative Risk Analysis
- Quality Management System
- Quantitative Risk Analysis
- RaaS
- RDP
- Remote Desktop Protocol
- Risk Assessment
- Robotic Process Automation
- RPA
- RPAaaS
- SaaS
- SASEaaS
- SD-WANaaS
- SECaaS
- Security Operations Center
- Security Risk Assessment
- Sender Policy Framework
- SIEMaaS
- Simple Mail Transfer Protocol
- SMTP
- SOARaaS
- SOC
- Solid-State Drive
- SPF
- SRA
- SSEaaS
- STaaS
- TaaS
- TCB
- TIC
- TLS
- TOS
- TPM
- Transport Layer Security
- Trusted Computing Base
- Trusted Internet Connections
- Trusted Platform Module
- Trusted Third Party
- Two-Factor authentication
- UCaaS
- UEFI
- Unified Extensible Firmware Interface
- Uniform Resource Locator
- Uninterruptible Power Supply
- Universal Serial Bus
- UPS
- URL
- USB
- VDIaaS
- Virtual Private Cloud
- Virtual Private Network
- Voice Over Internet Protocol
- VoIP
- VPC
- VPN
- WAN
- WAP
- Wide Area Network
- Wireless Access Point
- XaaS
- Zero-Day Attack
- Zero-Day Exploit
- Zero-Knowledge Proof
- Zero Trust Architecture
- ZTAaaS
- ZTNAaaS