Are you puzzled by Business Technology terms or abbreviations? Are you looking for a dictionary that explains these Business Technology terms in plain English? Then you are at the right place. Reintivity’s Business Technology Glossary lists and explains the most commonly used terms in Business Technology news, content and resources. This is the best place for Business Technology beginners to start and familiarize themselves with Business Technology lingo.
- Accountable Care Organization
- Advanced Encryption Standard
- Border Gateway Protocol
- Brute Force Password Attack
- Business Continuity Plan
- Business Impact Analysis
- Centers for Medicare & Medicaid Services
- Certificate Authority
- Certificate Signing Request
- Computer Security Incident Response Team
- Computerized Provider Order Entry
- Consolidated Clinical Document Architecture
- Consolidated Health Informatics
- Cybersecurity Advisory
- Cybersecurity and Infrastructure Security Agency
- Cybersecurity Framework
- Decision-Support System
- Department of Homeland Security
- Electronic Health Record
- Electronic Prescribing
- Endpoint Protection Platform
- Federal Health Architecture
- General Services Administration
- Health Information Exchange
- Health Information Technology
- Health Information Technology Advisory Committee
- Health Information Technology for Economic and Clinical Health
- Health Insurance Portability and Accountability Act
- Health Level Seven
- Healthcare Information Technology Standards Panel
- Chicago .NET Users Group
- Information and Communications Technology
- Information Systems Security
- Information Technology
- Integrating the Healthcare Enterprise
- Internet Engineering Task Force
- Internet of Things
- Internet Protocol
- Internet Protocol Version 6
- Internet Service Provider
- Knowledge-Based Authentication
- Knowledge-Based Proofing
- Knowledge-Based Verification
- Local Area Network
- Mean Time to Respond
- Model Privacy Notice
- Multi-Factor Authentication
- Multi-State Information Sharing and Analysis Center
- National Center for Education Statistics
- National Institutes of Health
- National Institutes of Health Information Technology Acquisition and Assessment Center
- Network Operations Center
- One-Time Password
- Patient Data Management System
- Personal Computer
- Personal Health Record
- Personal Identification Number
- Personally Identifiable Information
- Protected Health Information
- Public Switched Telephone Network
- Qualitative Risk Analysis
- Quality Management System
- Quantitative Risk Analysis
- Remote Desktop Protocol
- Security Risk Assessment
- Transport Layer Security
- Trusted Computing Base
- Trusted Internet Connections
- Trusted Operating System
- Trusted Platform Module
- Trusted Third Party
- Two-Factor authentication
- Unified Extensible Firmware Interface
- Uniform Resource Locator
- Uninterruptible Power Supply
- Universal Serial Bus
- Virtual Private Cloud
- Virtual Private Network
- Voice Over Internet Protocol
- Wide Area Network
- Wireless Access Point
- Zero-Day Attack
- Zero-Day Exploit
- Zero-Knowledge Proof
- Zero Trust Architecture