Com•pli•ance Dictionary
Submit
  • Home
  • About
  • Subscribe
  • Log In
Submit
  • CCH account
  • roles & responsibilities
  • roles, responsibilities
  • CCD
  • CCS
  • CCO
  • ACH Operating Rules OCC Bulletin 2004 58
  • Rolls
  • responsibilities and roles
  • contingency roles, responsibilities
  • CCP
  • ccc
  • roles, and responsibilities
  • ACH
  • list of roles
  • privacy roles, responsibilities
  • role
  • cybersecurity roles, responsibilities
  • ACH authorization
  • CCI component
  • Telex rolls
  • Whisker poles
  • Dental rolls
  • Ink rolls
  • rules set
  • Hospital robes
  • Vaulting poles
  • roles, responsibilities, and skills
  • Dental rolls
  • Spinnaker poles
  • Telescoping poles
  • Transfer rolls
  • Tether poles
  • cybersecurity roles and responsibilities
  • ACH debit
  • ACH item
  • ACH credit
  • CCM v4.0.6
  • Hospital robes
  • MasterCard Rules
  • roles, responsibilities, and authorities
  • continuity roles and responsibilities
  • information security roles & responsibilities
  • roles, responsibilities, and competencies
  • roles, responsibilities and levels
  • business continuity roles, responsibilities
  • ACH return
  • CCI assembly
  • ACH operator
  • ACH payment
  • ACH batch
  • ACH router
  • ACH capture
  • ACH instruction
  • ACH device
  • CCM v4.0
  • C/CE
  • CCI equipment
  • ACH activity
  • ACH transaction
  • ACH file
  • ACH service
  • ACH entry
  • ACH process
  • Guidance on Mandatory Roles
  • locative role
  • participant role
  • patient role
  • role model
  • management role
  • support role
  • role-sharing
  • decisive role
  • cryptographic role
  • access role
  • senior role
  • recipient role
  • agent's role
  • role review
  • role monitoring
  • user role
  • security role
  • developer role
  • role definition
  • internal role
  • authorised role
  • role information
  • role change
  • role description
  • instrumental role
  • minor role
  • temporal role
  • privileged role
  • BCMS role
  • role membership
  • detection role
  • administrative role
  • role sharing
  • role modification
  • role deletion
  • system role
  • benefactive role
  • gender role
  • resultant role
  • role player
  • semantic role
  • theatrical role
  • title role
  • role statement
  • authorized role
  • authorization role
  • server role
  • key role
  • role creation
  • affected role
  • agentive role
  • critical role
  • relevant role
  • GRC role
  • leadership role
  • business role
  • administrator role
  • role transfer
  • managerial role
  • ACH service provider
  • uncollected ACH transaction
  • unauthorized ACH transaction
  • roles and responsibilities for detection
  • incident response roles and responsibilities
  • Distinguished Encoding Rules
  • rules of order
  • system of rules
  • attar of roses
  • Dried cut roses
  • key management roles metrics standard
  • Privacy Officer's roles and responsibilities
  • Project Management roles and responsibilities
  • technology security roles and responsibilities
  • information security roles and responsibilities
  • incident monitoring roles and responsibilities
  • on the ropes
  • Dried cut roses
  • Compliance Roles and Responsibilities policy
  • ACH settlement date
  • ACH debit activity
  • uncollected ACH deposit
  • ACH credit transaction
  • bed of roses
  • Abrasive cartridge rolls
  • fresh filled rolls
  • Cyber Security Rules
  • Guidance on non-mandatory roles
  • FINRA Rules, Section 4000, Financial and Operational Rules
  • Rules of Engagement
  • rules of behavior
  • Downhole fishing poles
  • unauthorized ACH debit
  • ACH contingency plan
  • ACH processing activity
  • ACH debit activity
  • international ACH requirement
  • ACH single-entry
  • ACH debit return
  • ACH exposure limit
  • ACH credit activity
  • role of metadata
  • IAM instance role
  • role model function
  • cc
  • role and responsibility
  • security management role
  • role-based training
  • ACH (Automated Clearing House) Operating Rules OCC Bulletin 2004-58, December 2004
  • CFO's Information Assurance roles and responsibilities
  • define and assign roles and responsibilities
  • cyber incident response roles and responsibilities
  • responsibility for shared information security roles
  • role-based administration
  • role-based access
  • decision-making role
  • customer facing role
  • cluster-admin role
  • security-related role
  • public database role
  • records management oversight roles and responsibilities
  • key management role
  • mission-critical role
  • role-based authorisation
  • privileged role assignment
  • privacy role, responsibility
  • privileged access role
  • C-SCRM role
  • role-playing exercise
  • change in role
  • CCE v5 - Apache 1.3
  • CCE v5 - Tomcat 4
  • CCE v5 - Tomcat 5
  • CCE v5 - Tomcat 6
  • internet initiated ACH transaction
  • security roles and responsibilities of constituent
  • cybersecurity incident response roles and responsibilities
  • Service Management role
  • DS Role Server
  • role password changed
  • information awareness role
  • Role Description Record
  • Information Technology role
  • vCenter administrator role
  • role-based authorization
  • information security role
  • business continuity role
  • data controller role
  • security roles and responsibilities metrics standard
  • property management leader's roles and responsibilities
  • security incident response roles and responsibilities
  • Dried cut spray roses
  • Information Technology Rules, 2011
  • Anglo-American Cataloguing Rules
  • Federal Rules of Evidence
  • Fresh cut spray roses
  • security roles and responsibilities metrics program
  • rules of the board
  • Robert's Rules of Order
  • Fresh cut spray roses
  • Free standing display poles
  • Dried cut spray roses
  • Rules of Professional Conduct
  • CCE v5 - Windows XP
  • CCE v5 - IIS 5
  • high risk ACH transaction
  • Rules for Archival Description
  • War of the Roses
  • Wars of the Roses
  • FINRA Rules, Section 0100
  • Regulation CC
  • Set password rules level
  • FINRA Rules, Section 4000
  • telephone-initiated ACH debit
  • CCE v5 - AIX 5.3
  • CCE v5 - Windows 2000
  • CCE v5 - Windows 7
  • internet-initiated ACH transaction
  • 3 CCR 702-6
  • Internet-initiated ACH debit
  • CCE v5 - Apache 2.2
  • high-risk ACH transaction
  • telephone initiated ACH transaction
  • telephone-initiated ACH transaction
  • ACH debit return volume
  • credit card payment system's roles and responsibilities
  • definition of personnel roles for handling incidents
  • CCE v5 - Windows Vista
  • CCE v5 - Apache 2.0
  • CCE v5 - IIS 6
  • ACH transaction processing procedure
  • role-based information access
  • strategic role and responsibility
  • role based access control
  • role-based access level
  • response and recovery role
  • logical access control role
  • suitable for the role
  • role and user access
  • virtual machine user role
  • incident response role responsibility
  • internal IT audit staff's roles and responsibilities
  • cyber security incident response roles and responsibilities
  • operational role and responsibility
  • role and rights concept
  • role of artificial intelligence
  • quality management committee role
  • information technology operations role
  • system development Project Management roles and responsibilities
  • Guidance on non-mandatory roles, March 2009
  • CCE v5 - Microsoft Office 2007
  • Cloud Security Alliance CCM V1.3
  • CCE v5 - Microsoft Exchange 2007
  • Role-Based Access Control
  • role of a system
  • Role password is changed
  • customer role and responsibility
  • security role and responsibility
  • group and role membership
  • role-based access profile
  • asset physical security role
  • role-based security training
  • The 'roles' that are not password protected
  • Oracle settings: Accounts assigned to '_CATALOG_' roles
  • Rules configurable items: Enabled Ports
  • Rules configurable items: Enabled Protocols
  • Instrument rolls for splint set
  • rules, regulations, procedures or guidelines
  • rules, regulation, procedures or guidelines
  • Set password rules domain timeout
  • Intravenous infusion poles for wheelchairs
  • Orthopedic casting rolls or tapes
  • Instrument rolls for splint sets
  • Veterinary instrument rolls for instruments
  • Instrument rolls for surgical instrument
  • Federal Rules of Evidence, 2012
  • rules, regulation, procedures, or guidelines
  • rules, regulations, procedures, or guidelines
  • privacy role and responsibility
  • role-based privacy training
  • Chilean Unique National Role
  • MasterCard Security Rules and Procedures
  • Instrument rolls for splint accessories
  • 'Configure Attack Surface Reduction rules'
  • CCE v5 - Microsoft Exchange 2010
  • CCE v5 - Sun Solaris 9
  • CCE v5 - Sun Solaris 10
  • CCE v5 - Windows Server 2008
  • CCE v5 - MS SQL 2005
  • ICH Q10 Pharmaceutical Quality System
  • Food service table covering rolls
  • Instrument rolls for dental instrument
  • India Information Technology Rules, 2011
  • Configure Attack Surface Reduction rules
  • incident response Point of Contact's roles and responsibilities
  • Federal Rules of Civil Procedure
  • Intravenous infusion poles for wheelchairs
  • Instrument rolls for veterinary instrument
  • rules on network security devices
  • The '/bin/csh' file: Permissions
  • CCE v5 - HP-UX 11.23
  • CCE v5 - Sun Solaris 8
  • CCE v5 - Microsoft Office 2010
  • CCE v5 - Polycom HDX 3
  • CCE v5 - Internet Explorer 7
  • CCE v5 - Windows Server 2003
  • The "csh shell" configurable item
  • The '/sbin/csh' file: Permissions
  • The '/etc/csh' file: Permissions
  • CCE v5 - MS SQL 2000
  • roles and responsibilities for Cyber Security Incident response
  • auditing process role and responsibility
  • senior management role and responsibility
  • assessment team's role and responsibility
  • IT audit role and responsibility
  • role-based access control policy
  • information assurance role and responsibility
  • legal counsel's role and responsibility
  • governance, risk, and compliance role
  • governance risk and compliance role
  • key custodian's role and responsibility
  • Guidance on Role Specific Training
  • C-SCRM role and responsibility
  • development-related role and responsibility
  • Instrument rolls for postmortem surgical instrument
  • Veterinary instrument rolls for instruments accessories
  • laws, rules, regulations, guidances or guidelines
  • rules, regulations, procedures, guidance or guidelines
  • rules, regulations, procedures, guidelines or guidance
  • system development role and responsibility
  • role based access control policy
  • Instrument rolls for postmortem surgical instruments
  • Diagnosis of dual-role transvestism
  • system continuity role and responsibility
  • security leader's role and responsibility
  • data controller's role and responsibility
  • security staff role and responsibility
  • external auditor's role and responsibility
  • governance, risk and compliance role
  • key management role and responsibility
  • Instrument rolls for dental instrument accessory
  • Instrument rolls for splint set accessory
  • Qatar Financial Centre Data Protection Rules
  • laws, rules, regulations, guidance, or guidelines
  • laws, rules, regulations, guidances, or guidelines
  • The "/etc/csh file" configurable item
  • CCE v5 - Microsoft Internet Explorer 8
  • The PATH variable: Double-colon rules
  • Federal Rules of Civil Procedure (2007)
  • Federal Rules of Civil Procedure 34
  • FINRA Rules, Section 0100, General Standards
  • laws, rules, regulations, procedures, or guidance
  • rules, regulations, procedures, guidance, or guidelines
  • The "/bin/csh file" configurable item
  • The "/sbin/csh file" configurable item
  • SQL Server settings: Users assigned to fixed database roles
  • Guidance on Mandatory Roles (AO, SIRO, IAO), March 2009
  • The '/usr/bin/csh' file: Permissions
  • CCE v5 - Oracle WebLogic Server 11g
  • board of directors' role and responsibility
  • facility security officer's role and responsibility
  • chief security officer's role and responsibility
  • technological security staff's role and responsibility
  • personnel with key information security role
  • high level operational role and responsibility
  • chief information officer's role and responsibility
  • Information Technology audit role and responsibility
  • internal audit staff's role and responsibility
  • cybersecurity supply chain risk management role
  • incident response Public Relations Point of Contact's roles and responsibilities
  • role-based information access metrics standard
  • business unit manager's role and responsibility
  • online sales department's role and responsibility
  • cluster role-based access control policy
  • design and development role and responsibility
  • Windows Firewall: Private: Apply local firewall rules
  • Rules No. 837/2006 on Electronic Surveillance
  • Windows Firewall: Public: Apply local firewall rules
  • roles and order of operations when a response is needed
  • mapped to organizational role-based list
  • role-based information access metrics program
  • internal audit manager's role and responsibility
  • Federal Rules of Civil Procedure 26 disclosure
  • Windows Firewall setting: Apply local firewall rules
  • Intravenous or arterial line poles or stands
  • information technology staff's role and responsibility
  • technology security leader's role and responsibility
  • customer database owner's role and responsibility
  • role is critical for the organization
  • CCE v5 - Microsoft Windows Server 2k8 R2
  • incident response network architecture point of contact's roles and responsibilities
  • Windows Firewall: Domain: Apply local firewall rules
  • Information Technology (Electronic Service Delivery) Rules, 2011
  • MasterCard Security Rules and Procedures, Merchant Edition
  • Instrument rolls for dental instruments or accessories
  • The "/usr/bin/csh file" configurable item
  • CCE v5 - Red Hat Enterprise Linux 4
  • CCE v5 - Red Hat Enterprise Linux 5
  • list of accounts with their corresponding role
  • Guidance on Role Specific Training, March 2009
  • critical facility management personnel's role and responsibility
  • role-specific security awareness and skills training
  • Harmonized Rules On Artificial Intelligence (Artificial Intelligence Act)
  • 'Windows Firewall: Public: Settings: Apply local firewall rules'
  • GUERNSEY FINANCIAL SERVICES COMMISSION CYBER SECURITY RULES, 2021
  • Windows Firewall: Public: Settings: Apply local firewall rules
  • system development project team's role and responsibility
  • incident response team member's role and responsibility
  • information security-related duty, role, and responsibility
  • Windows Firewall: Private: Apply local connection security rules
  • Standard 660S1: User Rules of Behavior, 660S1-01
  • The 'CREATE ROLE' privilege: Auditing on usage
  • ICH Q10 Pharmaceutical Quality System, Step 2 Version
  • Windows Firewall: Domain: Apply local connection security rules
  • Jammu and Kashmir Right to Information Rules, 2012
  • Iceland Rules No. 837/2006 on Electronic Surveillance
  • head of information security's role and responsibility
  • incident response location manager's role and responsibility
  • data controller's data quality role and responsibility
  • chief executive's information assurance role and responsibility
  • Windows Firewall: Public: Apply local connection security rules
  • Enforcement Rules of the Personal Data Protection Act
  • csh shell settings: Default umask for all users
  • The 'GRANT ANY ROLE' privilege: Auditing on usage
  • Chief of Risk's Information Assurance role and responsibility
  • archives and records management oversight's role and responsibility
  • role relevant to the SMS and the services
  • cybersecurity supply chain risk management role and responsibility
  • Windows Firewall settings: Apply Local Firewall Rules (Domain Profile)
  • Rules configurable items: Deny all traffic unless explicitly allowed
  • Qatar Financial Centre Data Protection Rules, DATA-VER1-Oct05
  • Windows Firewall: Public: Settings: Apply local connection security rules
  • 12 CFR Part 261, Rules Regarding Availability of Information
  • Windows Firewall settings: Apply Local Firewall Rules (Public Profile)
  • Nepal Rules Regarding Right to Information, 2065 B.S. (2009)
  • Taiwan Enforcement Rules of the Personal Data Protection Act
  • 'Windows Firewall: Public: Settings: Apply local connection security rules'
  • Oracle settings: Accounts with the maximum number of roles allowed in 'init.ora'
  • information technology facility management personnel's role and responsibility
  • human resources point of contact's role and responsibility
  • cryptographic, encryption and key management role and responsibility
  • The 'DROP ANY ROLE' privilege: Auditing on usage
  • chief financial officer's information assurance role and responsibility
  • internal information technology audit staff's role and responsibility
  • Windows Firewall settings: Apply Local Firewall Rules (Private Profile)
  • Rules of Shenzhen Municipality on the Publication of Government Information
  • Windows Firewall settings: Apply Local Connection Security Rules (Private Profile)
  • Windows Firewall settings: Apply Local Connection Security Rules (Public Profile)
  • rules for the acceptable use of information and of assets
  • Rules Nr. 299/2001 on the Security of Personal Data
  • China Computer Information Network International Interconnection Security Protection Management Rules
  • Oracle settings: Accounts having access to the 'DBA' role
  • Guidance on the DHR Mandatory Role Information Asset Owner
  • Windows Firewall settings: Apply Local Connection Security Rules (Domain Profile)
  • The diagnosis of social role conflict, not elsewhere classified 
  • ICH Guidance for Industry, E6 Good Clinical Practice: Consolidated Guidance
  • Account settings: User accounts and/or roles having access to the 'Oracle Enterprise Manager' (OEM)
  • allow everywhere except To and CC field
  • contractual terms and conditions governing the roles, relationships, obligations and responsibilities of all contracting parties
  • Iceland Rules Nr. 299/2001 on the Security of Personal Data
  • 16 CFR Part 681, The Fair Credit Reporting Act Identity Theft Rules
  • The init.ora file: REMOTE_OS_RULES (Operating System role for remote client connections)
  • System settings: Use Certificate Rules on Windows Executables for Software Restriction Policies
  • Configure Attack Surface Reduction rules: Set the state for each ASR rule
  • 'Configure Attack Surface Reduction rules: Set the state for each ASR rule'
  • Guidance on the DHR Mandatory Role: Information Asset Owner, March 2009
  • Rules configurable items: Outbound traffic can only access IP addresses within the DMZ
  • SQL Server settings: Accounts that have membership in the "sysadmin" server role
  • EudraLex Rules Governing Medicinal Products in the European Union Annex 11 Computerised Systems
  • ICH Guidance for Industry, Q7A Good Manufacturing Practice Guidance for Active Pharmaceutical Ingredients
  • Philippines Memorandum Circular No. 03-03-2005, Rules and Regulations on Broadcast Messaging Service
  • State of Alabama Office of Information Technology, Standard 660S1-01: User Rules of Behavior
  • Application of risk management for IT-networks incorporating medical devices Part 1: Roles, responsibilities and activities, Edition 1.0 2010-10
  • Rules no. 698/2004 on the Obligation to Notify and Processing Which Requires a Permit
  • 9070 - NFA Compliance Rules 2-9, 2-36 and 2-49: Information Systems Security Programs
  • Supplemental Principles on Human Resources Data and the Role of the Data Protection Authorities
  • 2000 - Rules and Regulations, Appendix B to Part 364—Interagency Guidelines Establishing Information Security Standards
  • Rules configurable items: Internal addresses are allowed to into the demilitarized zone (DMZ) from the Internet
  • Harmonized Rules On Artificial Intelligence (Artificial Intelligence Act) and Ameding Certain Union Legislative Acts, European Commission
  • role-based access for full data must be established, otherwise field data must be masked
  • Decision No 1 Dated 04/03/2010 on Determining the Details Rules for Safeguarding the Personal Data
  • China Ministry of Public Security Decree No. 33, Computer Information Network International Interconnection Security Protection Management Rules
  • New York Codes, Rules and Regulations, Title 23, Chapter 1, Part 500 Cybersecurity Requirements for Financial Services Companies
  • Rules configurable items: Internet addresses are allowed to into the demilitarized zone (DMZ) from the internal address range
  • Albania Decision No 1 Dated 04/03/2010 on Determining the Details Rules for Safeguarding the Personal Data
  • Icelandic Data Protection Authority Rules no. 698/2004 on the Obligation to Notify and Processing Which Requires a Permit
  • New York Codes, Rules and Regulations, Title 23, Chapter 1, Part 500 Cybersecurity Requirements for Financial Services Companies, Second Amendment
  • Instruction 1/2000 of 1 December 2000 Issued by the Data Protection Agency on the Rules Governing International Data Movements
  • Rules configurable items: Only established connections should be allowed in and only if they are associated with a previously established session
  • Massachusetts General Laws,Title XV, Ch 93, Section 105, Credit cards checks personal identification information
  • 17 CFR Parts 210, 228, 229 and 240, Amendments to Rules Regarding Management's Report on Internal Control Over Financial Reporting; Final Rule
  • New York Codes, Rules and Regulations, Title 10, Volume C, Chapter V, Subchapter A, Article 2, Part 405 Section 405.46, Hospital Cybersecurity Requirements
  • The Commonwealth of Massachusetts, Title XV, Ch 93, Section 105, Credit cards; checks; personal identification information
  • The "\"Display online status on a person name (Never | Everywhere except To and CC field | Everywhere)\"" configurable item
  • Proposal for a Regulation of The European Parliament and of The Council Laying Down Harmonized Rules On Artificial Intelligence (Artificial Intelligence Act) and Ameding Certain Union Legislative Acts
  • EudraLex, The Rules Governing Medicinal Products in the European Union, Volume 4 Good Manufacturing Practice, Medicinal Products for Human and Veterinary Use Annex 11: Computerised Systems, SANCO/C8/AM/sl/ares(2010)1064599
  • The "\"Set maximum level of online status on a person name (Do not allow | Allow everywhere except To and CC field | Allow everywhere)\"" configurable item

Scope, Define, and Maintain Regulatory Demands Online in Minutes.

LEARN MORE
Contact

Unified Compliance
10161 Park Run Drive, Suite 150
Las Vegas, Nevada 89145

PHONE 702.776.9898
FAX 866.924.3791
info@unifiedcompliance.com

Quick Links
  • Home
  • Company
  • Products
  • Partners
  • Peer Review
  • Contact
  • Support
  • Legal

Stay connected with UCF Twitter Facebook LinkedIn

Subscribe to WotW, news and alerts

Copyright © 2025 Network Frontiers LLC
All right reserved.

Stay connected with UCF
Twitter Facebook LinkedIn

Subscribe to WotW, news and alerts