Com•pli•ance Dictionary
Submit
  • Home
  • About
  • Subscribe
  • Log In
Submit
  • CCH account
  • roles & responsibilities
  • roles, responsibilities
  • CCD
  • CCS
  • CCO
  • ACH Operating Rules OCC Bulletin 2004 58
  • Rolls
  • roles, and responsibilities
  • responsibilities and roles
  • contingency roles, responsibilities
  • CCP
  • ccc
  • ACH
  • list of roles
  • privacy roles, responsibilities
  • role
  • cybersecurity roles, responsibilities
  • CCI component
  • ACH authorization
  • Vaulting poles
  • Hospital robes
  • Telex rolls
  • Whisker poles
  • Dental rolls
  • Ink rolls
  • rules set
  • cybersecurity roles and responsibilities
  • roles, responsibilities, and skills
  • Spinnaker poles
  • Telescoping poles
  • Transfer rolls
  • Tether poles
  • Dental rolls
  • Hospital robes
  • MasterCard Rules
  • ACH debit
  • ACH item
  • ACH credit
  • CCM v4.0.6
  • roles, responsibilities, and authorities
  • continuity roles and responsibilities
  • information security roles & responsibilities
  • roles, responsibilities, and competencies
  • roles, responsibilities and levels
  • business continuity roles, responsibilities
  • ACH return
  • CCI assembly
  • ACH operator
  • ACH payment
  • ACH batch
  • ACH router
  • ACH capture
  • ACH instruction
  • ACH device
  • CCM v4.0
  • C/CE
  • CCI equipment
  • ACH activity
  • ACH transaction
  • ACH file
  • ACH service
  • ACH entry
  • ACH process
  • Guidance on Mandatory Roles
  • recipient role
  • agent's role
  • role review
  • role monitoring
  • user role
  • security role
  • developer role
  • role definition
  • internal role
  • authorised role
  • locative role
  • participant role
  • patient role
  • role model
  • management role
  • support role
  • role-sharing
  • decisive role
  • cryptographic role
  • access role
  • senior role
  • role description
  • role change
  • instrumental role
  • minor role
  • temporal role
  • privileged role
  • BCMS role
  • role membership
  • detection role
  • administrative role
  • role sharing
  • system role
  • role modification
  • role deletion
  • benefactive role
  • gender role
  • resultant role
  • role player
  • semantic role
  • theatrical role
  • title role
  • role statement
  • authorized role
  • authorization role
  • server role
  • key role
  • role creation
  • affected role
  • agentive role
  • critical role
  • relevant role
  • GRC role
  • leadership role
  • business role
  • administrator role
  • role transfer
  • managerial role
  • ACH service provider
  • uncollected ACH transaction
  • unauthorized ACH transaction
  • roles and responsibilities for detection
  • incident response roles and responsibilities
  • attar of roses
  • Dried cut roses
  • Distinguished Encoding Rules
  • rules of order
  • system of rules
  • key management roles metrics standard
  • Privacy Officer's roles and responsibilities
  • Project Management roles and responsibilities
  • technology security roles and responsibilities
  • information security roles and responsibilities
  • incident monitoring roles and responsibilities
  • Compliance Roles and Responsibilities policy
  • on the ropes
  • Dried cut roses
  • bed of roses
  • Abrasive cartridge rolls
  • fresh filled rolls
  • Cyber Security Rules
  • ACH settlement date
  • ACH debit activity
  • uncollected ACH deposit
  • ACH credit transaction
  • Guidance on non-mandatory roles
  • FINRA Rules, Section 4000, Financial and Operational Rules
  • Rules of Engagement
  • rules of behavior
  • Downhole fishing poles
  • unauthorized ACH debit
  • ACH contingency plan
  • ACH processing activity
  • ACH debit activity
  • international ACH requirement
  • ACH single-entry
  • ACH debit return
  • ACH exposure limit
  • ACH credit activity
  • role and responsibility
  • security management role
  • role-based training
  • role of metadata
  • IAM instance role
  • role model function
  • cc
  • ACH (Automated Clearing House) Operating Rules OCC Bulletin 2004-58, December 2004
  • records management oversight roles and responsibilities
  • CFO's Information Assurance roles and responsibilities
  • define and assign roles and responsibilities
  • cyber incident response roles and responsibilities
  • responsibility for shared information security roles
  • role-based administration
  • role-based access
  • decision-making role
  • customer facing role
  • cluster-admin role
  • security-related role
  • public database role
  • key management role
  • mission-critical role
  • role-based authorisation
  • privileged role assignment
  • privacy role, responsibility
  • privileged access role
  • C-SCRM role
  • role-playing exercise
  • CCE v5 - Apache 1.3
  • CCE v5 - Tomcat 4
  • CCE v5 - Tomcat 5
  • CCE v5 - Tomcat 6
  • internet initiated ACH transaction
  • security roles and responsibilities of constituent
  • cybersecurity incident response roles and responsibilities
  • DS Role Server
  • role password changed
  • information awareness role
  • Service Management role
  • Role Description Record
  • Information Technology role
  • vCenter administrator role
  • role-based authorization
  • information security role
  • business continuity role
  • data controller role
  • security roles and responsibilities metrics standard
  • property management leader's roles and responsibilities
  • security incident response roles and responsibilities
  • Anglo-American Cataloguing Rules
  • Federal Rules of Evidence
  • Fresh cut spray roses
  • Dried cut spray roses
  • Information Technology Rules, 2011
  • security roles and responsibilities metrics program
  • rules of the board
  • Robert's Rules of Order
  • Fresh cut spray roses
  • Free standing display poles
  • Dried cut spray roses
  • Rules of Professional Conduct
  • Rules for Archival Description
  • War of the Roses
  • Wars of the Roses
  • FINRA Rules, Section 0100
  • CCE v5 - Windows XP
  • CCE v5 - IIS 5
  • high risk ACH transaction
  • Regulation CC
  • Set password rules level
  • FINRA Rules, Section 4000
  • telephone-initiated ACH debit
  • CCE v5 - AIX 5.3
  • CCE v5 - Windows 2000
  • CCE v5 - Windows 7
  • internet-initiated ACH transaction
  • 3 CCR 702-6
  • Internet-initiated ACH debit
  • CCE v5 - Apache 2.2
  • high-risk ACH transaction
  • telephone initiated ACH transaction
  • telephone-initiated ACH transaction
  • ACH debit return volume
  • definition of personnel roles for handling incidents
  • credit card payment system's roles and responsibilities
  • CCE v5 - Windows Vista
  • CCE v5 - Apache 2.0
  • CCE v5 - IIS 6
  • ACH transaction processing procedure
  • suitable for the role
  • role and user access
  • virtual machine user role
  • incident response role responsibility
  • role-based information access
  • strategic role and responsibility
  • role based access control
  • role-based access level
  • response and recovery role
  • logical access control role
  • internal IT audit staff's roles and responsibilities
  • cyber security incident response roles and responsibilities
  • system development Project Management roles and responsibilities
  • Guidance on non-mandatory roles, March 2009
  • operational role and responsibility
  • role and rights concept
  • role of artificial intelligence
  • quality management committee role
  • information technology operations role
  • CCE v5 - Microsoft Office 2007
  • Cloud Security Alliance CCM V1.3
  • CCE v5 - Microsoft Exchange 2007
  • Role-Based Access Control
  • role of a system
  • Role password is changed
  • customer role and responsibility
  • security role and responsibility
  • group and role membership
  • role-based access profile
  • asset physical security role
  • role-based security training
  • The 'roles' that are not password protected
  • Oracle settings: Accounts assigned to '_CATALOG_' roles
  • Set password rules domain timeout
  • Instrument rolls for surgical instrument
  • Federal Rules of Evidence, 2012
  • Veterinary instrument rolls for instruments
  • Intravenous infusion poles for wheelchairs
  • Orthopedic casting rolls or tapes
  • Instrument rolls for splint sets
  • rules, regulation, procedures, or guidelines
  • rules, regulations, procedures, or guidelines
  • Rules configurable items: Enabled Ports
  • Rules configurable items: Enabled Protocols
  • Instrument rolls for splint set
  • rules, regulations, procedures or guidelines
  • rules, regulation, procedures or guidelines
  • privacy role and responsibility
  • role-based privacy training
  • Chilean Unique National Role
  • MasterCard Security Rules and Procedures
  • Instrument rolls for splint accessories
  • 'Configure Attack Surface Reduction rules'
  • Food service table covering rolls
  • Instrument rolls for dental instrument
  • India Information Technology Rules, 2011
  • Configure Attack Surface Reduction rules
  • CCE v5 - Microsoft Exchange 2010
  • CCE v5 - Sun Solaris 9
  • CCE v5 - Sun Solaris 10
  • CCE v5 - Windows Server 2008
  • CCE v5 - MS SQL 2005
  • ICH Q10 Pharmaceutical Quality System
  • incident response Point of Contact's roles and responsibilities
  • Federal Rules of Civil Procedure
  • Intravenous infusion poles for wheelchairs
  • Instrument rolls for veterinary instrument
  • rules on network security devices
  • The '/bin/csh' file: Permissions
  • CCE v5 - HP-UX 11.23
  • CCE v5 - Sun Solaris 8
  • CCE v5 - Microsoft Office 2010
  • CCE v5 - Polycom HDX 3
  • CCE v5 - Internet Explorer 7
  • CCE v5 - Windows Server 2003
  • roles and responsibilities for Cyber Security Incident response
  • The "csh shell" configurable item
  • The '/sbin/csh' file: Permissions
  • The '/etc/csh' file: Permissions
  • CCE v5 - MS SQL 2000
  • legal counsel's role and responsibility
  • governance, risk, and compliance role
  • governance risk and compliance role
  • auditing process role and responsibility
  • senior management role and responsibility
  • assessment team's role and responsibility
  • IT audit role and responsibility
  • role-based access control policy
  • information assurance role and responsibility
  • key custodian's role and responsibility
  • Guidance on Role Specific Training
  • C-SCRM role and responsibility
  • development-related role and responsibility
  • Instrument rolls for postmortem surgical instruments
  • system development role and responsibility
  • role based access control policy
  • Instrument rolls for postmortem surgical instrument
  • Veterinary instrument rolls for instruments accessories
  • laws, rules, regulations, guidances or guidelines
  • rules, regulations, procedures, guidance or guidelines
  • rules, regulations, procedures, guidelines or guidance
  • system continuity role and responsibility
  • security leader's role and responsibility
  • data controller's role and responsibility
  • security staff role and responsibility
  • external auditor's role and responsibility
  • governance, risk and compliance role
  • Diagnosis of dual-role transvestism
  • key management role and responsibility
  • Instrument rolls for dental instrument accessory
  • Instrument rolls for splint set accessory
  • Qatar Financial Centre Data Protection Rules
  • laws, rules, regulations, guidance, or guidelines
  • laws, rules, regulations, guidances, or guidelines
  • The PATH variable: Double-colon rules
  • Federal Rules of Civil Procedure (2007)
  • The "/etc/csh file" configurable item
  • CCE v5 - Microsoft Internet Explorer 8
  • Federal Rules of Civil Procedure 34
  • FINRA Rules, Section 0100, General Standards
  • laws, rules, regulations, procedures, or guidance
  • rules, regulations, procedures, guidance, or guidelines
  • The "/bin/csh file" configurable item
  • The "/sbin/csh file" configurable item
  • SQL Server settings: Users assigned to fixed database roles
  • Guidance on Mandatory Roles (AO, SIRO, IAO), March 2009
  • The '/usr/bin/csh' file: Permissions
  • CCE v5 - Oracle WebLogic Server 11g
  • high level operational role and responsibility
  • chief information officer's role and responsibility
  • Information Technology audit role and responsibility
  • internal audit staff's role and responsibility
  • cybersecurity supply chain risk management role
  • board of directors' role and responsibility
  • facility security officer's role and responsibility
  • chief security officer's role and responsibility
  • technological security staff's role and responsibility
  • personnel with key information security role
  • incident response Public Relations Point of Contact's roles and responsibilities
  • role-based information access metrics standard
  • business unit manager's role and responsibility
  • online sales department's role and responsibility
  • cluster role-based access control policy
  • design and development role and responsibility
  • Windows Firewall: Public: Apply local firewall rules
  • Windows Firewall: Private: Apply local firewall rules
  • Rules No. 837/2006 on Electronic Surveillance
  • mapped to organizational role-based list
  • role-based information access metrics program
  • internal audit manager's role and responsibility
  • roles and order of operations when a response is needed
  • Federal Rules of Civil Procedure 26 disclosure
  • Windows Firewall setting: Apply local firewall rules
  • Intravenous or arterial line poles or stands
  • information technology staff's role and responsibility
  • technology security leader's role and responsibility
  • customer database owner's role and responsibility
  • role is critical for the organization
  • CCE v5 - Microsoft Windows Server 2k8 R2
  • incident response network architecture point of contact's roles and responsibilities
  • Windows Firewall: Domain: Apply local firewall rules
  • Information Technology (Electronic Service Delivery) Rules, 2011
  • MasterCard Security Rules and Procedures, Merchant Edition
  • Instrument rolls for dental instruments or accessories
  • The "/usr/bin/csh file" configurable item
  • CCE v5 - Red Hat Enterprise Linux 4
  • CCE v5 - Red Hat Enterprise Linux 5
  • list of accounts with their corresponding role
  • Guidance on Role Specific Training, March 2009
  • critical facility management personnel's role and responsibility
  • role-specific security awareness and skills training
  • Windows Firewall: Public: Settings: Apply local firewall rules
  • Harmonized Rules On Artificial Intelligence (Artificial Intelligence Act)
  • 'Windows Firewall: Public: Settings: Apply local firewall rules'
  • GUERNSEY FINANCIAL SERVICES COMMISSION CYBER SECURITY RULES, 2021
  • system development project team's role and responsibility
  • incident response team member's role and responsibility
  • information security-related duty, role, and responsibility
  • The 'CREATE ROLE' privilege: Auditing on usage
  • Windows Firewall: Private: Apply local connection security rules
  • Standard 660S1: User Rules of Behavior, 660S1-01
  • Windows Firewall: Domain: Apply local connection security rules
  • Jammu and Kashmir Right to Information Rules, 2012
  • Iceland Rules No. 837/2006 on Electronic Surveillance
  • ICH Q10 Pharmaceutical Quality System, Step 2 Version
  • head of information security's role and responsibility
  • incident response location manager's role and responsibility
  • data controller's data quality role and responsibility
  • chief executive's information assurance role and responsibility
  • Windows Firewall: Public: Apply local connection security rules
  • Enforcement Rules of the Personal Data Protection Act
  • csh shell settings: Default umask for all users
  • archives and records management oversight's role and responsibility
  • role relevant to the SMS and the services
  • cybersecurity supply chain risk management role and responsibility
  • The 'GRANT ANY ROLE' privilege: Auditing on usage
  • Chief of Risk's Information Assurance role and responsibility
  • Windows Firewall settings: Apply Local Firewall Rules (Public Profile)
  • Nepal Rules Regarding Right to Information, 2065 B.S. (2009)
  • Taiwan Enforcement Rules of the Personal Data Protection Act
  • 'Windows Firewall: Public: Settings: Apply local connection security rules'
  • Rules configurable items: Deny all traffic unless explicitly allowed
  • Windows Firewall settings: Apply Local Firewall Rules (Domain Profile)
  • Qatar Financial Centre Data Protection Rules, DATA-VER1-Oct05
  • Windows Firewall: Public: Settings: Apply local connection security rules
  • 12 CFR Part 261, Rules Regarding Availability of Information
  • Oracle settings: Accounts with the maximum number of roles allowed in 'init.ora'
  • information technology facility management personnel's role and responsibility
  • human resources point of contact's role and responsibility
  • cryptographic, encryption and key management role and responsibility
  • The 'DROP ANY ROLE' privilege: Auditing on usage
  • chief financial officer's information assurance role and responsibility
  • internal information technology audit staff's role and responsibility
  • Windows Firewall settings: Apply Local Firewall Rules (Private Profile)
  • Windows Firewall settings: Apply Local Connection Security Rules (Private Profile)
  • Windows Firewall settings: Apply Local Connection Security Rules (Public Profile)
  • rules for the acceptable use of information and of assets
  • Rules Nr. 299/2001 on the Security of Personal Data
  • China Computer Information Network International Interconnection Security Protection Management Rules
  • Rules of Shenzhen Municipality on the Publication of Government Information
  • Oracle settings: Accounts having access to the 'DBA' role
  • Guidance on the DHR Mandatory Role Information Asset Owner
  • Windows Firewall settings: Apply Local Connection Security Rules (Domain Profile)
  • The diagnosis of social role conflict, not elsewhere classified 
  • ICH Guidance for Industry, E6 Good Clinical Practice: Consolidated Guidance
  • Account settings: User accounts and/or roles having access to the 'Oracle Enterprise Manager' (OEM)
  • allow everywhere except To and CC field
  • contractual terms and conditions governing the roles, relationships, obligations and responsibilities of all contracting parties
  • Iceland Rules Nr. 299/2001 on the Security of Personal Data
  • 16 CFR Part 681, The Fair Credit Reporting Act Identity Theft Rules
  • The init.ora file: REMOTE_OS_RULES (Operating System role for remote client connections)
  • System settings: Use Certificate Rules on Windows Executables for Software Restriction Policies
  • Configure Attack Surface Reduction rules: Set the state for each ASR rule
  • 'Configure Attack Surface Reduction rules: Set the state for each ASR rule'
  • Guidance on the DHR Mandatory Role: Information Asset Owner, March 2009
  • Rules configurable items: Outbound traffic can only access IP addresses within the DMZ
  • SQL Server settings: Accounts that have membership in the "sysadmin" server role
  • EudraLex Rules Governing Medicinal Products in the European Union Annex 11 Computerised Systems
  • ICH Guidance for Industry, Q7A Good Manufacturing Practice Guidance for Active Pharmaceutical Ingredients
  • Philippines Memorandum Circular No. 03-03-2005, Rules and Regulations on Broadcast Messaging Service
  • State of Alabama Office of Information Technology, Standard 660S1-01: User Rules of Behavior
  • Application of risk management for IT-networks incorporating medical devices Part 1: Roles, responsibilities and activities, Edition 1.0 2010-10
  • Rules no. 698/2004 on the Obligation to Notify and Processing Which Requires a Permit
  • Supplemental Principles on Human Resources Data and the Role of the Data Protection Authorities
  • 9070 - NFA Compliance Rules 2-9, 2-36 and 2-49: Information Systems Security Programs
  • 2000 - Rules and Regulations, Appendix B to Part 364—Interagency Guidelines Establishing Information Security Standards
  • Rules configurable items: Internal addresses are allowed to into the demilitarized zone (DMZ) from the Internet
  • Harmonized Rules On Artificial Intelligence (Artificial Intelligence Act) and Ameding Certain Union Legislative Acts, European Commission
  • role-based access for full data must be established, otherwise field data must be masked
  • Decision No 1 Dated 04/03/2010 on Determining the Details Rules for Safeguarding the Personal Data
  • China Ministry of Public Security Decree No. 33, Computer Information Network International Interconnection Security Protection Management Rules
  • New York Codes, Rules and Regulations, Title 23, Chapter 1, Part 500 Cybersecurity Requirements for Financial Services Companies
  • Rules configurable items: Internet addresses are allowed to into the demilitarized zone (DMZ) from the internal address range
  • Albania Decision No 1 Dated 04/03/2010 on Determining the Details Rules for Safeguarding the Personal Data
  • Icelandic Data Protection Authority Rules no. 698/2004 on the Obligation to Notify and Processing Which Requires a Permit
  • Instruction 1/2000 of 1 December 2000 Issued by the Data Protection Agency on the Rules Governing International Data Movements
  • New York Codes, Rules and Regulations, Title 23, Chapter 1, Part 500 Cybersecurity Requirements for Financial Services Companies, Second Amendment
  • Rules configurable items: Only established connections should be allowed in and only if they are associated with a previously established session
  • Massachusetts General Laws,Title XV, Ch 93, Section 105, Credit cards checks personal identification information
  • 17 CFR Parts 210, 228, 229 and 240, Amendments to Rules Regarding Management's Report on Internal Control Over Financial Reporting; Final Rule
  • New York Codes, Rules and Regulations, Title 10, Volume C, Chapter V, Subchapter A, Article 2, Part 405 Section 405.46, Hospital Cybersecurity Requirements
  • The Commonwealth of Massachusetts, Title XV, Ch 93, Section 105, Credit cards; checks; personal identification information
  • The "\"Display online status on a person name (Never | Everywhere except To and CC field | Everywhere)\"" configurable item
  • Proposal for a Regulation of The European Parliament and of The Council Laying Down Harmonized Rules On Artificial Intelligence (Artificial Intelligence Act) and Ameding Certain Union Legislative Acts
  • EudraLex, The Rules Governing Medicinal Products in the European Union, Volume 4 Good Manufacturing Practice, Medicinal Products for Human and Veterinary Use Annex 11: Computerised Systems, SANCO/C8/AM/sl/ares(2010)1064599
  • The "\"Set maximum level of online status on a person name (Do not allow | Allow everywhere except To and CC field | Allow everywhere)\"" configurable item

Scope, Define, and Maintain Regulatory Demands Online in Minutes.

LEARN MORE
Contact

Unified Compliance
10161 Park Run Drive, Suite 150
Las Vegas, Nevada 89145

PHONE 702.776.9898
FAX 866.924.3791
info@unifiedcompliance.com

Quick Links
  • Home
  • Company
  • Products
  • Partners
  • Peer Review
  • Contact
  • Support
  • Legal

Stay connected with UCF Twitter Facebook LinkedIn

Subscribe to WotW, news and alerts

Copyright © 2025 Network Frontiers LLC
All right reserved.

Stay connected with UCF
Twitter Facebook LinkedIn

Subscribe to WotW, news and alerts