AI & Compliance Glossary

    Clear definitions for AI, automation, and compliance terminology

    A

    AI Automation

    The use of artificial intelligence to perform tasks that previously required human intervention. In business contexts, this typically involves automating repetitive workflows, document processing, and decision-making processes.

    Learn more about AI consulting services

    B

    Business Associate Agreement (BAA)

    A contract required under HIPAA between a covered entity and a business associate. The agreement ensures that the business associate will appropriately safeguard protected health information.

    Learn more about HIPAA compliance

    C

    CMMC

    Cybersecurity Maturity Model Certification. A framework developed by the Department of Defense requiring defense contractors to meet specific cybersecurity standards to protect controlled unclassified information.

    Learn more about CMMC compliance services

    Controlled Unclassified Information (CUI)

    Information that requires safeguarding or dissemination controls pursuant to federal law, regulation, or policy, but is not classified under Executive Order 13526.

    Learn more about CUI protection

    D

    DevOps

    A set of practices combining software development and IT operations. DevOps aims to shorten the development lifecycle and provide continuous delivery with high software quality.

    Learn more about DevOps services

    F

    FedRAMP

    Federal Risk and Authorization Management Program. A government-wide program that provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services.

    Learn more about FedRAMP compliance

    H

    HIPAA

    Health Insurance Portability and Accountability Act. U.S. legislation that provides data privacy and security provisions for safeguarding medical information.

    Learn more about HIPAA compliance services

    I

    Infrastructure as Code (IaC)

    Managing and provisioning computing infrastructure through machine-readable configuration files rather than physical hardware configuration or interactive configuration tools.

    Learn more about DevOps automation

    ISO 27001

    An international standard for managing information security. It specifies requirements for establishing, implementing, maintaining, and continually improving an information security management system.

    Learn more about ISO 27001 certification

    L

    Large Language Model (LLM)

    A type of artificial intelligence that uses deep learning and large datasets to understand, summarize, generate, and predict content. Examples include GPT, Claude, and Llama.

    Learn more about Private LLM deployment

    M

    Machine Learning (ML)

    A subset of artificial intelligence that enables systems to learn and improve from experience without being explicitly programmed. ML algorithms build models based on training data to make predictions.

    Learn more about AI consulting

    N

    NIST 800-171

    A NIST publication that provides recommended security requirements for protecting controlled unclassified information in non-federal systems and organizations.

    Learn more about NIST compliance

    P

    PCI DSS

    Payment Card Industry Data Security Standard. A set of security standards designed to ensure that all companies that accept, process, store, or transmit credit card information maintain a secure environment.

    Learn more about PCI DSS compliance

    PHI

    Protected Health Information. Any information about health status, provision of healthcare, or payment for healthcare that can be linked to a specific individual and is protected under HIPAA.

    Learn more about HIPAA compliance

    Private LLM

    A large language model deployed within a controlled environment where data never leaves the organization's infrastructure. Used by healthcare, financial, and government organizations to leverage AI while maintaining data privacy.

    Learn more about Private LLM solutions

    R

    RAG

    Retrieval-Augmented Generation. A technique that combines retrieval of relevant documents with text generation, allowing AI systems to provide accurate responses based on specific data sources.

    Learn more about AI implementation

    RPA

    Robotic Process Automation. Software technology that makes it easy to build, deploy, and manage software robots that emulate human actions interacting with digital systems and software.

    Learn more about Workflow automation

    S

    SOC 2

    Service Organization Control 2. An auditing procedure that ensures service providers securely manage data to protect the interests of the organization and the privacy of its clients.

    Learn more about SOC 2 compliance

    SOC 2 Type I

    A SOC 2 report that evaluates the design of security controls at a specific point in time. It verifies that controls are properly designed but does not test their operating effectiveness over time.

    Learn more about SOC 2 certification

    SOC 2 Type II

    A SOC 2 report that evaluates both the design and operating effectiveness of security controls over a period of time, typically 6-12 months. More rigorous than Type I and preferred by enterprise customers.

    Learn more about SOC 2 Type II

    Z

    Zero Trust Architecture

    A security concept centered on the belief that organizations should not automatically trust anything inside or outside their perimeters. Instead, they must verify anything trying to connect to systems.

    Learn more about Security services