<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>policies, laws, regulations Archives - Jean-Christoph von Oertzen</title>
	<atom:link href="https://jeanchristophvonoertzen.com/infosec-glossary/category/policies-laws-regulations/feed" rel="self" type="application/rss+xml" />
	<link>https://jeanchristophvonoertzen.com/infosec-glossary/category/policies-laws-regulations</link>
	<description>Exploring the intersection of cybersecurity, psychology, and resilience.</description>
	<lastBuildDate>Fri, 30 Jan 2026 16:47:04 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://jeanchristophvonoertzen.com/wp-content/uploads/2020/10/favicon-4.png</url>
	<title>policies, laws, regulations Archives - Jean-Christoph von Oertzen</title>
	<link>https://jeanchristophvonoertzen.com/infosec-glossary/category/policies-laws-regulations</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>TPRM</title>
		<link>https://jeanchristophvonoertzen.com/infosec-glossary/tprm</link>
					<comments>https://jeanchristophvonoertzen.com/infosec-glossary/tprm#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Fri, 30 Jan 2026 16:47:04 +0000</pubDate>
				<category><![CDATA[policies, laws, regulations]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[supply chain]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?post_type=encyclopedia&#038;p=1766</guid>

					<description><![CDATA[<p>TPRM : Third Party Risk Managemenet Third Party Risk Management (TPRM) refers to the structured process organizations use to identify, assess, monitor, and mitigate risks arising from relationships with external vendors, suppliers, service providers, and other third parties. These risks can include cybersecurity, data protection, compliance, operational resilience, financial stability, and reputational impact. Effective TPRM [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/infosec-glossary/tprm">TPRM</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/infosec-glossary/tprm/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>CA</title>
		<link>https://jeanchristophvonoertzen.com/infosec-glossary/ca</link>
					<comments>https://jeanchristophvonoertzen.com/infosec-glossary/ca#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Wed, 19 Feb 2025 15:50:51 +0000</pubDate>
				<category><![CDATA[policies, laws, regulations]]></category>
		<category><![CDATA[cryptography]]></category>
		<category><![CDATA[organization]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?post_type=encyclopedia&#038;p=1562</guid>

					<description><![CDATA[<p>CA : Certificate Authority A Certificate Authority (CA) is a trusted entity that issues digital certificates used to verify the identity of organizations and individuals in online transactions. CAs play a crucial role in establishing a secure and trustworthy online environment by enabling secure communications through encryption. Digital certificates issued by CAs are essential for [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/infosec-glossary/ca">CA</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/infosec-glossary/ca/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>ISP</title>
		<link>https://jeanchristophvonoertzen.com/infosec-glossary/isp</link>
					<comments>https://jeanchristophvonoertzen.com/infosec-glossary/isp#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Wed, 24 Apr 2024 17:22:43 +0000</pubDate>
				<category><![CDATA[networking]]></category>
		<category><![CDATA[policies, laws, regulations]]></category>
		<category><![CDATA[policy]]></category>
		<category><![CDATA[security policy]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?post_type=encyclopedia&#038;p=1402</guid>

					<description><![CDATA[<p>ISP: Information Security Policies Internet Service Provider [&#8230;] is a set of rules, policies and procedures designed to ensure all end users and networks within an organization meet minimum IT security and data protection security requirements. https://www.upguard.com/blog/information-security-policy ISP: Information Security Policies Internet Service Provider [&#8230;] is a set of rules, policies and procedures designed to [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/infosec-glossary/isp">ISP</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/infosec-glossary/isp/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>ISA</title>
		<link>https://jeanchristophvonoertzen.com/infosec-glossary/isa</link>
					<comments>https://jeanchristophvonoertzen.com/infosec-glossary/isa#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Mon, 22 May 2023 18:17:22 +0000</pubDate>
				<category><![CDATA[lingo]]></category>
		<category><![CDATA[policies, laws, regulations]]></category>
		<category><![CDATA[security awareness]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?post_type=encyclopedia&#038;p=1224</guid>

					<description><![CDATA[<p>ISA: Interconnection Security Agreement Information Security Awareness A document that regulates security-relevant aspects of an intended connection between an agency and an external system. It regulates the security interface between any two systems operating under two different distinct authorities. https://csrc.nist.gov/glossary/term/interconnection_security_agreement Information security awareness is defined as an employee’s general knowledge about information security and his [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/infosec-glossary/isa">ISA</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/infosec-glossary/isa/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>NIS 2</title>
		<link>https://jeanchristophvonoertzen.com/infosec-glossary/nis-2</link>
					<comments>https://jeanchristophvonoertzen.com/infosec-glossary/nis-2#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Tue, 24 Jan 2023 20:48:30 +0000</pubDate>
				<category><![CDATA[policies, laws, regulations]]></category>
		<category><![CDATA[europe]]></category>
		<category><![CDATA[legislation]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?post_type=encyclopedia&#038;p=1050</guid>

					<description><![CDATA[<p>NIS 2: Network and Information Security (NIS) Directive 2 aka. DIRECTIVE (EU) 2022/2555 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 14 December 2022 on measures for a high common level of cybersecurity across the Union, amending Regulation (EU) No 910/2014 and Directive (EU) 2018/1972, and repealing Directive (EU) 2016/1148 (NIS 2 Directive) The [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/infosec-glossary/nis-2">NIS 2</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/infosec-glossary/nis-2/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>SRE</title>
		<link>https://jeanchristophvonoertzen.com/infosec-glossary/sre</link>
					<comments>https://jeanchristophvonoertzen.com/infosec-glossary/sre#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Fri, 06 Jan 2023 14:04:18 +0000</pubDate>
				<category><![CDATA[policies, laws, regulations]]></category>
		<category><![CDATA[incident response]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?post_type=encyclopedia&#038;p=1034</guid>

					<description><![CDATA[<p>SRE: Sicherheitsrelevante Ereignisse :de: Sicherheitsrelevante Ereignisse (SRE) sind unter anderem Protokoll- und Protokollierungsdaten, die Auswirkungen auf die Informationssicherheit und ihre Schutzziele (Vertraulichkeit, Integrität, Verfügbarkeit) haben können. Sie werden in primäre und sekundäre sicherheitsrelevante Ereignisse eingeteilt, wobei diese Einteilung sich auf den Ursprung des SRE und nicht auf dessen Relevanz oder Wichtigkeit bezieht. https://www.bsi.bund.de/DE/Themen/Oeffentliche-Verwaltung/Mindeststandards/PDCA/PDCA_node.html SRE: Sicherheitsrelevante [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/infosec-glossary/sre">SRE</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/infosec-glossary/sre/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>TOM</title>
		<link>https://jeanchristophvonoertzen.com/infosec-glossary/tom</link>
					<comments>https://jeanchristophvonoertzen.com/infosec-glossary/tom#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Tue, 28 Jun 2022 18:54:02 +0000</pubDate>
				<category><![CDATA[policies, laws, regulations]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[privacy]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?post_type=encyclopedia&#038;p=994</guid>

					<description><![CDATA[<p>TOM: :de: Technisch-Organisatorische Massnahmen :de: [&#8230;] durch die DSGVO (Datenschutz-Grundverordnung) vorgeschriebene Maßnahmen, die die Sicherheit der Verarbeitung personenbezogener Daten gewährleisten sollen. https://www.datenschutzexperte.de/technisch-organisatorische-massnahmen/ TOM: :de: Technisch-Organisatorische Massnahmen :de: [&#8230;] durch die DSGVO (Datenschutz-Grundverordnung) vorgeschriebene Maßnahmen, die die Sicherheit der Verarbeitung personenbezogener Daten gewährleisten sollen. https://www.datenschutzexperte.de/technisch-organisatorische-massnahmen/</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/infosec-glossary/tom">TOM</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/infosec-glossary/tom/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>SOX</title>
		<link>https://jeanchristophvonoertzen.com/infosec-glossary/sox</link>
					<comments>https://jeanchristophvonoertzen.com/infosec-glossary/sox#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Tue, 08 Mar 2022 19:16:26 +0000</pubDate>
				<category><![CDATA[policies, laws, regulations]]></category>
		<category><![CDATA[compliance]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?post_type=encyclopedia&#038;p=916</guid>

					<description><![CDATA[<p>SOX: Sarbanes-OXley act [&#8230;] was passed [in 2002] by the United States Congress to protect the public from fraudulent or erroneous practices by corporations or other business entities. The law is named after Paul Sarbanes and Michael Oxley, the two congressmen that drafted it. https://www.upguard.com/blog/sox-compliance SOX: Sarbanes-OXley act [&#8230;] was passed [in 2002] by the [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/infosec-glossary/sox">SOX</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/infosec-glossary/sox/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>CNI</title>
		<link>https://jeanchristophvonoertzen.com/infosec-glossary/cni</link>
					<comments>https://jeanchristophvonoertzen.com/infosec-glossary/cni#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Mon, 07 Mar 2022 10:56:45 +0000</pubDate>
				<category><![CDATA[networking]]></category>
		<category><![CDATA[policies, laws, regulations]]></category>
		<category><![CDATA[containers]]></category>
		<category><![CDATA[KRITIS]]></category>
		<category><![CDATA[OT]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?post_type=encyclopedia&#038;p=903</guid>

					<description><![CDATA[<p>CNI: Critical National Infrastructure Container Networking Interface Critical National Infrastructure (CNI) refers to the essential systems and assets that are vital for the functioning of a nation, including transportation, energy, healthcare, and communication systems. Protecting CNI is crucial for national security and public safety, as disruptions to these systems can have severe consequences. Governments and [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/infosec-glossary/cni">CNI</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/infosec-glossary/cni/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>BYOD</title>
		<link>https://jeanchristophvonoertzen.com/infosec-glossary/byod</link>
					<comments>https://jeanchristophvonoertzen.com/infosec-glossary/byod#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Fri, 04 Mar 2022 23:41:28 +0000</pubDate>
				<category><![CDATA[policies, laws, regulations]]></category>
		<category><![CDATA[infrastructure]]></category>
		<category><![CDATA[policy]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?post_type=encyclopedia&#038;p=883</guid>

					<description><![CDATA[<p>BYOD: Bring Your Own Device Bring Your Own Device (BYOD) is a policy that allows employees to use their personal devices, such as smartphones, tablets, and laptops, for work-related tasks and access to company resources. This approach might become increasingly popular outside Germany, as it can enhance employee satisfaction and productivity, allowing individuals to work [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/infosec-glossary/byod">BYOD</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/infosec-glossary/byod/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
