In the realm of compliance and its related technology, a plethora of acronyms exists, each with its unique significance. Understanding these abbreviations and their definitions is crucial for anyone involved in the compliance domain, as they facilitate better communication and understanding among peers. This article lists and elaborates on the top 100 most commonly used acronyms within this sphere.


  1. AML: Anti-Money Laundering. This refers to a set of procedures, laws, and regulations designed to halt the practice of generating income through illegal actions.
  2. KYC: Know Your Customer. These are the processes used by companies to verify the identity of their clients and assess potential risks of illegal intentions.
  3. CDD: Customer Due Diligence. A principle that requires businesses to know and understand their customers for the purpose of detecting and preventing money laundering or terrorist financing.
  4. EDD: Enhanced Due Diligence. This process involves additional scrutiny of potential business partners or customers who are considered high risk.
  5. FATF: Financial Action Task Force. An intergovernmental body established to set standards and promote effective implementation of legal, regulatory, and operational measures for combating money laundering, terrorist financing, and other related threats.
  6. GDPR: General Data Protection Regulation. A regulation introduced by the EU to strengthen data protection for individuals within the European Union.
  7. CCPA: California Consumer Privacy Act. A state statute intended to enhance privacy rights and consumer protection for residents of California.
  8. PCI DSS: Payment Card Industry Data Security Standard. An information security standard for organizations that handle branded credit cards.
  9. HIPAA: Health Insurance Portability and Accountability Act. A US law designed to provide privacy standards to protect patients’ medical records and other health information.
  10. SOX: Sarbanes-Oxley Act. A United States federal law that mandates improvements in the accuracy of corporate disclosures.
  11. GRC: Governance, Risk Management, and Compliance. It refers to a company’s coordinated strategy for managing the broad issues of corporate governance, enterprise risk management, and corporate compliance.
  12. ERM: Enterprise Risk Management. A plan-based business strategy that aims to identify, assess, and prepare for any dangers, hazards, and other potentials for disaster.
  13. COSO: Committee of Sponsoring Organizations. A voluntary private sector organization dedicated to improving organizational performance and governance through its framework.
  14. COBIT: Control Objectives for Information and Related Technologies. A framework for the governance and management of enterprise IT.
  15. ISO 27001: International Organization for Standardization 27001. It’s a specification for an information security management system.
  16. SAS 70: Statement on Auditing Standards 70. It was a widely recognized auditing standard developed by the American Institute of Certified Public Accountants.
  17. SSAE 16: Statement on Standards for Attestation Engagements No. 16. It is an auditing standard for service organizations, superseding the SAS 70 audit standard.
  18. FINRA: Financial Industry Regulatory Authority. A non-governmental organization that regulates member brokerage firms and exchange markets.
  19. SEC: Securities and Exchange Commission. It’s an independent agency of the United States federal government, responsible for enforcing federal securities laws and regulating the securities industry.
  20. FTC: Federal Trade Commission. A U.S. government agency aimed at protecting consumers and promoting competition.
  21. CFPB: Consumer Financial Protection Bureau. It’s an agency of the U.S. government responsible for consumer protection in the financial sector.
  22. FCA: Financial Conduct Authority. A regulatory body in the U.K. for financial firms providing services to consumers.
  23. FCRA: Fair Credit Reporting Act. U.S. Federal Government legislation to promote the accuracy, fairness, and privacy of consumer information contained in the files of consumer reporting agencies.
  24. DPA: Data Protection Act. A United Kingdom Act of Parliament designed to protect personal data stored on computers or in an organised paper filing system.
  25. PIPEDA: Personal Information Protection and Electronic Documents Act. A Canadian federal law that governs the collection, use, and disclosure of personal information in the course of commercial activities.
  26. ESG: Environmental, Social, and Governance. It refers to the three central factors in measuring the sustainability and societal impact of an investment in a company.
  27. EHS: Environment, Health, and Safety. It refers to laws, rules, guidance, and processes designed to help protect employees, the public, and the environment.
  28. CSR: Corporate Social Responsibility. A business model that helps a company be socially accountable to itself, its stakeholders, and the public.
  29. SRI: Socially Responsible Investing. An investment strategy which seeks to consider both financial return and social/environmental good.
  30. FISMA: Federal Information Security Management Act. United States legislation that defines a comprehensive framework to protect government information, operations, and assets against natural or man-made threats.
  31. FERPA: Family Educational Rights and Privacy Act. A federal law in the United States that protects the privacy of student education records.
  32. GLBA: Gramm-Leach-Bliley Act. Also known as the Financial Modernization Act of 1999, it includes provisions to protect consumers’ personal financial information held by financial institutions.
  33. NIST: National Institute of Standards and Technology. A U.S. Department of Commerce agency that promotes and maintains measurement standards.
  34. AI: Artificial Intelligence. The simulation of human intelligence processes by machines, especially computer systems.
  35. RPA: Robotic Process Automation. The use of software with artificial intelligence and machine learning capabilities to handle high-volume, repeatable tasks.
  36. ML: Machine Learning. An application of artificial intelligence that provides systems the ability to automatically learn and improve from experience without being explicitly programmed.
  37. IoT: Internet of Things. The network of physical objects—“things”—that are embedded with sensors, software, and other technologies for the purpose of connecting and exchanging data with other devices and systems over the Internet.
  38. BI: Business Intelligence. A set of strategies and technologies used by enterprises for data analysis and business information.
  39. BAU: Business as Usual. An acronym that indicates the standard execution of business operations.
  40. P2P: Peer-to-Peer. A decentralized form of platform where two individuals interact directly with each other.
  41. B2B: Business-to-Business. Refers to a situation where one business makes a commercial transaction with another.
  42. B2C: Business-to-Consumer. Describes the process of selling products and services directly between a business and consumers who are the end-users of its products or services.
  43. GD: Group Discussion. A methodology used by an organization to gauge whether the candidate has certain personality traits or skills.
  44. MoU: Memorandum of Understanding. A type of agreement between two or more parties outlining the terms and details of an understanding.
  45. SLA: Service Level Agreement. A contract between a service provider and the end user that defines the level of service expected from the service provider.
  46. SOP: Standard Operating Procedure. A set of step-by-step instructions compiled by an organization to help workers carry out complex routine operations.
  47. OEM: Original Equipment Manufacturer. Refers to a company that produces parts and equipment that may be marketed by another manufacturer.
  48. RTO: Recovery Time Objective. The targeted duration of time and a service level within which a business process must be restored after a disaster in order to avoid unacceptable consequences associated with a break in business continuity.
  49. RPO: Recovery Point Objective. The maximum targeted period in which data might be lost from an IT service due to a major incident.
  50. KPI: Key Performance Indicator. A type of performance measurement. KPIs evaluate the success of an organization or of a particular activity in which it engages.
  51. ROI: Return on Investment. A performance measure used to evaluate the efficiency or profitability of an investment or compare the efficiency of different investments.
  52. ROA: Return on Assets. An indicator of how profitable a company is relative to its total assets.
  53. ROE: Return on Equity. The amount of net income returned as a percentage of shareholders equity.
  54. CAPEX: Capital Expenditure. Funds used by a company to acquire, upgrade, and maintain physical assets such as property, buildings, or equipment.
  55. OPEX: Operational Expenditure. The money a company spends on an ongoing, day-to-day basis in order to run a business or system.
  56. CRM: Customer Relationship Management. An approach to managing a company’s interaction with current and potential customers.
  57. ERP: Enterprise Resource Planning. A process used by companies to manage and integrate the important parts of their businesses.
  58. CMS: Content Management System. A software that enables users to create, edit, organize, and publish digital content.
  59. POS: Point of Sale. The place where a retail transaction is completed.
  60. VPN: Virtual Private Network. A technology that creates a safe and encrypted connection over a less secure network, such as the internet.
  61. API: Application Programming Interface. A set of routines, protocols, and tools for building software and applications.
  62. UI: User Interface. The space where interactions between humans and machines occur.
  63. UX: User Experience. A person’s emotions and attitudes about using a particular product, system or service.
  64. SQL: Structured Query Language. A standard language for managing and manipulating databases.
  65. SAAS: Software as a Service. A software licensing and delivery model in which software is licensed on a subscription basis and is centrally hosted.
  66. PAAS: Platform as a Service. A category of cloud computing services that provides a platform allowing customers to develop, run, and manage applications without the complexity of building and maintaining the infrastructure.
  67. IAAS: Infrastructure as a Service. A form of cloud computing that provides virtualized computing resources over the internet.
  68. DMZ: Demilitarized Zone. In computer security, it’s a physical or logical subnetwork that contains and exposes an organization’s external-facing services to a larger and untrusted network, usually the Internet.
  69. IDS: Intrusion Detection System. A device or software application that monitors a network or systems for malicious activity or policy violations.
  70. IPS: Intrusion Prevention System. A network security/threat prevention technology that examines network traffic flows to detect and prevent vulnerability exploits.
  71. DLP: Data Loss Prevention. A set of tools and processes used to ensure that sensitive data is not lost, misused, or accessed by unauthorized users.
  72. IAM: Identity and Access Management. A framework for business processes that facilitates the management of electronic or digital identities.
  73. RBAC: Role-Based Access Control. An approach to restricting system access to authorized users.
  74. 2FA: Two-Factor Authentication. A method of confirming a user’s claimed identity by utilizing a combination of two different factors.
  75. VPN: Virtual Private Network. A technology that allows you to create a secure connection over a less-secure network between your computer and the internet.
  76. DDoS: Distributed Denial of Service. A malicious attempt to disrupt normal traffic of a targeted server, service, or network by overwhelming the target or its surrounding infrastructure with a flood of internet traffic.
  77. SIEM: Security Information and Event Management. Provides real-time analysis of security alerts generated by applications and network hardware.
  78. APT: Advanced Persistent Threat. A prolonged and targeted cyberattack in which an intruder gains access to a network and remains undetected for an extended period of time.
  79. HTTP: Hypertext Transfer Protocol. The protocol used for transferring data over the internet.
  80. HTTPS: Hypertext Transfer Protocol Secure. An extension of HTTP that is used for secure communication over a computer network, and is widely used on the internet.
  81. SSL: Secure Sockets Layer. A standard security technology for establishing an encrypted link between a server and a client.
  82. TLS: Transport Layer Security. A cryptographic protocol designed to provide communications security over a computer network.
  83. SMTP: Simple Mail Transfer Protocol. A communication protocol for electronic mail transmission.
  84. IMAP: Internet Message Access Protocol. An Internet standard protocol used by email clients to retrieve messages from a mail server.
  85. POP3: Post Office Protocol 3. A standard mail protocol used to receive emails from a remote server to a local email client.
  86. DNS: Domain Name System. The system on the internet that converts human-readable domain names (like www.example.com) into computer-readable IP addresses (like 192.0.2.1).
  87. IP: Internet Protocol. The principal communications protocol in the Internet protocol suite for relaying datagrams across network boundaries.
  88. TCP: Transmission Control Protocol. One of the main protocols in the Internet protocol suite, TCP enables two hosts to establish a connection and exchange data.
  89. UDP: User Datagram Protocol. A communications protocol that offers a limited amount of service when messages are exchanged between computers in a network.
  90. FTP: File Transfer Protocol. A standard network protocol used for the transfer of computer files between a client and server on a computer network.
  91. SFTP: SSH File Transfer Protocol. A network protocol that provides file access, file transfer, and file management over any reliable data stream.
  92. SSH: Secure Shell. A cryptographic network protocol for operating network services securely over an unsecured network.
  93. MAC: Media Access Control. A unique identifier assigned to a network interface controller for use as a network address in communications within a network segment.
  94. OSI: Open Systems Interconnection. A conceptual model that standardizes the functions of a communication system into seven categories, or layers.
  95. LAN: Local Area Network. A computer network that interconnects computers within a limited area such as a residence, school, laboratory, university campus, or office building.
  96. WAN: Wide Area Network. A telecommunications network that extends over a large geographic area for the purpose of computer networking.
  97. VPN: Virtual Private Network. A digital tool that changes your IP address and encrypts your online traffic to ensure secure and private internet access.
  98. IaaS: Infrastructure as a Service. An instant computing infrastructure, provisioned and managed over the internet.
  99. PaaS: Platform as a Service. A complete development and deployment environment in the cloud.
  100. SaaS: Software as a Service. A way of delivering applications over the internet—as a service.

Understanding these acronyms and their definitions can improve communication and facilitate the better understanding of key compliance and technology terms. This list is an invaluable resource for anyone involved in the field of compliance or tech-related industries.