A |  B |  C |  D |  E |  F |  G |  I |  J |  L |  M |  N |  O |  P |  R |  S |  T |  U |  V |  W |  X |  Y

Term Definition Definition in Policy #
A    
aap@oit.state.nj.us The 'person' to whom email is sent regarding NJ Shared IT Policy and AAP Surveys. J2EE Application Deployment Policy and Procedures
Access The network infrastructure and services that allow for a communication path between an individual network node and the State/Agency ISP. 06-03-NJOIT
Access Means the ability to receive, use, and manipulate data and operate controls included in information technology. 09-07-NJOIT
Access Board Is an independent federal entity, established by Section 502 of the Rehabilitation Act (29 U.S.C. 792), whose primary mission is to promote accessibility for individuals with disabilities. 07-12-NJOIT
Accounting and Security Logs Logs created from the Security Device and associated security access applications that detail the activity performed by a Remote Access Authorized User. 11-01-NJOIT
Agency Means any agency, authority, board, department, division, commission, institution, institution of higher education, bureau, or like governmental entity of the executive branch of the state government. 09-07-NJOIT
06-03-NJOIT
Agency Chief Technology Officer The individual who has oversight and approval over this policy statement and is to provide the necessary resources to carry out the NJ Shared IT Architecture. J2EE Application Deployment Policy and Procedures
Application Designer A specialized development team role bearing responsibility for app. design. J2EE Application Deployment Policy and Procedures
Application Server An application server is a server program in a computer in a distributed network that provides the business logic for an application program. The application server is frequently viewed as part of a three-tier application, consisting of a graphical user interface (GUI) server, an application (business logic) server, and a database and transaction server. J2EE Application Deployment Policy and Procedures
Application Server Administrator Responsible for Application Server hardware and software. J2EE Application Deployment Policy and Procedures
Application Tester Any individual from business unit, development team who participates in the testing of the application functionality and integrity. J2EE Application Deployment Policy and Procedures
Authentication Security Devices One-time, time synchronous password generators. 11-01-NJOIT
Authorizing Entity For this policy, an Authorizing Entity is a State of New Jersey Department, Agency, State Authority, or an "in but not of" entity. 11-01-NJOIT
Authorized User State of New Jersey employees and third parties (customers, vendors, etc.) who are authorized by the Departments, Agencies, State Authorities and "in but not of" entities, who comply with the Remote Access policy and complete the appropriate Remote Access Registration Form(s). 11-01-NJOIT
Availability The assurance of timely and reliable access to and use of information. A loss of availability is the disruption of access to information or an information system. 08-04-S1-NJOIT
B    
BIA Refers to Business Impact Analysis, which determines the financial, or functional, loss over time when information systems are lost, or down, due to a disaster. 07-10-NJOIT
Business Application Owner Coordinates the various functions and work activities at all levels of a business process, has the authority to ability to make changes in the process as required, and manages process end-to-end so as to ensure optimal overall performance. Is ultimately accountable for the effectiveness of a process. J2EE Application Deployment Policy and Procedures
Business Data Model See Data Model, Business
Business Entity All trusted Entities that are authorized and/or contracted with a Department and/or Agency within the Executive Branch of State Government for the purpose of this policy Business Entity may include other governmental agencies outside the Executive Branch that do not make use of the Garden State Network. 09-11-NJOIT
Business Unit A team with specific business needs which are to be represented by the application. J2EE Application Deployment Policy and Procedures
Business Unit Project Manager The individual responsible for communicating application requirements and related testing. J2EE Application Deployment Policy and Procedures
C    
Cache Is a means to save and store a temporary copy or copies on a server of HTML pages, images and files that are most demanded by clients. The copy will be used as it is requested instead of asking the source (original server). The benefits include reduction in latency and network traffic that results in (perceived) faster response time for the client. Cache may also be used to log the requests for purposes of monitoring.
Cache freshness The concept of keeping cached objects consistent with the original object on the source content server. Generally, this is accomplished by configuring the cache refresh interval and cache expiration rules on the server to force a retrieval of the original object periodically.
Cache
(pronounced CASH)
Is a place to store something more or less temporarily. Web pages which employees request are stored in the browser's cache directory. 09-07-NJOIT
Change A technical or physical modification to the hardware that does not affect the application or process. 09-11-NJOIT
Circuit For the purposes of this procedure, circuit refers to the method of network access, including traditional point-to-point circuits (i.e. ATM, Frame Relay etc.), or via VPN/Encryption technologies. 09-11-NJOIT
Conceptual Data Model See Data Model, Conceptual
Confidential Information Information of a sensitive nature that is available only to designated personnel.  The disclosure, unauthorized access, or unauthorized use of confidential information would have a significant adverse impact on the State and/or the public.
Confidentiality A measure of the ability of the system to protect its data and the means of preserving authorized restrictions from access and disclosure.  A loss of confidentiality is the unauthorized disclosure of information. 08-04-S1-NJOIT
Content Provider Is a generic term that refers to an individual who contributes to the creation or maintenance of a Web page. Content providers include but are not limited to Web designers/developers/programmers, Webmasters, graphic and multimedia designers, and Web publishers. 07-12-NJOIT
Cookie A cookie is a special text file that a Web site adds to your hard disk so that it can recall something about you at a later time. Typically, a cookie records your preferences when using a particular site.

13-09-NJOIT  
09-07-NJOIT

D    
Data For purposes of this policy, data is the electronic representation of people, places, things, transactions, or events. Data can be categorized loosely as "structured", "semi-structured", or "unstructured".
Data Custodian A data custodian is the individual or organization granted authority to possess, use, and/or maintain data in accordance with requirements defined by its data steward. The data custodian is responsible to protect the rights of the data owner for the access, processing, maintenance, storage, protection, and/or destruction of data and electronic records. Data custodians are responsible and accountable for the management and care of the data under their control. See The Data Owner/Steward/Custodian Model.  08-04-NJOIT
Data Description Language Data description language (DDL – also data definition language) is the syntax for defining and creating data structures such as database schemas. As an abstraction in system design, it represents a type of data model, and is the equivalent of an ANSI physical schema. When referencing a specific and complete solution, DDL is used as a synonym for the physical schema of a database solution.
Data Dictionary A data dictionary is a centralized repository of information about data such as meaning, relationships to other data, origin, usage, and format. It represents documentation about the physical data objects, whereas a metadata registry includes both physical and logical data objects, and associates physical representations with a logical definition.
Data Governance Data governance is the formal convergence of data quality, data management, business process management, and risk management around the handling of data in the organization to provide positive control over the processes and methods used by data stewards and data custodians to handle data. It is a system for decision-making and accountability for data-related processes, executed according to agreed-upon policies which describe who can take what actions with what data, and when, under what circumstances, using what methods. Data governance encompasses the people, processes, and information technology required to create a consistent and proper handling of an organization's data across the business enterprise.
Data Governance Executive Committee The New Jersey Data Governance Executive Committee (NJDGEC) serves as the executive sponsor and approval authority for the NJDGF and related data governance, information management, and data management policies so as to direct the enterprise to improve the competing dimensions of data quality, accessibility, security, and value.
Data Governance Models

The Data Owner/Steward/Custodian Model is the relationship between data owner, steward, and custodian is often confusing, as the roles overlap depending on the data. The following example illustrates the application of the various roles.

Agency A must collect the following information from Individual X to process a transaction:

  • Individual X Name at time of transaction
  • Individual X Date of Birth
  • Individual X Social Security Number
  • Individual X Address at time of transaction
  • Transaction Date
  • Transaction Amount
  • Scanned copy of Individual X Birth Certificate provided by Agency B
  • Individual X Photograph, taken at time of transaction by agency

As a result of the transaction, Agency A issues a document with the following information:

  • Individual X Name
  • Individual X Date of Birth
  • Individual X Address at time of transaction
  • Document Identifier
  • Document Expiration Date
  • Individual X Photograph

As a result of the transaction, as permitted by law or regulation, Agency A makes the following information available to Agency C:

  • Individual X Name
  • Individual X Date of Birth
  • Individual X Address at time of transaction
  • Document Identifier
  • Document X Expiration Date

The following table indicates who serves in the indicated role for specific information that makes up this transaction.
The Data Owner/Steward/Custodian Model

Data Governance Scope Model, The

While all state data is an enterprise asset, the governance of that data is the responsibility of multiple organizations. To better define data stewardship (governance) responsibilities to determine the Data Stewardship Organization, the NJDGF classifies data into one of four integration tiers.

  • Tier 0 - Universal Data

Data common to all agencies, including master and reference data.

  • Tier 1 - Enterprise Data

Data that supports common back office functions for all agencies, such as financial, payroll, and human resources data.

  • Tier 2 - Line-of-Business Data

Data that is common to more than one agency in a common line-of-business, or affinity, such as public safety or social services.

  • Tier 3 - Programmatic Data

Data specific to an agency program, of limited interest to other agencies.

The Data Governace Scope Model

Data Integration Data integration is the process of reconciling, cross-walking, and cleansing data from disparate systems through data integration environments such as the enterprise service bus, operational data stores, the enterprise data warehouse, and data marts. Data integration improves data quality and efficiency, and is a foundation for data reusability initiatives.
Data Interoperability Data interoperability is the ability to exchange, share, or reuse data, in real-time or in batch, using a common definition and format (schema) and technology-agnostic tools such as web services.
Data Management Services' Database Administrator The person that is responsible for overseeing the database connectivity process. A member of the Data Management Services Team. J2EE Application Deployment Policy and Procedures
Data Model A data model is an abstract model (or schema) that describes how data is represented and accessed. Data models formally define data elements and relationships among data elements for a domain of interest. A data model explicitly determines the meaning of data, which in this case is known as structured data (as opposed to unstructured data, for example an image, a binary file or a natural language text, where the meaning has to be elaborated). Typical applications of data models include database models, information system designs, and data exchange mappings. The use of the terms conceptual, logical, and physical data models are consistent with the accepted usage of the information management community. They correspond to the ANSI schema definitions as follows: Link to ANSI schema definitions
Data Model, Business A business data model (BDM) is a logical data model that describes the semantics of a business unit independently of any technology solution. It consists of entity classes, representing kinds of things of significance in the business, and relationship assertions about associations between pairs of entity classes. It includes the attributes of those entities along with rules defining the valid values and data types of those attributes. The business data model is fully normalized. It is consistent with the enterprise data model and should also be consistent with an industry data model where one applies.
Data Model, Conceptual A conceptual data model (CDM) is a high-level map of concepts and their relationships. It describes the semantics of an organization and represents a series of assertions about its nature. It describes the things of significance to an organization (entity classes) independently of any technology solution. It includes the associations (relationships) between pairs of those entities. It may also include the more important characteristics (attributes) of those entities.
Data Model, Enterprise An enterprise data model (EDM) is a logical data model that describes the semantics of reference data, master data, other enterprise data, and common enterprise data structures independently of any technology solution. It consists of entity classes, representing kinds of things of significance in the enterprise, and relationship assertions about associations between pairs of entity classes. It is fully normalized with rules defining the valid values and data types of attributes but includes only the enterprise attributes of entities in the model. It functions as a framework into which logical business data models and solution-specific logical data models are integrated.
Data Model, Industry An industry data model (IDM) is a logical data model that describes the semantics of an industry independently of any technology solution. It consists of entity classes, representing kinds of things of significance in the industry, and relationship assertions about associations between pairs of entity classes. It includes the attributes of those entities along with rules defining the valid values and data types of those attributes. The industry data model is fully normalized. While it is a complete data model for an industry, it is not intended to represent a complete data model for any specific business unit or solution. It is used to guide development of logical business data models.
Data Model, Logical A logical data model (LDM) describes the semantics of a system, a subject area, a business or industry, or a proposed technology solution independently of any specific technology implementation. It consists of entity classes, representing kinds of things of significance in the system, and relationship assertions about associations between pairs of entity classes. It includes the attributes of those entities along with rules defining the valid values and data types of those attributes. The logical data model is fully normalized according to the rules of normalization.
Data Model, Physical A physical data model (PDM) describes the data as represented by a particular data manipulation technology. This consists of descriptions of tables and columns, object oriented classes, and XML tags, among other things. A physical data model is derived from and should be consistent with the corresponding logical system data model. It will be fully normalized except where functionality indicates otherwise, such as in the need for control tables, summary attributes, attribute concatenations, many-to-many relationships, and sub-type implementations.
Data Model, System A system data model (SDM) is a logical data model that describes the semantics of a system or technology solution independently of any specific technology implementation. It is a subset of the BDM for the business unit to which the system or technology solution belongs. It consists of entity classes, representing kinds of things of significance in the system, and relationship assertions about associations between pairs of entity classes. It includes the attributes of those entities along with rules defining the valid values and data types of those attributes. The system data model is fully normalized and is used to produce the physical data model for a solution. The SDM is what is typically meant when developers and data architects use the terms “logical model” or “logical data model” in the context of application development.
Data Owner A data owner is the authority, individual or organization that has legal rights to the data and those rights are protected by law. The legal rights of a data owner can include copyright and intellectual property rights as well as the rights to exploit and/or destroy the data. The rights of the data owner apply even when the owned data is collected by a third party and/or combined with data owned by others. See The Data Owner/Steward/Custodian Model. 08-04-NJOIT
Data Reusability Data reusability is the process of collecting, managing and storing data in forms and formats to enhance the quality, understanding and value of that data, to promote the efficient use of that data between agencies and applications, and to minimize data redundancy and conflicting definitions. It is more specific than data sharing, in that data sharing is based on data duplication and data movement, while the goal of data reusability is to eliminate unnecessary duplication, and provide a framework for necessary duplication. It is more specific than data integration, in that data integration is the reconciling and cross-walking of information from disparate systems, while the goal of data reusability is to achieve the same benefits as data integration through optimization and standardization of master reference data and normalization and rationalization of definitions and formats for data of interest across systems and units.
Data Sharing Data sharing is the process of duplicating and moving data between systems so that the data can be consumed and used by the receiving system independently of its use in the providing system. While having the appearance of increasing efficiency, data sharing actually decreases operational efficiency, degrades data quality, and increases costs. For this reason, data reusability and data interoperability are preferred.
Data Steward A data steward is the individual responsible for the use of data within his/her functional areas and for the documentation of that data in a metadata registry. On behalf of the data stewardship organization, a data steward follows and/or implements policies, procedures, and guidelines that pertain to the data during the lifecycle of that data entrusted to his or her stewardship. See The Data Owner/Steward/Custodian Model.  08-04-NJOIT
Data Steward, Agency The agency data steward is the individual designated by the agency or significant business unit to represent it on the New Jersey Data Governance Council and coordinate the activities of all data stewards within that organization.
Data Steward, Domain The domain data steward is the data steward for an enterprise system of record or an individual designated by the New Jersey Data Stewardship Council to have responsibility for a specific cross-system, cross-agency data domain to support master data management.
Data Stewardship Committee, Domain A Domain Data Stewardship Committee (DDSC) is responsible for resolving data definitions, prioritizing reusable data asset initiatives, defining source systems of record, managing a logical data model, and providing general guidance to information architecture and data management efforts for a particular domain, line of business, or subject area. 
Data Stewardship Council, Enterprise The New Jersey Enterprise Data Stewardship Council (NJEDSC) provides guidance to the New Jersey Office of Information Technology in the development and implementation of data management policies. It encourages data sharing and data reusability. It resolves issues involving determination of enterprise sources of record. It facilitates development of a statewide reference data model. It suggests candidates for inclusion into the enterprise data warehouse and master data management repository.
Data Stewardship Organization A data stewardship organization (DSO) is the authority or organization responsible for the use of data within its functional areas. The data stewardship organization is responsible for developing policies specifically related to the use of the data, and for designating data stewards to implement and enforce those policies. The data stewardship organization may also be the data owner.
Data Stewardship Organization, Domain The New Jersey Data Governance Council is the domain data stewardship organization (DDSO) for master and reference data that crosses system and agency boundaries. 
Data Stewardship Organization, Enterprise An enterprise data stewardship organization (EDSO) is the authority or organization responsible for the use of data in an enterprise system of record.
Data, Semi-Structured Semi-structured data includes non-tabular data with either an explicit or implicit structure (through metadata or context) but lacking the rigidity of a tabular structure. It includes HTML files, non-database XML representations, e-mail files not already in a database, and word processing files based upon templates.
Data, Structured Structured data includes electronic records stored in databases or stored in files with the same functionality as databases. This may sometimes be referred to as tabular data. It includes data in relational, hierarchical, object-oriented, and networked databases, as well as in personal databases, spreadsheets, comma-separated value files, flat fixed-length files, other types of delimited files, XML files representing data records, VSAM files, and any other format designed to provide similar functionality.
Data, Unstructured Unstructured data includes sound, video, graphical, and free-form text and word processing files.
Database A database is a collection of data that is organized so that its contents can easily be accessed, managed, and updated. J2EE Application Deployment Policy and Procedures
Database Server Administrator Responsible for the installation of DB Server software. J2EE Application Deployment Policy and Procedures
Database Management System A database management system (DBMS) is a set of computer programs that controls the creation, maintenance, and the use of data. It places control of organization-wide database development in the hands of database administrators (DBAs) and other data specialists. Database management systems may use any of a variety of database models, such as the network model or relational model (RDBMS). In large systems, a database management system allows users and other software to store and retrieve data in a structured way. It helps to specify the logical organization for a database and access and use the information within a database. It provides facilities for controlling data access, enforcing data integrity, managing concurrency, and backing up and restoring the database.
De Minimus De Minimus (or limited) use is defined as the brief in duration and infrequent personal use of the State's telephone/wireless devices, to ensure that there is little or no cost to the State.   In relationship to the personal use of the State's email and internet system, it refers to the limited personal use before or after work hours, or during authorized breaks and lunch periods, such time should not be visible, interruptive or perceived as non-state business, in addition to having no impact on assigned work.
Deploy-request@oit.state.nj.us The 'person' to whom email is sent regarding deployment and associated topics. J2EE Application Deployment Policy and Procedures
Desktop Support Group The team responsible for the installation and maintenance of OIT desktops. J2EE Application Deployment Policy and Procedures
Developer A member of the development team or anyone tasked with the coding of an application. J2EE Application Deployment Policy and Procedures
Development Team The group of people responsible for developing the application. They may be either State employees and/or outside consultants. J2EE Application Deployment Policy and Procedures
Director, Application Infrastructure Services (AIS) The individual who has oversight and approval over AIS issues. J2EE Application Deployment Policy and Procedures
Disaster Is any sudden or unplanned calamitous event that causes a significant disruption in information systems and/or telecommunications systems or business function that significantly affects the operation of an organization. 07-10-NJOIT
Disaster Recovery / Continuity of Operations (COOP) Are commonly used terms referring to the steps required to recover business functions and service following either a disaster or other event resulting in a long term disruption of business activity. 07-10-NJOIT
Disclose To expose a computer generated and/or maintained file to the attention of someone other than the originator or original recipient.
E    
EAR An EAR (Enterprise Archive) file is a JAR file that contains a J2EE application. A J2EE application is a group of Web modules that collectively perform as a single entity. JAR (short for Java Archive) files were introduced in the early days of Java as a means to conveniently package and distribute Java applications and components. J2EE Application Deployment Policy and Procedures
Electronic Mail (E-Mail) Messaging Non interactive communication of text, data, images between a sender and designated recipient(s) by system utilizing telecommunication links.
E-Mail Electronic Mail systems both internal and external to the State of New Jersey. J2EE Application Deployment Policy and Procedures
Employee Refers to full-time and part-time employees, temporary employees/personnel, and consultants who are “resident” on the entity’s site. A “visitor” is defined as a vendor, guest of an employee, service personnel, or anyone who needs to enter the facility for a short duration, usually not more than one day. 09-05-S1-NJOIT 
Enhancement A noteworthy improvement to the product which is intended to make it better in some way, e.g. new functions, new process, or occasionally more compatible with other systems. 09-11-NJOIT
Enterprise Data Model See Data Model, Enterprise
Enterprise Data Reference Model An enterprise data reference model (EDRM) is not a data model. It is a framework whose primary purpose is to enable information sharing and reuse across the enterprise via the standard description and discovery of common data and the promotion of uniform data management practices. The EDRM describes artifacts which can be generated from the data architectures of business units. The EDRM provides a flexible and standards-based approach to accomplish its purpose. The NJDGF is an EDRM.
Event Any Remote Access violation and/or suspicious activity that causes intentional and/or unintentional damage to or misuse of the State's information technology assets. 11-01-NJOIT
External Entities Any person not defined as a State Employee. 11-01-NJOIT
Extranet An Extranet is a private network that uses Internet technology and the public telecommunication system in order to securely share part of a business's information or operations with suppliers, vendors, partners, customers, or other businesses.   In the case of the State of New Jersey, the Extranet can include firewall server management, the issuance and use of digital certificates or similar means of user authentication, encryption of messages through the use of a SSL tunnel, and the use of virtual private networks (VPNs) that tunnel through the public network. 09-11-NJOIT
F    
Firewall A hardware or software device that separates two networks. J2EE Application Deployment Policy and Procedures
Firewall Administrator The person responsible for maintaining firewalls. J2EE Application Deployment Policy and Procedures
FTP File Transfer Protocol (FTP), a standard Internet protocol, is the simplest way to exchange files between computers on the Internet. J2EE Application Deployment Policy and Procedures
G    
Geographic Information System (GIS) A geographic information system (GIS) captures, stores, analyzes, manages, and presents data that is linked to location. It integrates, stores, edits, analyzes, shares, and displays geographic information. Geographic information system applications are tools that allow users to create interactive queries, analyze spatial information, edit data and maps, and present the results of all these operations. Geographic information systems are the merging of graphic map entities and traditional databases. 
I    
Independent State Agencies Are authorities, boards, commissions and other agencies of the State of New Jersey, which are not subject to the policy supervision and control of the Governor.  An example of an independent State agency would be the New Jersey Transit Authority.

13-09-NJOIT
06-06-NJOIT

Independent State Entities Are authorities, boards, commissions, and other agencies of the state of New Jersey, which are not subject to the policies, supervision, and control of the Governor. An example of an independent state agency is the NJ Transit Authority. 07-12-NJOIT
Industry Data Model See Data Model, Industry.
Information Information is the formal product of the raw data asset. It is data in context, understandable by its intended audience, generally provided to answer a question, to stimulate a discussion, as input to planning and forecasting, or for trend analysis. 
Information Assets Information Assets are defined as all categories of electronic devices that process and/or contain digital information including but not limited to the following: databases, records, files, electronic documents, stored data, applications, and other software that is required to support business processes such as application software and system software. 08-04-NJOIT
Information Infrastructure Means telecommunications, cable, and computer networks and the Internet, including the World Wide Web, E-mail, File Transfer Protocol, Usenet, bulletin board systems, on-line systems, and telephone networks. 09-07-NJOIT
Information Technology All electronic information processing hardware and software, including telecommunications. 09-07-NJOIT
Instant Messaging Is a type of communications service that enables a user to create a private chat room with another individual. Typically, the instant messaging system alerts a user whenever somebody on the user's private list is online. A user can then initiate a chat session with that particular individual. This type of communication constantly searches the Internet looking for persons on the private list. Instant messaging requires larger amounts of network resources (bandwidth). 09-07-NJOIT
Integrated Planning Process (IPP) A process that facilitates the intake of work, provides visibility to management of our current workload, feeds the Information Technology Infrastructure Library (ITIL) processes and the Project Initiation, Planning and Execution Line (PIPE Line) process, formerly known as the System Architecture Review (SAR) process.  Through a series of reviews conducted at different stages or phases of the project, the IPP will ensure that technical solutions are conceived, designed and deployed in an efficient and effective manner.   These review points occur throughout the project lifecycle, to ensure that projects match strategic objectives and align with OIT's Shared IT Architecture document http://www.nj.gov/it/ps/it_architecture.doc.  IPP includes a Business Case Review, Logical Review, Physical Review, Implementation Review and Post Implementation Review. 09-11-P1-NJOIT
09-11-NJOIT
Integrity The assurance that data is consistent and correct.  A loss of integrity is the unauthorized modification or destruction of information. 08-04-S1-NJOIT
Internet A worldwide system of interconnected computer networks in which users at any one computer can obtain and exchange information with any other computer. 09-07-NJOIT
06-03-NJOIT
Intrusion Detection System Gathers and analyzes information from various areas within a computer or a network to identify possible security breaches. 06-06-NJOIT
ISP (Internet Service Provider) An entity that provides access to the Internet. 06-03-NJOIT
J    
J2EE (Java 2 Platform, Enterprise Edition) Is a Java platform designed for the mainframe-scale computing typical of large enterprises. Sun microsystems (together with industry partners such as IBM) designed J2EE to simplify application development in a thin client tiered environment. J2EE simplifies application development and decreases the need for programming and programmer training by creating standardized, reusable modular components and by enabling the tier to handle many aspects of programming automatically. J2EE Application Deployment Policy and Procedures
J2EE Server Administration Team The team responsible for the hosting environment for web and application servers. J2EE Application Deployment Policy and Procedures
L    
Latency The time it takes for a packet of data to get from one designated point to another. Latency and bandwidth combined define the speed and capacity of the network.
Lead Developer The person that is most responsible for the development of the application. The most application aware member of the development team. J2EE Application Deployment Policy and Procedures
Local Registration Authority (LRA) An agent for the agency's SVR, for vetting identities and gathering completed forms. 11-01-NJOIT
Logical Business Data Model See Data Model, Logical Business.
Logical Data Model See Data Model, Logical.
Logical System Architecture Review A meeting at which the business sponsor, Project Manager and the Architecture Review Team meet to discuss the Logical System Architecture Review document to ensure that capacity, resources hardware and software needs are identified and infrastructure requirements are determined. 09-11-P1-NJOIT
M    
Malicious Software Software designed to infiltrate or damage a computer system without the owner's informed consent.  The expression is a general term used by computer professionals to mean a variety of forms of hostile, intrusive, or annoying software or program code. 09-07-NJOIT
Media - Hard & Soft Copies Electronic (or soft copy) media are the bits and bytes contained in hard drives, random access memory (RAM), read-only memory (ROM), disks, memory devices, phones, mobile computing devices, optical disks, magnetic tape, networking equipment, and any other type of material that that store, capture, or process data.   Hard copy media is the physical representations of information which includes but is not limited to paper printouts, transparencies, multipart forms, facsimile ribbons, microfilm or microfiche, drums and platens are all examples of hard copy media. These types of media are often the most uncontrolled.  Information tossed into the recycle bins and trash containers exposes a significant vulnerability to accidental disclosures.
Metadata Metadata consists of information that characterizes or defines data. Metadata describes the definition and format of data, as well as how, when and by whom a particular set of data was collected.  Metadata attributes include, but are not limited to, logical name, physical name, data type, definition, valid values, constraints, transformations, business rules, relationships to other data, source system, point of contact (data steward), and the confidentiality, integrity, and availability classification of the data.  
Metadata Registry A metadata registry (MDR) is a central location in an organization where metadata definitions and attributes are stored and maintained in a controlled manner.
Metadata Registry Authority A metadata registry authority (MDRA) is the organization designated to manage an MDR for a system or agency and enforce compliance with the data naming standard.
Metadata Registry Authority, Enterprise An enterprise metadata registry authority (EMDRA) is the organization designated to manage the EMDR and enforce compliance with the data naming standard statewide.
Metadata Registry, Enterprise An enterprise metadata registry (EMDR) is the State’s central location where metadata definitions and attributes are stored and maintained in a controlled manner.
Monitor As a verb, the availability of a computer program or a human to check, observe, test, track or watch.
Multifactor Authentication Authentication based on proving identity by means of:
1. User id – “unique identifier” assigned to the Authorized User
2. Password – what the Authorized User “know”
3. Physical Token and random security code – what the Authorized User “has”
11-01-NJOIT
N    
Network A system that transmits any combination of voice, video and/or data between users.  The network includes the network operating system in the client and server machines, the cables connecting them and all supporting hardware in between such as bridges, routers and switches. In wireless systems, antennas and towers are also part of the network. 09-07-NJOIT
Network Engineers / Network Analysts Specialized System Server Administrators. J2EE Application Deployment Policy and Procedures
NJOIT Chief Technology Officer The individual who has oversight and approval over this policy statement and is to provide the necessary resources to carry out the NJ Shared IT Architecture. J2EE Application Deployment Policy and Procedures
NJ Portal An access method that provides Secure Socket Layer application connectivity to Private network hosts on the GSN via encrypted tunnels over the Public Internet. 11-01-NJOIT
O    
Online (On Line, On-Line) Is the condition of being connected to a computer or a telecommunications system. For the purposes of this policy, the term is used to describe a connection to the Internet. 13-09-NJOIT
06-06-NJOIT
P    
Path Records Is the combination of history, cache, cookie, e-mail header files that record the Internet pages visited. 09-07-NJOIT
Performance Assessment Analyst Responsible for producing performance metrics. J2EE Application Deployment Policy and Procedures
Personal Information Information about a natural person that identifies or describes an individual, including, but not limited to, his or her name, social security number physical description, home address, home telephone number, education, financial matters, and medical or employment history, readily identifiable to a specific individual. 09-07-NJOIT
Personal Information Personally identifiable information about individuals that is protected by Federal and/or State law such as name, address, social security number, driver's license number, account numbers, mother's maiden name, etc.  The disclosure, unauthorized access, or unauthorized use of Personal information would have a significant adverse impact on the individuals whose information was disclosed.
Personal Naming Standard Defines a uniform naming format that allows users to be addressable by a minimum set of address elements. 09-04-NJOIT
Personally Identifiable Information Personally Identifiable Information (PII) is legally defined by federal and state statute. In general, it is data which relate to a natural person who can be identified from those data, directly or indirectly, in particular by reference to an identification number or to one or more factors specific to his or her physical, physiological, mental, economic, cultural, or social identity.  13-09-NJOIT
Physical Assets Physical assets are defined as all computing, telecommunication and other devices that process and contain digital information including but not limited to, processors, monitors, laptops, modems, hand-held wireless devices, communications equipment (routers, switches, firewalls, etc.), magnetic media (tapes and disks), and other technical equipment. 08-04-NJOIT
Physical Data Model See Data Model, Physical.
Physical System Architecture Review A meeting at which the appropriate representatives from OIT's Infrastructure Support Services (ISS), Architectural Standards and Enterprise Technologies (ASET), Information Security and Disaster Recovery as well as the Project Team discuss the Physical System Architecture Review document to determine if project deadlines and programming and infrastructure requirements have been met. 09-11-P1-NJOIT
Portal Administration Team Manages the myNewJersey portal hardware, software, and content. J2EE Application Deployment Policy and Procedures
Portable computing devices May include but are not limited to: tablets, personal digital assistants (PDA's), universal serial bus (USB) port devices, compact discs (CD's), digital versatile discs (DVD's), flash drives, modems, mobile phones, and any other existing or future mobile or portable storage device that may connect to, access and/or store  information or data.
Principles of Fair Information Practices Are a set of widely accepted information practices that the Federal Trade Commission supports for consumer oriented Web sites that collect personal identifying information from or about consumers online. The principles include consumer notice, consumer choice, appropriate levels of security and consumer access to their personally identifiable data. 13-09-NJOIT
Project Sponsor The party or parties for which the application is being developed. The sponsor is usually responsible for financial expenses related to the application. J2EE Application Deployment Policy and Procedures
Proxy A server, in an organization that uses the Internet, that acts as an intermediary between a workstation user and the Internet so that the enterprise can ensure security, administrative control, and caching service. The proxy intercepts all requests to the Internet server to see if the request from the user is authorized and can be fulfilled. This is a means to filter requests and prevent access to a specific set of Web sites. However, a proxy may be set only to log site access and produce reports for management review.
R    
Reasonable Steps Steps that do not impose undue financial or administrative hardship on an agency. 07-12-NJOIT
Recover Time Objective (RTO) Is the period of time within which systems, applications, or functions must be recovered after an outage (e.g. one business day). RTO's are often used as the basis for the development of recovery strategies, and as a determinant as to whether or not to implement the recovery strategies during a disaster situation. 07-10-NJOIT
Remote Access Access that is provided using public communication links to connect remote users via client software to private network resources. This system uses encryption and other security mechanisms to ensure that only Authorized Users can access the GSN and that the data cannot be intercepted.   11-01-NJOIT
S    
Sanitize/Purge A media sanitization process that protects the confidentiality or sensitivity of the information by rendering the data unrecoverable by means of data, disk, or file recovery utilities.  Also to make the data resistant to recovery attempts executed from standard input devices or data scavenging tools.
Security Device A network hardware device that enables secure connections to private network hosts via encrypted tunnels over the Public Internet. 11-01-NJOIT
Security Specialists Individuals that focuses on hardware and software security issues. J2EE Application Deployment Policy and Procedures
Semi-Structured Data See Data, Semi-Structured.
Senior Management Refers to the chief executive, chief information officer, and chief technology officer, chief financial officer and any other official reporting directly to the chief executive of a principal department or agency, including NJOIT. 07-12-NJOIT
Sexually Explicit Content Content having as a dominant theme (i) any lascivious description of or (ii) any lascivious picture, photograph, drawing, motion picture film, digital image or similar visual representation depicting a lewd exhibition of nudity, sexual excitement, or sexual conduct. 09-07-NJOIT
Shared Server Infrastructure A group of servers that are clustered together for hosting and performance purposes. J2EE Application Deployment Policy and Procedures
Site Representative (Site Virtual Private Network Representative - SVR) The agency's coordinator will be responsible to track all agency requests for Remote Access, and act as the liaison between the users/vendors and NJOIT. 11-01-NJOIT
SONJ This is an initialism for the “State of New Jersey”. As used in these policies, it is further refined to be a synonym for “Executive Branch of New Jersey State Government”, as in “SONJ systems”. This reflects that the Legislative and Judicial branches of state government are out of scope for these policies.
Source Data Source data is the data at the point that it is collected, typically through a transactional processing system, and which may be of use to other systems. While all data collected through transactional processing is potentially source data it does not necessarily make the system the enterprise system of record (ESOR) for that data. An example is a system that collects transaction data with addresses that includes municipalities. While it is the system of record for the addresses in the transaction, the enterprise system of record for the list of Municipalities is the New Jersey Universal Data Store (master data management system).
Split Tunneling When connected via the Remote Access, it is a method that allows Internet destined traffic to be sent unencrypted directly to the Internet, which could compromise the GSN. 11-01-NJOIT
Sponsoring Agency Any Department, Agency, Authority, and "in but not of" entity within the Executive Branch of New Jersey State Government. 09-11-NJOIT
SSL (Secure Sockets Layer) Is a commonly used protocol for managing the security of a message transmission on the Internet. 13-09-NJOIT
Stakeholder An individual with a vested interest in the success of the application development process. J2EE Application Deployment Policy and Procedures
State Employee State employees must be entered into the State's Personnel Management Information System (PMIS) or its successor. 11-01-NJOIT
State-provided Access to the Internet via computer system networks owned, leased or operated by the State of New Jersey. Use of these services may be subject to monitoring for security or network management reasons. 09-07-NJOIT
Streaming Media Streaming video with sound. With media streaming, a web user does not have to wait to download a large file before seeing the video or hearing the sound. Instead the media is sent in a continuous stream and is played as it arrives. Streaming media requires larger amounts of network resources (bandwidth). 09-07-NJOIT
Streaming Video A sequence of "moving images" that are sent in compressed form over the Internet and displayed by the viewer as they arrive. An example of a streaming video is a stock market ticker. With streaming video, a web user does not have to wait to download a large file before seeing the video. Instead the video is sent in a continuous stream and is played as it arrives. Streaming video requires larger amounts of network resources (bandwidth). 09-07-NJOIT
Structured Data See Data, Structured.
Structured Query Language (SQL) Structured query language (SQL) is a database computer language designed for managing data in relational database management systems (RDBMS. Its scope includes data query and update, schema creation and modification, and data access control. 
System An organized assembly of resources and procedures--i.e., computing and communications equipment and services with their supporting facilities and personnel--that collect, record, process, store, transport, retrieve, or display information to accomplish a specified set of functions.
System Data Model See Data Model, System.
System of Record The system of record (SOR) is the authoritative data source for a given data element or piece of information. Within an organization, there should be a system of record designated for all data created or consumed by its systems. The definition of the system of record is critical when data is being integrated across multiple systems. The designation of the system of record, and the use of a controlled vocabulary, can resolve disagreements as to definitions, reduce ambiguity, and improve data quality. See The System of Record Model.
System of Record, Enterprise The enterprise system of record (ESOR) is the authoritative data source for a given data element or piece of information used by the SONJ. It is the system designated as the primary source of a particular piece or set of data. It does not have to be an SONJ system. The organization maintaining that system is the enterprise data stewardship organization for that data. The data steward for that data is the enterprise data steward. 
The System of Record Model

The identification of appropriate systems of record for source data is often confusing, as there are multiple systems collecting the same data and competing uses for that data. The System of Record is often what people mean by “Data Owner”, as the intent is to indicate the system with the ultimate responsibility for the quality of and access to a particular data object.

The following table uses the example from Section 1 above to illustrate the systems of record. For purposes of this chart, Agency A refers to the document transactional system at Agency A and Agency B refers to the birth certificate transactional system at Agency B. Agency C cannot be a system of record for the data it received.

See System of Record Model Example

System Server Administrator A person responsible for Garden State Network servers and connectivity. J2EE Application Deployment Policy and Procedures
T    
TCP/IP Transmission Control Protocol/Internet Protocol. 06-03-NJOIT
Technical Project Manager An individual responsible for the creation and implementation of at least one technical piece of the application. May be an NJOIT employee or an Agency employee. J2EE Application Deployment Policy and Procedures
Telecommunications The transmission of information, images, pictures, voice or data by radio, video, or other electronic or impulse means. 09-07-NJOIT
Transaction Risk Assessment Is the process that determines the security requirements necessary to ensure the appropriate level of availability, integrity, access, confidentiality, authentication and non-repudiation of the information in question. 13-09-NJOIT
U    
Universal Web Accessibility Refers to the condition of a Web site designed to meet the needs of the widest range of people's abilities. 07-12-NJOIT
Unstructured Data See Data, Unstructured.
User Any employee, contractor, vendor, or business partner who accesses and uses State/NJOIT computing systems. J2EE Application Deployment Policy and Procedures
User Managed Service A service where the user is responsible for selecting an Internet Service Provider (ISP), coordinating installation, and installing any required software. 11-01-NJOIT
V    
VPN Concentrator A network hardware device that enables secure connections to private network hosts via encrypted tunnels over the Public Internet.
W    
W3C (the World Wide Web Consortium) Refers to the independent, computer industry group that develops interoperable technology, specifications, guidelines, software, and tools designed to enable the Web to its full potential as a forum for information, commerce, communication, and collective understanding. 07-12-NJOIT
Web Server A Web server is a program that uses the client/server model and the World Wide Web's Hypertext Transfer Protocol (HTTP), and serves the files that form Web pages to Web users (whose computers contain HTTP clients that forward their requests). J2EE Application Deployment Policy and Procedures
Web Server Administrator Responsible for Web Server hardware and software. J2EE Application Deployment Policy and Procedures
Web site Is a collection of HTML (Hypertext Markup Language) files on a particular subject that includes a beginning file called a home page. For example, most companies, organizations, or individuals that have Web sites publish a single address. This is their home page address. From the home page, you can get to all the other pages on their site. 13-09-NJOIT
06-06-NJOIT
X    
XML - eXtensible Markup Language XML (extensible markup language) is a set of rules for encoding documents electronically. It is defined in the XML 1.0 Specification produced by the World Wide Web Consortium and several other related specifications; all are fee-free open standards. XML’s design goals emphasize simplicity, generality, and usability over the Internet. It is a textual data format, with strong support via Unicode for the languages of the world. Although the use of XML focuses on documents, it is widely used for the representation of arbitrary data structures, for example in web services. There are a variety of programming interfaces which software developers may use to access XML data, and several schema systems designed to aid in the definition of XML-based languages. Hundreds of XML-based languages have been developed.
Y    
Year 2000 Compliant Capable of calculating, manipulating and/or presenting date values that are free of logical or arithmetic inconsistencies. This involves all possible valid date values for the coming millennium (i.e., from the year 2000 on, including leap years). 07-14-NJOIT