Glossary

AI governance, software due diligence, compliance, data strategy, and valuation terms -- defined by practitioners who use them every day.

A

Agentic AI

AI & Governance

AI systems that can autonomously plan, execute multi-step tasks, use tools, and make decisions with minimal human oversight. Unlike chatbots that...

AGPL

Software Licensing

A strong copyleft license that extends GPL's requirements to software accessed over a network. If you modify AGPL software and let users interact...

AI Auditing

AI & Governance

An independent, structured evaluation of an AI system's design, data, outputs, and governance controls. A good audit goes beyond checking boxes -- it...

AI Governance

AI & Governance

The policies, procedures, and oversight structures an organization uses to manage AI risk and ensure responsible AI deployment. Effective AI...

AI Literacy

AI & Governance

The ability of an organization's personnel to understand, evaluate, and appropriately use AI systems. The EU AI Act made this a legal obligation as...

AI Model Escrow

AI & Governance

A contractual arrangement where AI model weights, training data references, and associated documentation are deposited with a neutral third party. If...

AI Washing

AI & Governance

Making misleading claims about a product's use of artificial intelligence -- overstating capabilities, fabricating AI features, or calling basic...

Algorithmic Bias

AI & Governance

Systematic and repeatable errors in an AI system that produce unfair outcomes for particular groups. Bias can enter through training data (historical...

ASC 350

Finance & Valuation

The FASB accounting standard governing intangible assets, including internally developed software. ASC 350-40 specifically covers internal-use...

ASC 805

Finance & Valuation

The FASB accounting standard governing how acquirers account for business combinations (M&A transactions). ASC 805 requires purchase price allocation...

C

Cap Table

Finance & Valuation

A spreadsheet or database showing a company's ownership structure -- who holds what type of equity, at what price, with what preferences and...

CCPA/CPRA

Compliance & Privacy

California's comprehensive privacy laws giving consumers rights over their personal data -- access, deletion, opt-out of sale, and (under CPRA)...

CI/CD

Due Diligence & Software

Automation practices where code changes are automatically built, tested, and deployed. CI ensures every commit is validated against the test suite....

CISA

Compliance & Privacy

The US federal agency responsible for cybersecurity guidance, vulnerability coordination, and critical infrastructure protection. CISA publishes the...

CISO

Compliance & Privacy

The executive responsible for an organization's information security strategy, risk management, and incident response. A full-time CISO at a...

CMMC

Compliance & Privacy

A US Department of Defense framework requiring defense contractors to meet specific cybersecurity standards to handle Controlled Unclassified...

COCOMO

Finance & Valuation

A software cost estimation model used to approximate the effort, time, and cost required to develop or reproduce a software system. COCOMO II is...

Compliance-by-Design

Compliance & Privacy

Building regulatory compliance into systems and processes from the start rather than bolting it on afterward. The concept parallels privacy-by-design...

Conformity Assessment

AI & Governance

A formal evaluation process to determine whether an AI system meets the requirements of a regulation or standard. Under the EU AI Act, providers of...

Convertible Note

Finance & Valuation

A short-term debt instrument that converts into equity at a future priced round, typically with a discount (10-20%) and/or a valuation cap....

COPPA

Compliance & Privacy

A US federal law that imposes requirements on websites and online services directed at children under 13, or that knowingly collect personal...

Copyleft

Software Licensing

A licensing approach that requires derivative works to be distributed under the same license terms as the original. GPL and AGPL are copyleft...

CRA

Compliance & Privacy

An EU regulation requiring manufacturers and distributors of products with digital elements to meet cybersecurity requirements throughout the product...

CVE

Due Diligence & Software

A standardized identifier for publicly known cybersecurity vulnerabilities (e.g., CVE-2024-3094 for the xz-utils backdoor). CVEs are assigned by...

CycloneDX

Due Diligence & Software

An OWASP-maintained standard for creating software bills of materials, with support for SBOMs, VEX documents, and hardware BOMs. CycloneDX supports...

D

Data Bill of Materials (DBOM)

Data Strategy

A structured inventory of the datasets used to train, validate, and test an AI model -- the data equivalent of an SBOM. A DBOM documents data...

Data Contract

Data Strategy

A formal agreement between a data producer and consumer that specifies the schema, format, quality standards, SLAs, and semantics of a dataset or...

Data Governance

Data Strategy

The organizational framework for managing data as a strategic asset -- covering data quality, access controls, lifecycle management, and compliance....

Data Lineage

Data Strategy

The record of where data came from, how it was transformed, and where it went -- the data equivalent of a chain of custody. Data lineage answers "why...

Data Mesh

Data Strategy

A decentralized data architecture where domain teams own and publish their data as products, rather than centralizing everything in a data warehouse...

Data Product

Data Strategy

A curated, documented, and governed dataset, API, or data service designed for repeated use by specific consumers. Data products apply product...

Data Protection Impact Assessment (DPIA)

Compliance & Privacy

A structured assessment required under GDPR Article 35 when data processing is likely to result in high risk to individuals' rights and freedoms. A...

Data Provenance

Data Strategy

Documentation of a dataset's origin, collection method, permissions, and chain of custody. Provenance answers "where did this data come from and did...

Data Quality

Data Strategy

The degree to which data meets the requirements of its intended use — measured across dimensions like accuracy, completeness, consistency,...

Data Strategy

Data Strategy

An organization's plan for collecting, managing, and using data to achieve business objectives. A data strategy covers infrastructure, governance,...

DCF

Finance & Valuation

A valuation method that estimates the present value of an asset based on projected future cash flows, discounted back at a rate reflecting the...

Dependency Analysis

Due Diligence & Software

The process of identifying and evaluating all third-party software components a codebase relies on -- direct dependencies you chose to include, plus...

DevSecOps

Due Diligence & Software

Integration of security practices into every phase of the software development lifecycle, rather than treating security as a final gate before...

S

SAFE

Finance & Valuation

An investment instrument created by Y Combinator where the investor provides capital in exchange for the right to convert into equity at a future...

SBOM

Due Diligence & Software

A structured inventory of all components, libraries, and dependencies in a software product -- the ingredient list for software. Executive Order...

SCA

Due Diligence & Software

Tooling that automatically scans a codebase to identify open-source and third-party components, map their licenses, and flag known vulnerabilities....

SEC

Finance & Valuation

The US federal agency that regulates securities markets, protects investors, and enforces securities laws. For technology companies, SEC reporting...

Shift Left

Data Strategy

Moving testing, security, and compliance activities earlier in the software development lifecycle rather than treating them as a final gate before...

SOC 2

Compliance & Privacy

An audit framework developed by the AICPA that evaluates an organization's controls related to security, availability, processing integrity,...

Software Escrow

Due Diligence & Software

A legal arrangement where source code is deposited with a neutral third party and released to a licensee if specified trigger events occur (vendor...

Software Valuation

Due Diligence & Software

Determining the fair market value of software assets, typically for M&A, tax, financial reporting, or litigation purposes. Software valuation...

Source-Available

Software Licensing

Software whose source code is publicly viewable but whose license restricts certain uses (typically commercial or competitive use). Source-available...

SPDX

Due Diligence & Software

An ISO/IEC standard (ISO/IEC 5962:2021) for communicating software bill of materials information, including component identities, licenses, and...

Static Code Analysis

Due Diligence & Software

Automated examination of source code without executing it, used to identify bugs, security vulnerabilities, code quality issues, and style...

Supply Chain Attack

Due Diligence & Software

An attack that targets the software supply chain -- compromising a dependency, build tool, or distribution channel rather than the target application...

Synthetic Data

Data Strategy

Artificially generated data that mimics the statistical properties of real data without containing actual personal or sensitive information....