FindLaw Legal Dictionary

The FindLaw Legal Dictionary -- free access to over 8260 definitions of legal terms. Search for a definition or browse our legal glossaries.

Technology Law Glossary

Trying to decipher an acronym? Attempting to understand legal jargon? The Technology Law glossary gives you access to definitions for the legal terminology commonly used in documents, and court proceedings. This Technology Law glossary will help you understand the legal terms and phrases which are relevant to blogger laws, e-discovery, and other areas of Technology law.

FindLaw is your starting place for help understanding the law. Start here to find resources to learn how to find an attorney, legal aid services, and legal self help. Click for a full list of the free legal information available at FindLaw.

  • Applet
    An applet is a small application. In terms of the Internet, an applet is a little program that can be sent with a Web page to a user. Using Java programming language, applets can perform animation and ...
  • Application Integration
    The process of merging information from one application with that of another application.  Achieving application integration varies in difficulty depending on the software capabilities.
  • B2g
    Short for business-to-government, also known as e-government. B2G is the idea that government agencies and businesses can use central Web sites to conduct business and interact with each other more ...
  • Back-End
    Back-end and front-end are expressions that describe programs relative to the user. A front-end program is one that users interact with directly, while a back-end program supports the front-end ...
  • Beta Test
    A beta test is the second phase of software testing where a not-yet-final version of the software is made available to a limited number of users so that they can test the program and provide feedback. ...
  • Clustering
    Clustering is the use of multiple computers and storage devices to create what seems to be a single system.  Clustering is often used to increase a system's availability and for load balancing on ...
  • Cold Site
    A cold site is a commercial disaster recovery service that provides only the office space required for an organization to continue its operations. Cold sites are less expensive than hot sites, but not ...
  • Cracker
    A cracker is one who engages in one or more of the following: breaks into a computer system; figures out ways to bypass security or license protection in software; intentionally breaches computer ...
  • Crm
    Acronym for Customer Relationship Management.  CRM is an industry term for software solutions that help enterprise businesses manage customer relationships in an organized way.  An example of a CRM ...
  • Cross-Site_scripting
    Cross-Site Scripting (XSS) refers to a kind of computer security vulnerability, most often found in web applications, whereby malicious web programmers are able to inject code into websites viewed by ...
  • Data Mining
    As the term suggests, data mining is the analysis of data to establish relationships and identify patterns. 
  • Dynamic Ip Address
    A dynamic IP addres is one that is temporarily assigned from a pool of IP addresses. The dynamic IP address was created as a remedy to the problem of there being only a finite number of static IP ...
  • Efs
    Acronym for Encrypting File System.  EFS is a feature of Windows 2000 that enables any file, document or folder to be stored in an encrypted form.  EFS is useful for storing highly sensitive data ...
  • Encryption
    Encryption is the conversion of data into a form not readily understood by unauthorized people, called cipehertext. Decryption is the conversion of encrypted data back into its original form, so it ...
  • Ethernet_card
    Hardware in a computer that transmits the Ethernet, local area network (LAN) protocol over a line, wire or cable.
  • File Sharing
    The term file sharing refers to the sharing of computer data or space on a network. File sharing allows multiple users to use the same file by being able to read, modify, copy and/or print it. File ...
  • Front-End
    Back-end and front-end are expressions that describe programs relative to the user. A front-end program is one that users interact with directly, while a back-end program supports the front-end ...
  • Gigabyte
    A gigabyte is a measure of electronic data storage capacity, which is approximately equal to one billion bytes. Often shortened to "gigs."
  • Gui
    Acronym for Graphical User Interface. A GUI is the graphical user interface to a computer, and its elements include such things as: windows, icons, buttons, cursors and scroll bars. For example, this ...
  • Hacker
    1) According to The New Hacker's Dictionary a hacker is a clever computer programmer, who does not necessarily engage in illegal activities. 2) In the media, a Hacker refers to a person who illegally ...
  • Hard Disk
    A hard disk (or hard drive) is internal hardware which stores and provides access to large amounts of information. Most new computers include an internal hard disk that contains several gigabytes of ...
  • Host
    Host has many meanings, but is usually refers to a computer or an IP address.
  • Hostname
    A name that can be resolved into an IP Address using a name server.
  • Hot Site
    A hot site is a commercial disaster recovery service that enables an organization to sustain its computing and network abilities in the event of a massive equipment failure. A hot site provides the ...
  • Html
    Acronym for Hypertext Markup Language. HTML is the set of codes inserted into a file or document that is intended for display on a Web browser. HTML tells the browser how to display a document's words ...
  • Http
    Acronym for HyperText Transfer Protocol. HTTP is the rules for exchanging all types of files on the Web. In relation to the TCP/IP set of protocols, which enable information exchange on the Web, HTTP ...
  • Icann
    Acronym for Internet Corporation for Assigned Names and Numbers. ICANN is the private, non-profit corporation, which is responsible for IP address space allocation, protocol parameter assignment, and ...
  • Imap
    Acronym for Internet Message Access Protocol. IMAP is a standard protocol for accessing e-mail from a local server. A simpler e-mail protocol is Post Office Protocol 3 (POP3), which downloads mail to ...
  • Ip Address
    A set of four numbers separated by periods, each between 0 and 255, which uniquely identifies an address on a network. See Static / Dynamic IP Address.
  • Java
    Java is a computer programming language that is designed for use in the multiple-computer environment of the Internet. It can be used to make single-machine applications or be distributed among many ...
  • Javascript
    Javascript is not the same as Java.  Javascript is a Netscape creation that is easier to learn than Java, but lacks some of the speed and portability of Java.  Java is a computer programming ...
  • Jpeg
    A JPEG, pronounced jay-peg, is a one format of electronic graphic image files supported by the Web. JPEG files end with the suffix ".jpg." Other image formats include the Graphic Interchange Format ...
  • Killer App
    Killer App is an industry for an application program that persuades the user to purchase the system on which the application runs.
  • Lan
    Acronym for local area network. LAN is a group of associated computers which share a common communications line and server within the same geographic area. Typically, LAN users share applications and ...
  • Meta_tag
    A meta tag is an element of HTML that often describes the contents of a Web page, and is placed near the beginning of the page's source code. Search engines use information provided in a meta tags to ...
  • Metadata
    Metadata is a description or definition of electronic data, or data about data. Often, metadata can only be accessed in certain viewing modes. Metadata can include descriptive HTML tags (see Meta Tag) ...
  • Migration
    Migration widely refers to the process of moving a computer system and/or its components from one operating environment to another operating environment. Migration also refers to moving data from one ...
  • Modem
    Internal or external hardware which enables the computer to send and receive information over a telephone line.
  • Name_server
    A machine on a network that enables a hostname to be resolved into an IP address.
  • Network
    Network is a broad term that can apply to any number of multiple-computer interconnections, series of points or nodes interconnected by communication paths. Networks can be described in terms of its ...
  • Network Interface
    Hardware in a computer which enables the transmission of information over a line, wire or cable. Examples include a modem or an Ethernet card.
  • Opac
    Acronym for Online Public Access Catalog. OPAC is an online catalog of a library collection that is available to the public. Today most libraries make their OPAC publicly accessible via the Web.
  • Open_source
    Open source refers to any program whose source code is made publicly and freely available for use and/or modification.
  • Patch
    A patch is a quick fix for a part of software that contains a bug or a weakness. Patches can often be downloaded from the manufacturer's Web site.
  • Pda
    Acronym for Personal Digital Assistant. A PDA refers to any small hand-held wireless device that provides computing and data storage abilities. The term handheld is a synonym. Examples of PDAs include ...
  • Pixel
    A pixel is the primary unit of color on a computer monitor or in an electronic image.
  • Plug-In
    A plug-in is a program that enables a Web browser to present non-HTML documents, such as Adobe Acrobat documents or sound and video programs.
  • Query
    A query is a formally phrased question. In computer terms, a query is the information entered by a user of a search engine or database.
  • Raid
    Acronym for redundant array of independent disks or redundant array of inexpensive disks. RAID is a performance enhancing method of storing the same data in different places on multiple hard disks. ...
  • Roi
    Acronym for return on investment. ROI refers to the amount of profits or savings a business will realize from any given use of money.
  • S-Http
    Secure HTTP, or S-HTTP, enables the secure exchange of information and files on the Web. S-HTTP files are encrypted and/or contain a digital certificate. This type of transaction security is likely to ...
  • Script
    Script is a programming term referring to a set of instructions or program that is executed by another program instead of the computer processor. Examples of script languages include PERL and ...
  • Scsi
    Acronym for Small Computer System Interface. SCSI, pronounced skuzzy, enables a computer to interact with external hardware, such as CD-ROM drives, printers, and scanners.
  • Smurfing
    Smurfing is a method of attacking of a network or Web site, using a program called Smurf, whereby the network is flooded with generated requests to the point that it becomes unusable for actual ...
  • Ssl
    Acronym for Secure Sockets Layer. SSL is a widely used protocol for securing the transmission of a message over the Internet.
  • Static Ip Address
    A Static IP Address is an IP Address whose numbers represent a permanent address on the Web. When the Internet was initially established, only a finite number of IP addresses were created. Because the ...
  • T1
    The T1 carrier is a commonly used digital Internet connection line in the US, Canada, and Japan.
  • Tape Backup
    In industry terms, tape backup is a process of copying electronic data from a storage device, such as a computer's hard drive, to a tape cartridge device. This security measure ensures that the data ...
  • Tcp
    Acronym for Transmission Control Protocol. TCP is the protocol used in conjunction with Internet Protocol (IP) to transmit information over the Internet in the form of units.
  • Teledactyl
    Teledactyl refers to voice recognition software that produces text from human speech.
  • Trojan Horse
    A Trojan Horse is a seemingly-innocent program that contains and conceals harmful code. When a Trojan Horse is opened, the malicious code performs its damage on the unsuspecting computer.
  • Turnkey
    A software or hardware product or service that is complete and ready to operate out of the box is said to be Turnkey. Like the ignition of an automobile, the user need only turn a key to start using ...
  • Usb
    Acronym for Universal Serial Bus. USB is known as a plug and play interface between a computer and a peripheral, such as a mouse, keyboard, digital camera, printer or scanner. Unlike devices connected ...
  • Var
    Acronym for Value Added Reseller. A VAR is a business that adds its own "value," or application, to an existing product, and resells the resulting enhanced product as a package.
  • Vpn
    Acronym for Virtual Private Network. A VPN is a way to provide remote access to an organization's network via the Internet. VPNs send data over the public Internet through secure "tunnels."
  • Wap
    Acronym for Wireless Application Protocol. WAP is a widely used set of protocols that standardize the manner in which wireless devices, such as cell phones and some PDAs, are able to access parts of ...
  • Warez
    Warez refers to software that has been cracked, or stripped of its copy protection, and made freely available for downloading. See Cracker.
  • Website
    A Web Site includes documents and/or pages with URLs beginning with the same hostname. For example, http://www.findlaw.com/news/ and http://www.findlaw.com/news/sports are pages on the same Web site, ...
  • Wysiwyg
    Acronym for What You See Is What You Get. Usually used in computer graphic/design circles, WYSIWYG, pronounced wiz-ee-wig, is a type of program that enables the programmer to see what the product ...
  • Xml
    Acronym for Extensible Markup Language. XML is an information format that can be understood by virtually all computer users, regardless of their particular platforms. XML is used to share information ...
  • Xss
    Cross-Site Scripting (XXS) refers to a kind of computer security vulnerability, most often found in web applications, whereby malicious web programmers are able to inject code into websites viewed by ...
  • Zipping
    Zipping is the act of compressing large files into a single file, called a zip file. Zip files take up less storage space so they easy to send via email. Not to be confused with Zip drive, an portable ...