Glossary

A

AC

Activity Center (for Tyler Technologies)

ADSF/AD

Active Directory Federation Services (AFDS) is a software component developed by Microsoft that can be installed on Windows Server operating systems to provide users with single sign-on access to systems and applications located across organizational boundaries. It uses a claims-based access control authorization model to maintain application security and implement federated identity.

AI Models

Software programs that use training data to autonomously make decisions or predictions. May or may not be generative.

ASA

The Adaptive Security Appliance (ASA) in Cisco ASA stands for Adaptive Security Appliance. In brief, Cisco ASA is a security device that combines firewall, antivirus, intrusion prevention, and virtual private network (VPN) capabilities. It provides proactive threat defense that stops attacks before they spread through the network.

ASMT

Assessment and Valuation (for Tax, CAMA, and AA)

AWS

Amazon Web Services, Inc. (AWS) is a subsidiary of Amazon, providing on-demand cloud computing platforms and APIs to individuals, companies, and governments on a metered, pay-as-you-go basis.

Acceptance Test Plan (ATP)

An Acceptance Test Plan is used by testers to determine if a software is acceptable for general release.

App

Short for "System Application"

Association of Minnesota Counties (AMC)

Association of Minnesota Counties https://mncounties.org/

Authentication

The process of verifying the identity of other attributes of an entity (user, process, or device).

Authorization

A process of determining, by evaluating applicable access control information, whether a subject is allowed to have the specified types of access to a particular resource.

Automation

The use of technology to perform tasks where little to no human input is needed. Generally used to replace or minimize manual tasks that are repeatable.

atENT

iasWorld is now referred to as Enterprise Assessment & Tax (atENT), part of the Property & Recording Portfolio. Tyler resources of already begin using EA as an acronym for Enterprise Assessment.

B

Blacklist

A list of entities that are blocked or denied privileges or access.

Blended Attack

A cyber attack that comprises multiple attack vectors and malware is known as a blended attack. Such attacks usually cause severe damage to targeted systems.

Bring Your Own Device (BYOD)

Being allowed to use ones personally owned device, rather than being required to use an officially provided device.

Bug

An unexpected and relatively small defect, fault, flaw, or imperfection in an information system or device.

Bureau of Criminal Apprehension (BCA)

Bureau of Criminal Apprehension (BCA)  https://dps.mn.gov/divisions/bca/

Business Continuity Plan (BCP)

An outlined document that explains how an organization will operate during an unplanned disruption.

C

CAMA

Computer Aided Mass Appraisal is a module in property records management used to manage all property data and every phase of the property appraisal process, including assessment administration, property maintenance, and valuation and appeals.

CE

Conversion Engineer (for Tyler Technologies)

CRM

A Customer Relationship Management (CRM) is a system used by businesses to manage all interactions with current and potential customers, allowing them to track customer data, streamline processes, and improve customer relationships across different departments like sales, marketing, and customer service, ultimately aiming to increase sales and customer retention

Chief Information Officer (CIO)

A job title commonly given to the most senior executive in an enterprise who works with information technology and computer systems, in order to support enterprise goals.

Chief Information Security Officer (CISO)

A senior-level executive within an organization responsible for establishing and maintaining the enterprise vision, strategy, and program to ensure information assets and technologies are adequately protected.

Chief Security Officer (CSO)

An organizations most senior executive accountable for the development and oversight of policies and programs intended for the mitigation and/or reduction of compliance, operational, strategic, financial and reputational security risk strategies relating to the protection of people, intellectual assets and tangible property.

Child & Teen CheckUps (CATCH3 or C&TC)

CATCH3 is a software system used by C&TC Coordinators and outreach staff to track enrolled children, document outreach, and provide follow-up activities to families and children. Reference website

Clickjacking

A technique used by an attacker to inject malicious code in clickable content in websites. Clickjacking is usually done to record the victims clicks on the intere=net or drop a malware infection on the system.

Closed Model

Generative AI resource whose underlying model is proprietary and not available to the general public.

Community Health Board (CHB)

The legally recognized governing body for local public health in Minnesota. It is the only government entity eligible for funding under the Local Public Health Act grant. CHBs have statutory responsibility under the Local Public Health Act, and work in partnership with the Minnesota Department of Health (MDH) to address the areas of public health responsibility.

https://www.health.state.mn.us/communities/practice/connect/findlph.html

Computer Aided Mass Appraisal (CAMA)

Software used by county assessors.

Computer Emergency Response Team

An expert group that handles computer security incidents. Alternative names for such groups include cyber emergency response team, computer emergency readiness team, and computer security incident response team.

Continuity of Operations Plan

A document that sets forth procedures for the continued performance of core capabilities and critical operations during any disruption of potential disruption.

Court Services Tracking System (CSTS)

A statewide software system owned by MnCCC and managed by the Corrections User Group. Representation on the Corrections Executive Committee from all three probation organizations - Department of Corrections (DOC), Minnesota Association of Community Correction Act Counties (MACCAC), and Minnesota Association of County Probation Officers (MACPO).

Critical Infrastructure

The systems and assets, whether physical or virtual, so vital to society that the incapacity or destruction of such may have a debilitating impact on the security, economy, public health or safety, environment, or any combination of these matters.

Cyber Security Incident Response Team (CSIRT)

A computer emergency response team is an expert group that handles computer security incidents. Alternative names for such groups include cyber emergency response team, computer emergency readiness team, and computer security incident response team.

D

Dailies

A term used in PH-Doc to track time, mileage, and expenses associated with a workday. There are four kinds of dailies: service to individuals, service to groups, service to clinics, and miscellaneous. Dailies are the source for service reporting, time studies, billing, and payroll and expense interfaces.

Data Mining

The process or techniques used to analyze large sets of existing information to discover previously unrevealed patterns or correlations.

Deepfakes

An image or recording that has been convincingly altered and manipulated to misrepresent someone as doing or saying something that was not actually done or said.

Department of Corrections (DOC)

Minnesota Department of Corrections (DOC or MDOC). https://mn.gov/doc/

Department of Homeland Security (DHS)

The United States Department of Homeland Security is the U.S. federal executive department responsible for public security.

Digital Forensics

The processes and specialized techniques for gathering, retaining, and analyzing system-related data (digital evidence) for investigative purposes.

Digital Signature

A value computed with a cryptographic process using a private key and then appended to a data object, thereby digitally signing the data.

Discretionary Access Control (DAC)

Discretionary access control is a means of restricting access to objects based on the identity of subjects and/or groups to which they belong.

Domain Name System (DNS)

The Domain Name System is a hierarchical and distributed naming system for computers, services, and other resources in the Internet or other Internet Protocol networks. It associates various information with domain names assigned to each of the associated entities.

Doodle, Doodle Poll

A quick, easy, and free software to survey everyones schedules and coordinate a date and time for a meeting. https://doodle.com

E

Electronic Health Record (EHR)

A real-time patient health record with access to evidence-based decision support tools that can be used to aid clinician decision-making. Reference: https://www.healthit.gov/faq/what-electronic-health-record-her

Electronic Signature

A mark in an electronic form associated with an electronic document, applied with the intent to sign the document.

Email Spoofing

How an attacker crafts the header of a malicious email so that user is tricked into viewing it. This technique is typically used in phishing attacks.

F

FTP

The File Transfer Protocol is a standard network protocol used for the transfer of computer files between a client and server on a computer network. FTP is built on a client-server model architecture using separate control and data connections between the client and the server

Family Home Visiting (FHV)

Family home visiting (FHV) is a voluntary, home-based service ideally delivered prenatally through the early years of a childs life. https://www.health.state.mn.us/communities/fhv/index.html

Finance & General Government (F&GG)

MnCCCs Finance & General Government which manages an array of contracts with software and services utilized by Auditors, Treasurers, and Finance Officers, including, but not limited to, Payroll, HR, Asset Management, IFS, Elections, and more.

FitGap

A fit gap analysis identifies the difference between the known requirements and the proposed or current solution (for Tax, CAMA, and AA).

Follow-Along Program (FAP)

The FAP application is provided by the Minnesota Department of Health (MDH) to monitor infants and toddlers using ASQ forms and letters.

G

General Data Protection Regulation (GDPR)

General Data Protection Regulation allows users to have access to their information and have a say in how it is stored and used.

Geographic Information System (GIS)

A Geographic Information System (GIS) is designed to capture, store, manipulate, analyze, manage, and present spatial or geographic data.

Global Public Inclusive Infrastructure (GPII)

The purpose of the Global Public Inclusive Infrastructure (GPII) is to ensure that everyone who faces accessibility barriers due to disability, literacy, digital literacy, or aging, regardless of economic resources, can access and use the Internet and all its information, communities, and services for education, employment, daily living, civic participation, health, and safety. Visit: https://gpii.net/

Governance Risk and Compliance (GRC)

Governance, risk management and compliance is the term covering an organizations approach across these three practices: governance, risk management, and compliance.

Guidelines for Vendor Contracts

MnCCCs document to provide information to our business partners and members as to what language is to be included in contracts. https://mnccc.gov/resource-center/

H

HT

Hearing Tracking (see also I&AT/IAT) (for Tax, CAMA, and AA)

Hallucinations

A phenomenon wherein a large language model (LLM) perceives patterns or objects that are nonexistent or imperceptible to human observers, creating outputs that are nonsensical or altogether inaccurate.

Health Information Exchange (HIE)

The electronic transmission of health care-related data among facilities, health information organizations (HIO), and government agencies according to national standards.

Health Information Organization (HIO)

An organization that provides all electronic capabilities for the transmission of clinical transactions necessary for—meaningful use—of electronic health records in accordance with nationally recognized standards.

Health Information Technology for Economic and Clinical Health (HITECH)

Addresses changes to privacy and security, including breach notifications, personal access requirements, and the application of the HIPAA security rule to Business Associates. It is part of the American Recovery and Reinvestment Act of 2009.

Health Insurance Portability and Accountability Act (HIPAA)

The Standards for Privacy of Individually Identifiable Health Information (Privacy Rule) establishes, for the first time, a set of national standards for the protection of certain health information. The U.S. Department of Health and Human Services (HHS) issued the Privacy Rule to implement the requirements of the Health Insurance Portability and Accountability Act of 1996 (HIPAA). The Privacy Rule standards address the use and disclosure of individuals' health information—called "protected health information" (PHI) by organizations subject to the Privacy Rule ("covered entities")—as well as standards for individuals privacy rights to understand and control how their health information is used. Within HHS, the Office for Civil Rights (OCR) has responsibility for implementing and enforcing the Privacy Rule with respect to voluntary compliance activities and civil money penalties. http://www.hhs.gov/ocr/privacy/hipaa/understanding/summary/index.html

Health Interoperability Service Provider (HISP)

An Internet vendor that provides security and transport services for directed health information exchange-based on the Direct protocol. An HISP provides the exchange needs for the source and destination for the delivery and receipt of electronic health information, but without any governance responsibilities.

Health Level 7 (HL7)

An organization and a set of standards dedicated to developing standards for the exchange of electronic health information.

Hypertext Transfer Protocol (HTTP)

The foundation of the World Wide Web, and is used to load webpages using hypertext links. HTTP is an application layer protocol designed to transfer information between networked devices and runs on top of other layers of the network protocol stack.

Hypertext Transfer Protocol Secure (HTTPS)

An extension of the Hypertext Transfer Protocol. It uses encryption for secure communication over a computer network, and is widely used on the Internet. In HTTPS, the communication protocol is encrypted using Transport Layer Security or, formerly, Secure Sockets Layer.

I

I&AT/IAT

Inquiry and Appeals Tracking refers to a system used by organizations to manage and monitor the status of customer inquiries and appeals that have been submitted, allowing them to track the progress of each issue from the initial contact through to resolution, including any appeals filed against a decision made on the inquiry.

IA

Implementation Analyst (for Tyler Technologies)

IC

Implementation Consultant (for Tyler Technologies)

Incident

An occurrence that actually or potentially results in adverse consequences to an information system or the information that the system process, stores, or transmits and that may require a response actual to mitigate the consequences.

Information Services Support Group (ISSG)

MnCCCs IT group that shares knowledge, assists one another with software and hardware challenges, and works together to find cooperative solutions.

Information Systems (IS)

An information system is a formal, sociotechnical, organizational system designed to collect, process, store, and distribute information. From a sociotechnical perspective, information systems are composed by four components: task, people, structure, and technology.

Information Technology Infrastructure Library (ITIL)

The Information Technology Infrastructure Library is a set of practices and a framework for IT activities such as IT service management and IT asset management that focus on aligning IT services with the needs of the business.

Int/Pen

Interest and penalty (for Tax, CAMA, and AA)

Integrated Financial System (IFS)

The Integrated Financial System (IFS) is owned by MnCCC and represents 78 counties and several agencies. The Joint IFS Committee (JIC) manages IFS with representation from Human/Social Services and Auditor/Treasurer offices from the participating counties.

International Classification of Diseases (ICD)

International Classification of Diseases (ICD) Codes are used to enter diagnoses codes on an individual client chart.

Internet Service Provider (ISP)

An Internet service provider is an organization that provides services for accessing, using, managing, or participating in the Internet.

iasWorld

Enterprise Assessment and Tax (for Tyler Technologies)

J

JIRA

JIRA is a proprietary issue tracking product developed by Atlassian that allows bug tracking and agile project management. The product name is a truncation of Gojira, the Japanese word for Godzilla, which is a reference to a competitor, Bugzilla. For Tyler Technologies, it is the tool that the Product Development group uses to manage their back log of enhancement and defect tickets across multiple products and releases. It is also the task management tool used by the DBA services team to manage/schedule all of their work.

Joint IFS Committee (JIC)

The Joint IFS Committee (JIC) manages IFS with representation from Human/Social Services and Auditor/Treasurer offices from the participating counties.

Juvenile/Adult Information Management System (JAIMS)

Juvenile/Adult Information Management System (JAIMS) used to be a stand-alone program for managing detention centers. Now, this functionality is built into CSTS and managed by the Facility Admissions Committee.

K

Keylogger

Software or hardware that tracks keystrokes and keyboard events, usually surreptitiously/secretly, to monitor actions by the user of an information system.

Knowledge, Behavior, and Status (KBS)

Manages ratings of client knowledge (K), behavior (B), and status (S) for any or all of the Omaha System Problems on the client's Care Plan.

L

LOV

List of Values (for Tax, CAMA, and AA)

LUC

Land Use Code (for Tax, CAMA, and AA)

Large Language Model (LLM)

A category of models that are pre-trained on vast amounts of data, making them capable of understanding and generating natural language and other types of content to performs a wide variety of tasks. Such large-scale models can ingest data, often from the internet, as well as other data sets such as Reddit, X (formerly Twitter).

Local Area Network (LAN)

A local area network is a computer network that interconnects computers within a limited area.

Logical Observation Identifiers Names and Codes (LOINC)

A universal coding system for the electronic exchange of laboratory test results and other observations. Under Clinical Document Architecture, LOINC codes are used for defining the type of documents shared, the content of those documents (templates), and some of the data elements within that content (e.g., smoking status). Surveys and questionnaires are typically defined using LOINC codes.

M

MH

Mobile Home (for Tax, CAMA, and AA)

MVP

The Marshall & Swift Valuation (MVP) Service is a complete, authoritative appraisal guide for developing replacement costs, depreciated values, and insurable values of buildings and other improvements.

Machine Learning (ML)

A subfield of AI; focuses on the use of data and algorithms to create models that enable machines to performs like humans. Machine learning often powers many of the digital goods and services we use every day. Machine learning is widely used today for such things as recommending products to consumers based on past purchases and translating text from one language to another.

Malware

Software that compromises the operation of a system by performing an unauthorized function or process.

Maternal, Infant, and Early Childhood Home Visiting Program (MIECHV)

The Maternal, Infant, and Early Childhood Home Visiting Program gives pregnant women and families, particularly those considered at-risk, necessary resources and skills to raise children who are physically, socially, and emotionally healthy and ready to learn. https://mchb.hrsa.gov/maternal-child-health-initiatives/home-visiting-overview

Meaningful Use (MU)

A Medicare and Medicaid program that awards incentives for using certified electronic health records (EHRs) to improve patient care. MU is implemented in a phased approach over a series of three stages. The meaningful use rules define the minimum requirements that providers must meet through their use of certified EHR technology in order to qualify for incentive payments under the HITECH Act. Public Health is not a recipient of the MU incentives. https://www.healthit.gov/topic/meaningful-use-and-macra/meaningful-use

Media Access Control (MAC)

The MAC is the layer that controls the hardware responsible for interaction with the wired or wireless transmission medium.

Metro Alliance for Healthy Families (MAHF)

The Metro Alliance for Healthy Families works hand-in-hand with families and community agencies in the Twin Cities region of Minnesota to build a secure foundation for babies to grow with their families. https://www.metroallianceforhealthyfamilies.org/Pages/Public/MAHFHomeForm.aspx

Minnesota Association of Assessing Officers (MAAO)

Provides education and information to promote excellence in property appraisal and assessment administration through professional development with the highest ethical standards. https://www.mnmaao.org/

Minnesota Association of Community Correction Act Counties (MACCAC)

Minnesota Association of Community Correction Act Counties (MACCAC). http://www.maccac.org/

Minnesota Association of County Auditors, Treasurers, and Finance Officers (MACATFO)

Minnesota Association of County Auditors Treasurers and Finance Officers, a committee of MACO. https://www.mncounty.org/page/macatfo_committees

Minnesota Association of County Officers (MACo)

Minnesota Association of County Officers. https://www.mncounty.org/

Minnesota Association of County Probation Officers (MACPO)

Minnesota Association of County Probation Officers (MACPO). https://www.macpo.net/

Minnesota Counties Computer Cooperative (MnCCC)

Also called "M-Triple C", MnCCC provides an opportunity, through joint powers agreements with counties (and cities and agencies), to collaborate on software solutions. MnCCC has software user groups that work together to provide Minnesota-specific software for use in county departments.

Minnesota Counties Intergovernmental Trust (MCIT)

Minnesota Counties Intergovernmental Trust is a joint powers entity made up of Minnesota counties and associated public entities that pool resources to provide property, casualty and workers' compensation coverage to members. MCIT also offers risk management and loss control services. https://www.mcit.org

Minnesota County Attorney Association (MCAA)

Minnesota County Attorney Association. https://mcaa-mn.org/

Minnesota County Attorney Prosecutor Software (MCAPS)

The Minnesota County Attorney Prosecutor Software (MCAPS) is owned by MnCCC and managed by the County Attorney User Group under MnCCC.

Minnesota County IT Leadership Association (MNCITLA)

Minnesota County IT Leadership Association. https://www.mncitla.us/

Minnesota Department of Health (MDH)

Minnesota Department of Health (MDH). http://www.health.state.mn.us/

Minnesota Department of Human Services (MDHS)

Minnesota Department of Human Services (MDHS). https://mn.gov/dhs/

Minnesota Department of Revenue (DOR)

Minnesota Department of Revenue (DOR or MDOR). http://www.revenue.state.mn.us/

Minnesota IT Services (MN.IT)

State of Minnesota IT Services. (MN.IT is pronounced like, "Minute") https://mn.gov/mnit/get-help/

Minnesota Immunization Information Connection (MIIC)

The Minnesota Immunization Information Connection (MIIC) is a confidential system that stores electronic immunization records. MIIC makes keeping track of vaccinations easier and helps ensure Minnesotans get the right vaccines at the right time. https://www.health.state.mn.us/miic

Minnesota Visiting Nurses Association (MVNA)

MVNA is the community connections care division for Hennepin Healthcare. We provide home care in the community through safety net programs. Our programs provide care from prenatal and birth, to chronic disease management, to end-of-life and bereavement. MVNA focuses on prevention, hospital follow-up, transitional care, supportive services, public health, and community health initiatives. https://www.hennepinhealthcare.org/patient-care/mvna/

Multi Factor Authentication (MFA)

Multi-factor authentication is an electronic authentication method in which a user is granted access to a website or application only after successfully presenting two or more pieces of evidence to an authentication mechanism.

N

NBHD

Neighborhood codes or NDBH codes (for Tax, CAMA, and AA)

NIST

National Institute of Standards and Technology. The 800 series (NIST 800) covers cyber and information security.

National Association of County Officers (NACO)

National Association of County Officers (NACO). https://www.naco.org/

National Institute for Standards and Technology (NIST)

The National Institute of Standards and Technology is an agency of the United States Department of Commerce whose mission is to promote American innovation and industrial competitiveness.

Nationwide Health Information Network (NwHIN)

A set of standards, services and policies that enable the secure exchange of health information over the internet. The NwHIN provides a foundation for the exchange of health information across diverse entities, within communities and across the county, helping to achieve the goals of the HITECH Act. https://www.healthit.gov/sites/default/files/what-Is-the-nhin--2.pdf

Natural Language Processing (NLP)

The process of making human communication, such as speech and text, understood by computers.

O

OBY

Outbuilding and Yard Items, as it pertains to the market value which is a combination of the land (for Tax, CAMA, and AA).

Omaha System

A research-based and comprehensive practice for documentation and information management standardized taxonomy or classification system designed to document client care from admission to discharge. The hierarchy and terms include an assessment component (Problem Classification Scheme), an intervention component (Intervention Scheme), and an outcomes component (Problem Rating Scale for Outcomes). www.omahasystem.org

Open Model

Generative AI tool whose underlying model is publicly available, reviewable, and customizable for a particular use case or function.

Operating System (OS)

An operating system is system software that manages computer hardware and software resources, and provides common services for computer programs.

Operational Security (OPSEC)

Operations security (OPSEC) is a process that identifies critical information to determine whether friendly actions can be observed by enemy intelligence, determines if information obtained by adversaries could be interpreted to be useful to them, and then executes selected measures that eliminate or reduce adversary exploitation of friendly critical information.

Outcome and Assessment Information Set (OASIS)

Forms developed by the Centers for Medicare and Medicaid Services (CMS).

P

PA

Property Access Software (for Tyler Technologies)

PH-Doc

PH-Doc is a software application for local public health agencies, designed to manage the practice and maintain the electronic health record of those served. PH-Doc designed and owned by local public health agencies of the Minnesota Counties Computer Cooperative (MnCCC).

PP

Personal Property (for Tax, CAMA, and AA)

PRC

A property record card is typically a one sided sheet of paper that is printed from this CAMA system. The card contains property identification, construction details, and other elements that are used to describe and value the property.

PRM

Property Records Management Module is a tool for locating and viewing properties (for Tyler Technologies)

PROD

Production Site (for Tax, CAMA, and AA)

Penetration Testing (PEN Test)

An evaluation methodology where assessors actively probe for vulnerabilities and attempt to circumvent the security features of a network and/or information system.

Personal Identification Number (PIN)

A personal identification number, or sometimes redundantly a PIN number or PIN code, is a numeric passcode used in the process of authenticating a user accessing a system.

Pharming

Pharming is when a user is redirected to a fake website without their consent or knowledge. In most cases, the fake website looks exactly similar to the actual website that the user intended to visit.

Phishing

A digital form of social engineering to deceive individuals into providing sensitive information.

Proj Mod

Project Modification is a document used to identify additional functionality that might be needed for particular customer, which is then provided to the Development Team.

Prompts

Text commands or queries that you type or say to a Generative AI tool to provide context and guidance to machine learning models.

Property Information User Group (PIUG)

MnCCCs Property Information User Group (PIUG) manages contracts that help share Geographic Information System (GIS) and Computer Aided Mass Appraisal (CAMA) data both internally within the county and externally with taxpayers and business partners.

Property Record Information System of Minnesota (PRISM)

Property Record Information System of Minnesota. https://www.revenue.state.mn.us/prism-property-record-information-system-minnesota

Q

QRG

Quick Reference Guide (for Tyler Technologies)

R

RCN

Replacement Cost New is the cost to replace an item or property with a similar new item that has the same quality and purpose (for Tax, CAMA, and AA).

RCNLD

Re-Cost New Less Depreciation is a methodology used to calculate the value of a property by subtracting depreciation from the replacement cost of a property (for Tax, CAMA, and AA).

Ransomware

Ransomware is a malicious program that performs the following malicious activities after infecting a computer: 1) Makes the system non-functional unless the victim agrees to pay a ransom. 2) Encrypts the computers data and demands a ransom to release it to the victim.

Recovery

The activities after an incident or event to restore essential services and operations in the short and medium term and fully restore all capabilities in the longer term.

Remote Access Services (RAS)

A remote access service is any combination of hardware and software to enable the remote access tools or information that typically reside on a network of IT devices. A remote access service connects a client to a host computer, known as a remote access server.

Remote Procedure Call (RPC)

Remote Procedure Call (RPC) is a protocol that one program can use to request a service from a program located in another computer on a network without having to understand the networks details. A procedure call is also sometimes known as a "function call" or a "subroutine call."

Request for Information (RFI)

Request for Information (RFI) is a form method MnCCC and its members use to collect information about the market to determine whether or not to proceed with an RFP for software, hardware, service, or other purchase.

Request for Proposal (RFP)

Request for Proposal (RFP) is a formal method MnCCC and its members use to evaluate the market to make the best decision possible before selecting a software, hardware, service, or other purchase.

Res

Residential (for Tax, CAMA, and AA)

Response

The activities that address the short-term, direct effects of an incident and may also support short-term recovery.

S

SB

A Silver Bullet is a process created as a quick and easy quality review process (for Tax, CAMA, and AA).

SFLA

Square Foot Living Area (heated) (for Tax, CAMA, and AA)

SIEM

System Incident and Event Management. Tools and processes that collect data generated from devices and services to perform real-time and historical correlated analysis to detect security.

SQL Injection

An SQL injection is performed by an attacker to exploit a poorly-designed application to produce unwanted database query results. For instance, an attacker can insert a malicious code into a web form that is used for user authentication. Via this code, the attacker can send his request to the database and perform illicit activities.

SQL Server Reporting Services (SRSS)

SQL Server Reporting Services is a solution that customers deploy on their own premises for creating, publishing, and managing reports on SQL databases.

SWIFT

Statewide Integrated Financial Tool

Service Level Agreement (SLA)

A service-level agreement is an agreement between a service provider and a customer. Particular aspects of the service—quality, availability, responsibilities—are agreed between the service provider and the service user.

Single Factor Authentication (SFA)

Single-factor authentication is the simplest form of authentication method. With SFA, a person matches one credential to verify themselves online.

Single sign-on (SSO)

Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials (e.g., name and password) to access multiple applications. ... On the back end, SSO is helpful for logging user activities as well as monitoring user accounts. Jira ticket needs to be open with DBA once you’ve gathered all information from Clayton. From the client, we need a service account that can read their LDAP DB (user name/password) and the LDAP URL. After that, you need to create a ticket for DBA team for them to put hooks in place.

Small Language Model (SLM)

Similar to Large Language Models, except that they rely on a smaller set of data. Unlike LLMs trained on vast amounts of internet data, the small models use curated, high-quality training data.

Smishing

Smishing is a type of phishing attack where targets are sent fake or malicious SMSs. These SMSs are designed to steal personal information from targets, or trick them into visiting a phishing website.

Social Determinants of Health (SDOH)

The social determinants of health are the conditions in which people are born, grow, live, work, and age. These circumstances are shaped by the distribution of money, power, and resources at global, national, and local levels. The social determinants of health are mostly responsible for health inequities - the unfair and avoidable differences in health status seen within and between countries. https://www.who.int/social_determinants/sdh_definition/en/

Social Engineer Toolkit (SET)

It is an open-source Python-driven tool aimed at penetration testing around Social-Engineering.

Social Services Information System (SSIS)

An application provided by the Minnesota Department of Human Services (MDHS) to manage clients seen by the county social services departments. Counties are required to use SSIS to track services provided to children.

Software Development Life Cycle (SDLC)

The SDLC is a process for planning, creating, testing, and deploying an information system.

Software as a Service (SAAS)

Software as a service is a software licensing and delivery model in which software is licensed on a subscription basis and is centrally hosted. SaaS is also known as on-demand software, web-based software, or web-hosted software.

Spam

Spam is defined as unwanted or unexpected emails sent in bulk. Mostly, spam is used to distribute malware.

Spearphishing

An email or electronic communications scam targeted towards a specific individual, organization, or business.

Spoofing

Faking the sending address of a transmission to gain illegal or unauthorized entry into a secure system.

Stage

Staging Site (for Tax, CAMA, and AA)

Statewide Supervision System (SSS)

Statewide Supervision System (SSS). https://mn.gov/doc/staff-partners/s3/

Strategic Technologies, Inc. (STI)

Strategic Technologies Inc. https://www.sti-software.com/default.aspx

Structured Data

Typically categorized as quantitative data, it is highly organized and easily decipherable by machine learning algorithms. Structured data is most often in a database or spreadsheet and is generally very easily used by machine learning, however, can be limited in its flexibility or applicability.

Structured Query Language (SQL)

SQL (pronounced "ess-que-el") stands for Structured Query Language. SQL is used to communicate with a database. According to the American National Standards Institute (ANSI), it is the standard language for relational database management systems. SQL was developed at IBM and was initially called “Structured English Query Language” (SEQUEL) and pronounced “sequel”.

Systematized Nomenclature of Medicine (SNOMED)

A systematic, computer-processable collection of medical terms for both human and veterinary medicine which provides codes, terms, synonyms, and definitions that cover anatomy, diseases, findings, procedures, microorganisms, substances, etc. It allows a consistent way to index, store, retrieve, and aggregate medical data across specialties and sites of care.

T

TB&C

Tax Billing and Collections is a Tyler iasWorld offering for Tax Collection Departments

TBLE

Related to the iasWorld database schema - Tables contains tables and indexes for configuration and rate tables

TCM

Tyler Content Managerâ„¢ allows you to streamline the flow of digital information throughout your organization, and easily transform valuable paper forms and documents into electronic images.

TCa

Tyler Cashiering

TEST

Test Site (for Tax, CAMA, and AA)

TID

Tax Incremental District - The TIF process allows a municipality to pay for public improvements and other eligible costs within a designated area - TID - using the future taxes collected on the TIDs increased property value to repay the cost of the improvements.

TID-W

Tylers cloud-based authentication platform powered by Okta. Integrates with common identity providers such Azure AD, ADFS, Google identity, Okta Agent

TIF

Tax Increment Financing are intended to result in a redirection of part of the property tax (and sales tax) in an area to finance public improvements in the area. They are intended to be used in a blighted area, a conservation area, or an economic development area where such improvements are needed to make it attractive for development.

TWF

Tyler Workflow (TWF) designer is the tool/interface that you use to create, review and edit workflows. To my understanding, TWF is a separate product that iasWorld integrates with to support workflow functionality.

TaxLink

Minnesota TaxLink is a hosted solution that helps counties share tax court case information.

Truth in Taxation (TNT)

Truth in Taxation (TnT) is a process first enacted by the legislature in 1988 to enhance public participation in the Minnesota property tax system. County auditors generate parcel-specific notices of proposed taxes for all parcels of property based on the proposed levies. https://www.revenue.state.mn.us/truth-taxation

Two Factor Authentication (2FA)

Two-factor authentication (2FA) is a specific type of multi-factor authentication (MFA) that strengthens access security by requiring two methods to verify your identity.

U

UAT

User Acceptance Testing

UDF

User-Defined Fields

UI

User Interface (UI) designer is the tool/interface that you use to create, review and edit workflows. Un my understanding, UI is a separate product that iasWorld integrates with to support interface functionality.

URL Spoofing

A technique used by hackers to create a fake URL that impersonates the URL of a secure or legitimate website. A spoofed URL looks exactly like the one of the original website, but redirects users to a phishing or malicious site.

Use Case

A term that explains how a solution meets a business need. Example: Use of AI in identifying forest fires is a use-case.

Use Case

Use Case

V

Virtual Local Area Network (VLAN)

A virtual local area network is any broadcast domain that is partitioned and isolated in a computer network at the data link layer. In this context, virtual refers to a physical object recreated and altered by additional logic, within the local area network.

Virtual Private Network (VPN)

A virtual private network is a mechanism for creating a secure connection between a computing device and a computer network, or between two networks, using an insecure communication medium such as the public Internet.

Virus

A computer program that can replicate itself, infect a computer without permission or knowledge of the user, and then spread or propagate to another computer.

Vishing

Voice phishing where a hacker uses voice calls to trick users into divulging personal or financial information.

Voice Over Internet Protocol (VOIP)

VOIP is a method and group of technologies for voice calls for the delivery of voice communication sessions over Internet Protocol networks, such as the Internet.

W

WF

Tyler Workflow (WF) designer is the tool/interface that you use to create, review and edit workflows. Wo my understanding, WF is a separate product that iasWorld integrates with to support workflow functionality.

Watermarks

The process of embedding a recognizable, unique signal into the output of an AI model, such as text, audio, video, or an image, to identify that content as generated by an AI model.

Website Spoofing

Website spoofing refers to creating a fake site that looks exactly like a trusted and popular website, in order to collect personal or financial information from users. Spoofed websites are created using legitimate logos, colors, designs, etc., to make them look realistic.

Whitelist

A list of entities that are considered trustworthy and are granted access to privileges.

Wi-Fi Protected Access (WPA)

Wi-Fi Protected Access (WPA) is a security standard for computing devices with wireless internet connections.

Wide Area Network (WAN)

A wide area network is a telecommunications network that extends over a large geographic area. Wide area networks are often established with leased telecommunication circuits.

Wireless Local Area Network (WLAN)

A wireless LAN is a wireless computer network that links two or more devices using wireless communication to form a local area network within a limited area.