9.1 Glossary of Terms
   CLOUD - Refers to distributed computing over a network that generally provides a shared pool of resources that is rapidly configurable and widely accessible. A cloud may be public, private, community, or a hybrid of these.
   COMPUTER INFORMATION - Data, software, files, and any other information stored on Village computers and systems.
   COMPUTER RESOURCE - A physical or virtual component of limited availability within a computer system. Village computer resources include devices, network equipment, communications equipment, and data as well as similar resources that are part of hosted systems or SaaS (Software as a Service) systems in use by the Village.
   ENCRYPTION - The process of turning plain text into cipher text by applying an algorithm that rearranges or changes its input into something unrecognizable.
   FIREWALL - A specifically configured system that serves as a secure gateway between an outside network (e.g., the Internet), and the organization's internal networks.
   HACKER - Slang for an individual intensely absorbed with and/or extremely knowledgeable about computer hardware and software. Also used to describe those who break into and corrupt computer systems. (Hacker is used here to describe those who break into and corrupt computer systems.)
   INSTANT MESSAGING - A method of linking people together electronically for the purpose of real-time communication.
   INTERNET - A group of networks connected via routers; a vast computer network linking smaller computer networks worldwide.
   INTRANET - A computer network with restricted access, as within a company.
   LOCAL AREA NETWORK - A set of connections between computers that provides the basis for electrical transmissions of information, generally within a small geographical location to serve a single organization.
   LOCK - To lock your workstation, use CTL-ALT-DEL.
   MALWARE - Software of malicious intent/impact such as viruses, worms, and spyware.
   MODEM - Short for modulator-demodulator. A hardware device that allows two computers to communicate over ordinary telephone lines.
   PHISHING - The criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication.
   PROFILE (AKA USER PROFILE or ROAMING PROFILE) - The profile is a special set of information that defines and maintains program and Windows settings specific to a user or, in some cases, a group of users. The word "Roaming" implies that the profile will be the same and accessible from multiple computers, i.e., it 'roams' with the user.
   RECORD - Information that is created, received, and maintained as evidence by an organization or person in the transaction of business or in the pursuance of legal obligations regardless of media. A record can also be thought of as information that holds operational, legal, fiscal, financial, vital, or historic value. Media can include books, documents, papers, letters, emails, faxes, maps, photographs, sound or video recordings, microfilm, magnetic tape, electronic media, images, or other information regardless of physical form or characteristics.
   REMOVABLE DEVICE - Device or media that is readable and/or writeable by the end user and can be moved from computer to computer without modifications to the computer. This includes flash memory devices such as thumb drives, cameras, MP3 players and PDAs; removable hard drives (including hard drive-based MP3 players); and any commercial music and software disks not provided by the Village of Romeoville.
   SENSITIVE INFORMATION - Information which, if made available to unauthorized persons, may adversely affect the Village of Romeoville, its programs, or participants served by its programs. Examples include but are not limited to personal identifiers and financial information.
   SERVER - A computer or device that administers network functions and applications.
   SPAM - Many copies of the same unsolicited message sent to newsgroups or via email intended to force the message on people who would not otherwise choose to receive it.
   TECHNOLOGY RESOURCES - All Village computers (desktop and portable computers, servers, networks, printers, software, storage media), email system, internet access and use, fax machines, telephones, cellular phones, pagers, two-way radios, personal handheld devices, Global Positioning System (GPS) devices, flash drives, modems, scanners, copy machines, other electronic and communication devices, and new or emerging technologies.
   TROJAN HORSE - A program that masquerades as something it is not, usually for the purpose of breaking into an account or exceeding commands with another user's privileges.
   VIRUS - A set of instructions that can reside in software and can be used to destroy other files or perform other tasks with another user's privileges.
   WORM - A program that propagates by replicating itself on each host in a network with the purpose of breaking into systems.
(Ord. 23-1853, passed 5-3-23)