Resources
Learn key tech terms with definitions and why they matter. Streamline AI's glossary is an essential resource for technology and SaaS lawyers and in-house counsel teams working with finance, marketing, sales, and other cross-functional business teams.
Please try different keywords.
API stands for application programming interface, which is a set of rules and protocols that allow different software applications to communicate with each other. APIs allow two applications to talk to each other โ share data, and extra data with each other
a
Learn More โA contract governing the conditions under which a third party can use a company's API.
a
Learn More โThe revenue that a company expects to earn annually from subscriptions.
a
Learn More โAn Acceptable Use Policy (AUP) is a set of rules and guidelines that define how an organization's network, computer systems, and digital information can be used. It aims to ensure that users understand and adhere to proper conduct to maintain the integrity, confidentiality, and availability of the system.
a
Learn More โAgile development is a term primarily used in software development, referring to an iterative and flexible approach that emphasizes collaboration, customer feedback, and rapid response to changes.
a
Learn More โThe process of removing personally identifiable information from data sets, so that the people whom the data describe remain anonymous.
a
Learn More โThe simulation of human intelligence processes by machines, especially computer systems.
a
Learn More โThe process where a near-final product or service is evaluated by potential users in the real world.
b
Learn More โExtremely large data sets that may be analyzed computically to reveal patterns, trends, and associations.
b
Learn More โA system in which a record of transactions made in bitcoin or another cryptocurrency are maintained across several computers that are linked in a peer-to-peer network.
b
Learn More โA legal requirement in many jurisdictions to inform affected individuals and authorities when a data breach occurs.
b
Learn More โA flaw or error in a computer program or system that produces an incorrect or unexpected result.
b
Learn More โA deal offered by many websites, organizations and software developers by which individuals can receive recognition and compensation for reporting bugs, especially those pertaining to security exploits and vulnerabilities.
b
Learn More โThe cost to acquire a new customer, including marketing and sales expenses. To calculate CAC, sum all the expenses associated with converting prospects into customers (such as marketing and sales personnel costs) and divide that sum by the total number of customers gained. For instance, if Streamline AI spends $100,000 on marketing and acquires 50 new clients in a year, the CAC is $2,000. A lower CAC is preferable for a business, as it indicates a reduced cost for each new customer added.
c
Learn More โThe California Consumer Privacy Act (CCPA) is a state statute in California, United States, that went into effect on January 1, 2020. It aims to enhance privacy rights and consumer protection for residents of California. CCPA provides California residents with the right to know what personal data is being collected about them, whether their personal data is being sold or disclosed, and to whom. They also have the right to access, delete, or opt-out of the sale of their personal information.
c
Learn More โA cancellation policy is a set of terms and conditions that outline the process and requirements for terminating a subscription or service, including any potential penalties or refunds.
c
Learn More โCash flow refers to the movement of money into and out of a business, representing the operating activities, investing activities, and financing activities during a specific period. Cash flow provides a clear picture of a company's ability to pay its short-term liabilities, such as bills, wages, and loans.
c
Learn More โChurn rate, also known as attrition rate, measures the percentage of customers a company loses within a specified time frame. At SaaS software companies, it signifies the number of subscribers who either cancel or opt not to renew their subscriptions. A higher churn rate means that more customers are ending their relationship with the company, whereas a lower churn rate indicates better customer retention.The churn rate is computed using the formula: (Lost Customers รท Total Customers at Start) x 100. For instance, if a business begins the quarter with 100 customers and loses 10 by the end, the churn rate would be calculated as (10 รท 100) x 100, resulting in a 10% quarterly churn rate.
c
Learn More โThe delivery of computing services over the internet, including servers, storage, databases, networking, software, analytics, and intelligence.
c
Learn More โA service model in which data is maintained, managed, backed up remotely and made available to users over the internet, rather than on physical hard drives or local storage devices.
c
Learn More โAn agreement that restricts both parties from sharing proprietary or confidential information.
c
Learn More โA declaration to your users on what cookies are active on your website, what user data they track, for what purpose, and where in the world this data is sent.
c
Learn More โThe total revenue a company expects to earn from a customer throughout their entire relationship.
c
Learn More โCyber insurance is a specialized insurance product designed to mitigate financial losses from cyber-related incidents such as data breaches, network damage, and business interruptions.
c
Learn More โA data backup is the process of creating copies of data or files to ensure that they can be recovered in case of a loss, corruption, hardware failure, or other unforeseen disasters.
d
Learn More โA data breach is an incident where unauthorized individuals access, steal, or disclose sensitive, protected, or confidential data. Such breaches can expose personal information like credit card numbers, social security details, or intellectual property, leading to identity theft or financial fraud.
d
Learn More โA data center is a facility that houses computer systems, such as servers, storage devices, and network equipment, used to store, process, and manage large amounts of data. They are essential for running various online services like websites, cloud computing, and data storage.
d
Learn More โA data controller is a person or organization that determines the purposes and means of processing personal data, making decisions about what data is collected and how it's used.
d
Learn More โData mining is the process of discovering patterns, correlations, and insights within large datasets through the use of statistical methods and machine learning algorithms. It helps in making informed decisions by extracting valuable information and predictive insights from raw data.
d
Learn More โA contract between a data controller and a data processor that sets how data is to be handled, processed, and protected.
d
Learn More โA data processor is an entity that processes personal data on behalf of a data controller, following the controller's instructions. The data controller determines the purposes and means of processing personal data, while the data processor carries out the actual processing activities.
d
Learn More โA data retention policy is a set of guidelines that outlines how long an organization will retain certain types of data and when that data should be deleted or archived.
d
Learn More โThe concept that data is subject to the laws of the country it is collected in.
d
Learn More โDeferred revenue refers to payments received by a company for goods or services that have not yet been delivered or performed.
d
Learn More โA United States copyright law enacted in 1998 that addresses the rights and obligations of copyright owners and internet service providers (ISPs) in the digital age.The DMCA criminalizes the production and dissemination of technology, devices, or services intended to circumvent measures that control access to copyrighted works. One of the key aspects of the DMCA is its "safe harbor" provision for ISPs. It protects them from liability for copyright infringement by their users, provided they comply with specific requirements, such as promptly removing infringing content when notified by the copyright owner.
d
Learn More โA disaster recovery plan is a documented, structured approach that outlines the processes to follow when a technology-related disaster occurs, such as a cyberattack, hardware failure, or natural catastrophe. The plan includes details on restoring vital technology operations, data recovery, emergency response procedures, and communication channels.
d
Learn More โEBITDA (Earnings Before Interest, Taxes, Depreciation, and Amortization) is a measure of a company's operating performance. EBITDA focuses on the earnings derived solely from a company's core business operations, ignoring the effects of financing costs (interest), tax environment (taxes), and non-cash expenses (depreciation and amortization). This provides a clearer picture of a company's ability to generate cash from its operations.
e
Learn More โA distributed computing paradigm that brings computation and data storage closer to the location where it is needed.
e
Learn More โA contract between the licensor and purchaser, establishing the purchaser's right to use the software. It defines the terms and conditions under which the software can be used and outlines the rights and responsibilities of both parties.
e
Learn More โEnd-to-end encryption is a method of secure communication that encrypts data at the sending end and decrypts it at the receiving end, ensuring that only the intended recipient can read it. Even if the data is intercepted during transmission, it remains secure and unreadable without the corresponding decryption keys. A well-known example of end-to-end encryption is the messaging app WhatsApp, where messages are encrypted on the sender's device and only decrypted on the recipient's device. This ensures that even WhatsApp itself cannot read the messages exchanged between users.
e
Learn More โA contract provision that relieves the parties from performing their contractual obligations when certain circumstances beyond their control arise that make it prohibitive for a party to carry out their obligations.
f
Learn More โA pricing strategy where an entry level aspect of a product or service is provided free of charge, but a fee is charged for advanced (or full) features.
f
Learn More โA legal framework that sets guidelines for the collection and processing of personal data of citizens and residents within the EU, regardless of where the processing happens.
g
Learn More โThe difference between revenue and the cost of goods sold, divided by revenue.
g
Learn More โA work or invention that is the result of creativity, such as a manuscript, software code, or a design, to which one has rights and for which one may apply for certain legal protections against unauthorized reproduction, such as patent, copyright, and trademark.
i
Learn More โA set of instructions to help IT staff detect, respond to, and recover from data security incidents.
i
Learn More โA contractual agreement in which one party agrees to compensate the other for any harm, liability, or loss.
i
Learn More โSoftware integrations refer to the process of linking different computing systems and software applications physically or functionally, to work together within a coordinated environment. They allow for seamless sharing and flow of data between various tools and platforms, enabling businesses to achieve greater efficiency and automation in their processes. By connecting disparate systems, software integrations help in creating a more unified and holistic view of business operations, fostering better decision-making and collaboration.
i
Learn More โPhysical devices (i.e. home appliances, security systems) that are embedded with sensors, software, and other technologies for the purpose of connecting and exchanging data with other devices and systems over the internet.
i
Learn More โAn old technology, system, or application that continues to be used, typically because it still functions for the users' needs.
l
Learn More โA contract clause that serves to limit the amount and types of compensation one party can recover from the other party in certain circumstances.
l
Learn More โA provision in a contract specifying a predetermined amount of money that must be paid as damages for breach of contract.
l
Learn More โA subset of artificial intelligence (AI) that uses data models and algorithms to imitate the way that humans learn, gradually improving its accuracy. Machine learning models use data to detect patterns and adjust their operations accordingly.
m
Learn More โA security system that requires more than one method of authentication from independent categories of credentials to verify the user's identity for a login or other transaction.
m
Learn More โA principle in software architecture where a single instance of the software runs on a server, serving multiple customers (each customer is called a tenant).
m
Learn More โA contract between an employee and an employer, where the employee agrees not to enter into competition with the employer during or after employment.
n
Learn More โA legal contract between at least two parties that describes confidential material, knowledge, or information that the parties wish to share with one another for certain purposes, but wish to restrict from being shared with outside parties without authorization.
n
Learn More โSoftware that is installed and runs on computers on the premises of the person or organization using the software, rather than at a remote facility.
o
Learn More โSoftware for which the original source code is made freely available and may be redistributed and modified according to the license terms.
o
Learn More โA type of cloud computing service providing a platform for customers to develop, run, and manage applications without the complexity of building and maintaining the infrastructure.
p
Learn More โSoftware patches are important because they fix bugs, vulnerabilities, and other issues within existing software applications.
p
Learn More โA method of trying to gather personal information using deceptive e-mails and websites.
p
Learn More โA statement or legal document that discloses some or all of the ways a company or entity gathers, uses, discloses, and manages an end-user's data, as well as specify ways in which the end user may contact the company to request details on the data that has been collected that identify them.
p
Learn More โPrivacy by design is a concept that integrates privacy into the creation and operation of new devices, IT systems, networked infrastructure, and business processes.
p
Learn More โPseudonymization is a data management and de-identification procedure by which personally identifiable information fields within a data record are replaced by one or more artificial identifiers
p
Learn More โA process through which additional or duplicate systems, equipment, etc., are installed to safeguard the functioning of the entire system or of data.
r
Learn More โAn extrapolation of current revenue into the future, often calculated monthly or quarterly.
r
Learn More โA contract between a service provider and a user that specifies, usually in measurable terms, response and resolution times that the provider will furnish in the event of breakage or downtime.
s
Learn More โSoftware that is licensed on a subscription basis and is hosted by the provider.
s
Learn More โA testing environment that isolates untested code changes and experimentation from the production environment or repository.
s
Learn More โThe ability of a system or company to handle a growing amount of work by having processes and systems in place to handle a larger workforce, more users, and more data.
s
Learn More โA security certificate, is small data file that digitally authenticates the identity of a website and enables an encrypted connection. Common security certificates include Secure Sockets Layer (SSL) certificates, Transport Layer Security (TLS) certificates, SSL server certificates, and Hyper Text Transfer Protocol Secure (HTTPS) certificates.
โ
The benefits of security certificates include:
s
Learn More โA centralized unit in an organization that deals with security issues. SOC analysts perform round-the-clock monitoring of an organizationโs network and investigate any potential security incidents.
s
Learn More โData about individuals that is protected by privacy laws, including health information, racial or ethnic origin, political opinions, and more.
s
Learn More โA computer or system that provides resources, data, services, or programs to other computers, known as clients, over a network.
s
Learn More โAn authentication process that allows a user to access multiple applications with one set of login credentials.
s
Learn More โA process of planning and managing software development. It typically involves dividing software development work into smaller, parallel, or sequential steps or sub-processes to improve design and/or product management.
s
Learn More โLegal instrument (typically via a contract) governing the use or redistribution of software.
s
Learn More โA type of patent (a type of intellectual property) that protects a new and innovative software idea or invention.
s
Learn More โSource code is the fundamental component of a computer program that is created by a programmer. Also known simply as code, it is any collection of text, with or without comments, written using a human-readable programming language, usually as plain text. ย Comparing a book to a software program, the source code would be the words in that book.
s
Learn More โA contract between a service provider and a subscriber that outlines the terms and conditions of the subscription.
s
Learn More โThe legal agreements between a company providing a service and a person who uses that service.
t
Learn More โA person who will benefit from a contract, despite not being a party to the contract.
t
Learn More โA security process in which users provide two different authentication factors to verify themselves, such as login over the web and a code that's sent to a smartphone.
t
Learn More โA measure of system reliability, usually in the form of a percentage (like 99.9%).
u
Learn More โInformation a company collects about its users, including personal information and usage statistics.
u
Learn More โA legal agreement that clearly states the provisions and conditions of the work to be performed by a contractor.
v
Learn More โThe process of assigning unique version names or numbers to unique states of software or contracts.
v
Learn More โA technology that creates a safe and encrypted connection over a less secure network, such as the internet.
v
Learn More โA software security flaw that is known to the software vendor but doesn't have a patch in place to fix the flaw.
z
Learn More โTools like Slack and Microsoft Teams for real-time messaging and collaboration among team members.
c
Learn More โEnables oversight of the entire contract life cycle, from inception to expiration or renewal.
c
Learn More โTools like Google Docs and Microsoft Word that allow for document creation, editing, and collaboration.
d
Learn More โProvides a consolidated space for storing, accessing, and managing legal documents.
d
Learn More โPlatforms aiding in identifying, collecting, and analyzing electronic information pertinent to lawsuits.
e
Learn More โE-signature software is a digital tool that allows individuals and organizations to electronically sign documents, contracts, and agreements, replacing the need for traditional handwritten signatures on paper copies contracts. As companies move to digital contracting
โ
e
Learn More โSoftware that offers a consolidated view of all corporate entities.
e
Learn More โTools such as Tableau that provide deep analytical insights, visual dashboards, and trend analyses.
i
Learn More โPlatforms for creating, managing, and sharing in-house knowledge bases or wikis.
k
Learn More โAll-in-one tool that consolidates legal intake and automatic triage, approval tracking, and basic project management.
l
Learn More โ