Glossary

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z |
American Standard Code for Information Interchange (ASCII)

ASCII (American Standard Code for Information Interchange) is the most common format for text files in computers and on the Internet. In an ASCII file, each alphabetic, numeric, or special character is represented with a 7-bit binary number (a string of seven 0s or 1s).

Asset Management

Asset management, broadly defined, refers to any system that monitors and maintains things of value to an entity or group. It may apply to both tangible assets such as buildings and to intangible concepts such as intellectual property and goodwill.

Audit Facility

A utility that generates a trail of audit records for a series of predefined and monitored database events.

Australian Fleet Management Association (AFMA)

This is a not-for-profit organisation with over 750 members throughout Australia and New Zealand. With a membership base represented across all industries as well as Federal, State and Local Government it is responsible for the management of approximately 800,000 fleet vehicles.

The AfMA strives to enhance Fleet Management as a profession providing knowledge, information and resources to Members and to lobby and advocate on behalf of the fleet industry. Forging an inclusive relationship within the automotive industry, including manufacturers, importers, distributors and other suppliers it embraces the entire spectrum of the fleet industry.

Best Practice

A best practice is a technique or methodology that, through experience and research, has proven to reliably lead to a desired result. A commitment to using the best practices in any field is a commitment to using all the knowledge and technology at one's disposal to ensure success.

In software development, a best practice is a well-defined method that contributes to a successful step in product development. Throughout the software industry, several best practices are widely followed. Some of the more commonly used are: an interative (or repetitive) development process, requirement management, quality control, and change control.

Claims Management

Involves proper and timely notification and record keeping of specific claims and overall loss history for the organisation.

Cloud Application Hosting

Hosting services that are provided to customers via multiple connected servers that comprise a cloud, as opposed to being provided by a single server or virtual server. There are numerous benefits possible with cloud hosting, including increased reliability and accessibility, seamless scalability and cost efficiency.

Cloud Solutions

In the simplest terms, cloud computing means storing and accessing data and programs over the Internet instead of your computer's hard drive.

Comcare

Comcare is the Australian Federal Governments Workplace Safety, Compensation and Rehabilitation Scheme. Employees in the scheme are covered by the same legislation regardless of which state or territory they work in. To be eligible for Comcare employees need to be employed by the Commonwealth of Australia, the ACT government or a corporation that has been granted a licence to self-insure.

Configurable Software

To "configure software" means selecting programmable options that make the program function to the user's liking.

Contractor Management

A contractor is a person, or organisation, that provides a service for a fee but is not a direct employee. Employers have the same duty of care towards contractors as they do for their employees. To ensure the contractors you engage work safely when on site and do not introduce any unmanaged risks when undertaking the work, plans must be put in place to manage contractor activities. This includes conducting pre-commencement Contractor Induction, advising contractors of specific site hazards and sighting Safe Work Procedures.

Custom Styled

Custom styled software (also known as bespoke software or tailor-made software) is software that is specially developed for a specific organisation or other user. It can be contrasted with the use of software packages developed for the mass market, such as commercial off-the-shelf (COTS) software, or existing free software.

Dashboard

In information technology, a dashboard is a user interface that, somewhat resembling an automobile's dashboard, organises and presents information in a way that is easy to read on a graphical display.

Data Integrity

Refers to maintaining and assuring the accuracy and consistency of data over its entire life-cycle, a critical aspect to the design, implementation and usage of any system which stores, processes, or retrieves data.

Data Merge Facility

A software function describing the production of multiple (and potentially large numbers of) data from a single template form and a structured data source.

Disability

Disability in the workplace is defined as “an impairment that restricts the ability to perform normal daily activities where impairment is any loss or abnormality of psychological, physiological, or anatomical structure or function”.

Due Diligence

The process of systematically researching and verifying the accuracy of a statement.

Enterprise Risk Management

Enterprise Risk Management (ERM) in business includes the methods and processes used by organisations to manage risks and seize opportunities related to the achievement of their objectives. ERM provides a framework for risk management, which typically involves identifying particular events or circumstances relevant to the organisation's objectives (risks and opportunities), assessing them in terms of likelihood and magnitude of impact, determining a response strategy, and monitoring progress.

External Database

An external database is a data storage facility that is located at an independent site.

Fleet Management

Fleet management is the management of a company's transportation fleet. Fleet management includes commercial motor vehicles such as cars, ships, vans and trucks, as well as plant and machinery.

Fringe Benefit Tax

A tax applied within the Australian taxation system by the Australian Taxation Office. The tax is levied on most non-cash benefits that an employer provides "in respect of employment." The tax is levied on the employer, not the employee and will be levied irrespective of whether the benefit is provided directly to the employee or to an associate of the employee.

Hardware

The machines, wiring, and other physical components of a computer or other electronic system.

Hazard Register

A summarised record of the hazards identified in a business, where the hazards occur and the task, machinery or situations with which they are associated.

Holistic

Characterised by the belief that the parts of something are intimately interconnected and explicable only by reference to the whole.

Incident Management

Incident management is a term describing the activities of an organisation to identify, analyse, and correct hazards to prevent a future re-occurrence.

Job Card

A document used to advise of the repairs to be done on a vehicle. A job card contains information for the workshop and the client. It is also often used to provide cost information to insurance companies.

Job Safety Analysis

Job Safety Analysis (JSA) simply means looking at the work task and considering the safest way to complete it. It is a way of becoming aware of the hazards involved in doing the job and taking action to prevent an injury.

Legislation

The act or process of making or enacting laws.

Loss Control Maintenance

All methods taken to reduce the frequency and/or severity of losses including exposure avoidance, loss prevention, loss reduction, segregation of exposure units and noninsurance transfer of risk. A combination of risk control techniques with risk financing techniques forms the nucleus of a risk management program.

Lost Time Injury Frequency Rate (LTIFR)

The number of lost time injuries x 1,000,000 hours divided by the hours worked.

 
Mobile Technology

Mobile technology is exactly what the name indicates – technology that is portable; it refers to any device that you can carry with you to perform a wide variety of “tasks”. It is technology that allows those tasks to be performed via cellular phone, PDA, vehicles, laptops, etc. It includes the use of a variety of transmission media such as: radio wave, microwave, infra-red, GPS and Bluetooth to allow for the transfer of data via voice, text, video, 2-dimensional barcodes and more.

Multi-Lingual

In context of software it provides for the application to display and be used in more than one default “language”.

Multi-Currency

In context of software it provides for the application to display and be used in more than one default “currency” for monetary transactions.

 
Network Architecture

Specification of design principles (including data formats and procedures) for creating a network configuration of data processors.

Network Bandwidth

In computer networking, bandwidth is a measurement of bit-rate of available or consumed data communication resources expressed in bits per second or multiples of it (bit/s, kbit/s, Mbit/s, Gbit/s, etc.).

Non-Technical

Not having or requiring specialised or technical knowledge.

Occupational Health & Safety (OHS)

Occupational health and safety is an area concerned with protecting the safety, health and welfare of people engaged in work or employment. The goals of occupational safety and health programs include fostering a safe and healthy work environment.

Odometer

An instrument that records distance travelled.

Operating Systems

The low-level software that supports a computer's basic functions, such as scheduling tasks and controlling peripherals.

Pool Vehicle

A motor vehicle within a fleet that is available to be used by different employees within an organisation.

Progress Software (www.progress.com)

Progress Software Corporation, formerly Data Language Corporation, is a global software company and the computer language Figtree’s software is written in.

Purchase Order

A commercial document and first official offer issued by a buyer to a seller, indicating descriptions, quantities and agreed prices for products or services.

Rapid Application Development (RAD)

A software development methodology that uses minimal planning in favour of rapid prototyping. The "planning" of software developed using RAD is interleaved with writing the software itself. The lack of extensive pre-planning generally allows software to be written much faster, and makes it easier to change requirements. Graphical user interface builders are often called rapid application development tools.

Rating Tables

Tables that companies use to classify risks.

Real Time

In computing terms relates to a system in which input data is processed within milliseconds so that it is available virtually immediately as feedback to the process from which it is coming.

Regulatory Authority

A governmental agency that regulates businesses in the public interest.

Risk Management

The forecasting and evaluation of financial risks together with the identification of procedures to avoid or minimise their impact.

Risk Matrix

A Risk Matrix is a matrix that is used during Risk Assessment to define the various levels of risk as the product of the harm probability categories and harm severity categories. This is a simple mechanism to increase visibility of risks and assist management decision making.

Risk Profile

A risk profile is a quantitative analysis of the types of threats an organisation, asset, project or individual faces. The goal of a risk profile is to provide a non-subjective understanding of risk by assigning numerical values to variables representing different types of threats and the danger they pose.

Risk Review

Part of the risk learning process. A risk review ensures that all learning is captured.

Safety Induction

Employers have a duty of care to staff and as such must make sure the workplace is safe, and ensure employees and contractors undertake necessary training before commencing employment and using potentially dangerous equipment or materials.

Employers need to keep a record of all work health and safety training/inductions. At the conclusion of each training/induction session, staff members should confirm they have understood the training.

Seamless Interface

A seamless interface is the joining of two computer programs so that they appear to be one program.

Security Features

The security-relevant functions, mechanisms, and characteristics of Automatic Identification System (AIS) hardware and software.

Self Insured

Self Insurance is a process whereby a corporation underwrites its own insurance obligations usually within a legislative framework.

Servers

A computer or computer program which manages access to a centralised resource or service in a network.

Systematic Identification

The field of systematic identification uses statistical methods to build mathematical models of dynamical systems from measured data. System identification also includes the optimal design of experiments for efficiently generating informative data for fitting such models as well as model reduction.

Third Party Claims Administration

A third-party administrator (TPA) is an organisation that processes insurance claims for a separate entity. This can be viewed as "outsourcing" the administration of the claims processing, since the TPA is performing a task traditionally handled by the company providing the insurance or the company itself. Often, in the case of insurance claims, a TPA handles the claims processing for an employer that self-insures its employees. Thus, the employer is acting as an insurance company and underwrites the risk. The risk of loss remains with the employer, and not with the TPA. An insurance company may also use a TPA to manage its claims processing. While some third-party administrators may operate as units of insurance companies, they are often independent.

Validation

The act of validating; finding or testing the truth of something.

Web Enabled

Capable of connecting to the Web or running an application from the Web. This term may refer to general Web surfing, connecting to a specific Web site for some purpose or running applications within a Web browser.

Web Encrytion

This is the scrambling of data in such a way that only someone with the encrypted code / key can read it.

Web Technology

Web technology is the development of the mechanism that allows two or more computer devices to communicate over a network.

Workplace Health & Safety (WHS)

Workplace Health & Safety is another term for Occupational Health and Safety wherein it is an area concerned with protecting the health and safety of all stakeholders in the workplace from exposure to hazards and risks resulting from work activities.

XML

Extensible Markup Language (XML). Markup languages are designed for the processing, definition and presentation of text. The language specifies code for formatting, both the layout and style, within a text file. The code used to specify the formatting are called tags. XML is a markup language that defines a set of rules for encoding documents in a format that is both human-readable and machine-readable. It is defined in the XML 1.0 Specification. The design goals of XML emphasise simplicity, generality, and usability over the Internet.