All Collections
Policy Library
Policy Set - Journey Toward Eliminating Oppressive Language
Policy Set - Journey Toward Eliminating Oppressive Language
Updated over a week ago

This Policy Set was developed based on recommendations from the EDUCAUSE IT Communications CG Coffee Shop on Oct. 6, 2020 (with the support of many other Community Groups).

Checks in this Policy Set

  • blackbox

    • Potential Alternative Terminology: closed box, mystery box

  • blackhat hacker

    • Potential Alternative Terminology: criminal, unethical hacker

  • blacklist

    • Potential Alternative Terminology: block list or denied

  • grandfather

    • Potential Alternative Terminology: legacy

  • gray hat hacker

    • Potential Alternative Terminology: hacktivist

  • master/slave

    • Potential Alternative Terminology:

      • primary/replica

      • parent/child

      • active/passive

      • primary/secondary

      • trunk/branch

  • whitelist

    • Potential Alternative Terminology: allow list or approved

  • white hat hacker

    • Potential Alternative Terminology: ethical hacker

  • whitebox

    • Potential Alternative Terminology: open box, clear box

  • red team

    • Potential Alternative Terminology: cyber offense

  • yellow team

    • Potential Alternative Terminology: DevSecOps team

  • white team

    • Potential Alternative Terminology: cyber exercise cell

  • gray beard

    • Potential Alternative Terminology: the individual’s name

  • mob programming

    • Potential Alternative Terminology: team, swarm, troop

  • whitespace

    • Potential Alternative Terminology: empty space

Did this answer your question?