Browse Definitions :
Definition

zero tolerance

Zero tolerance is a hardline policy preventing or protecting against something that is undesirable in a given environment. In a human resources context, for example, a zero-tolerance policy might stipulate that an employee who bullied another staff member would be fired rather than reprimanded, temporarily suspended or required to attend corrective training.

A few more examples of zero tolerance:

Deplatforming is the practice of removing someone’s access to channels for delivering their content to an audience. The term is often used in reference to terminating users’ social media accounts. In such cases, terms of service (ToS) may indicate zero tolerance for particular behavior, such as trolling.  

Air-gapping can be considered a zero-tolerance approach to network traffic. Air-gapped systems are, at least in theory, protected from access from any external source.

Contracts between partners often stipulate zero tolerance for violation of agreed-upon terms, and some violations may render the contract null.

Businesses that rely on IT infrastructures to conduct corporate operations may have zero tolerance for network downtime.

Although there are situations where zero tolerance is advisable or even necessary, critics of such hardline policies argue that, among other things, they may lead to premature judgments and deprive individuals involved of their rights to due process.

This was last updated in January 2019

Continue Reading About zero tolerance

SearchNetworking
  • network packet

    A network packet is a basic unit of data that's grouped together and transferred over a computer network, typically a ...

  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

SearchSecurity
  • data breach

    A data breach is a cyber attack in which sensitive, confidential or otherwise protected data has been accessed or disclosed in an...

  • insider threat

    An insider threat is a category of risk posed by those who have access to an organization's physical or digital assets.

  • data compliance

    Data compliance is a process that identifies the applicable governance for data protection, security, storage and other ...

SearchCIO
  • data privacy (information privacy)

    Data privacy, also called information privacy, is an aspect of data protection that addresses the proper storage, access, ...

  • leadership skills

    Leadership skills are the strengths and abilities individuals demonstrate that help to oversee processes, guide initiatives and ...

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

SearchHRSoftware
SearchCustomerExperience
  • recommerce

    Recommerce is the selling of previously owned items through online marketplaces to buyers who reuse, recycle or resell them.

  • implementation

    Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...

  • first call resolution (FCR)

    First call resolution (FCR) is when customer service agents properly address a customer's needs the first time they call.

Close