Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Spelling #76

Open
wants to merge 9 commits into
base: master
Choose a base branch
from
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion example/policies/classification.md
Original file line number Diff line number Diff line change
Expand Up @@ -66,7 +66,7 @@ a. When classifying information, the level of confidentiality is determined by:
+-------------------+------------------+---------------------------+---------------------------+
| Restricted | Restricted | Unauthorized access to | Information is available |
| | | information may cause | to a specific group of |
| | | considerable damage to | employees and authhorized |
| | | considerable damage to | employees and authorized |
| | | the business and/or | third parties. |
| | | the organization's | |
| | | reputation. | |
Expand Down
2 changes: 1 addition & 1 deletion example/policies/conduct.md
Original file line number Diff line number Diff line change
Expand Up @@ -44,7 +44,7 @@ majorRevisions:

a. *Corruption*

i. Employees are discouraged from accepting gifts from clients or partners. Briberies are prohibited for the benefit of any external or internal party.
i. Employees are discouraged from accepting gifts from clients or partners. Bribery is prohibited for the benefit of any external or internal party.
Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I've never encountered the word briberies. Dictionaries do believe it exists, but while it is possible to use the plural form, I'm pretty sure this sentence/regulation works with the singular bribery to mean any bribery is.


a. *Job duties and authority*

Expand Down
2 changes: 1 addition & 1 deletion example/policies/datacenter.md
Original file line number Diff line number Diff line change
Expand Up @@ -22,7 +22,7 @@ a. This policy defines the policies and rules governing data centers and secure

# Policy

a. The following locations are classified by the organization as secure areas and are goverened by this policy:
a. The following locations are classified by the organization as secure areas and are governed by this policy:

i. [list all data center locations and secure areas under the organization’s control]

Expand Down
2 changes: 1 addition & 1 deletion example/policies/incident.md
Original file line number Diff line number Diff line change
Expand Up @@ -104,7 +104,7 @@ a. The ISM must take all necessary steps to resolve the incident and recover inf

i. Disclosures (parties to which the details of this incident were disclosed to, such as customers, vendors, law enforcement, etc.)

a. After an incident has been resolved, the ISM must conduct a post mortem that includes root cause analysis and documentation any lessons learned.
a. After an incident has been resolved, the ISM must conduct a postmortem that includes root cause analysis and documentation any lessons learned.
Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This is an amusing one. The Latin is two words, and Google says that it's still written more often as two words, but dictionaries say that the word is preferred as one word.


a. Depending on the severity of the incident, the Chief Executive Officer (CEO) may elect to contact external authorities, including but not limited to law enforcement, private investigation firms, and government organizations as part of the response to the incident.

Expand Down
4 changes: 2 additions & 2 deletions example/policies/risk.md
Original file line number Diff line number Diff line change
Expand Up @@ -93,8 +93,8 @@ Table 3: Description of Consequence Levels and Criteria
+-----------------+-----------------+--------------------------------------------------------------+
| High | 2 | Either existing security controls are not in place or |
| | | ineffective; there is a high probability of the risk being |
| | | realized. Incidents have a high likelihood of occuring in the|
| | | future. |
| | | realized. Incidents have a high likelihood of occurring in |
| | | the future. |
+-----------------+-----------------+--------------------------------------------------------------+
| | | |
+-----------------+-----------------+--------------------------------------------------------------+
Expand Down
2 changes: 1 addition & 1 deletion internal/render/pandoc.go
Original file line number Diff line number Diff line change
Expand Up @@ -38,7 +38,7 @@ func dockerPandoc(outputFilename string, errOutputCh chan error) {

pwd, err := os.Getwd()
if err != nil {
errOutputCh <- errors.Wrap(err, "unable to get workding directory")
errOutputCh <- errors.Wrap(err, "unable to get working directory")
return
}

Expand Down
18 changes: 9 additions & 9 deletions internal/theme/themes_bindata.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

2 changes: 1 addition & 1 deletion internal/ticket/scheduler.go
Original file line number Diff line number Diff line change
Expand Up @@ -86,7 +86,7 @@ func TriggerScheduled() error {
}

candidate := schedule.Next(triggeredAt)
// in the future? not far eonugh back yet.
// in the future? not far enough back yet.
if candidate.After(time.Now().UTC()) {
triggeredAt = triggeredAt.Add(-24 * time.Hour)
continue
Expand Down
2 changes: 1 addition & 1 deletion themes/comply-soc2/policies/classification.md
Original file line number Diff line number Diff line change
Expand Up @@ -66,7 +66,7 @@ a. When classifying information, the level of confidentiality is determined by:
+-------------------+------------------+---------------------------+---------------------------+
| Restricted | Restricted | Unauthorized access to | Information is available |
| | | information may cause | to a specific group of |
| | | considerable damage to | employees and authhorized |
| | | considerable damage to | employees and authorized |
| | | the business and/or | third parties. |
| | | the organization's | |
| | | reputation. | |
Expand Down
2 changes: 1 addition & 1 deletion themes/comply-soc2/policies/conduct.md
Original file line number Diff line number Diff line change
Expand Up @@ -44,7 +44,7 @@ majorRevisions:

a. *Corruption*

i. Employees are discouraged from accepting gifts from clients or partners. Briberies are prohibited for the benefit of any external or internal party.
i. Employees are discouraged from accepting gifts from clients or partners. Bribery is prohibited for the benefit of any external or internal party.

a. *Job duties and authority*

Expand Down
2 changes: 1 addition & 1 deletion themes/comply-soc2/policies/datacenter.md
Original file line number Diff line number Diff line change
Expand Up @@ -22,7 +22,7 @@ a. This policy defines the policies and rules governing data centers and secure

# Policy

a. The following locations are classified by the organization as secure areas and are goverened by this policy:
a. The following locations are classified by the organization as secure areas and are governed by this policy:

i. [list all data center locations and secure areas under the organization’s control]

Expand Down
2 changes: 1 addition & 1 deletion themes/comply-soc2/policies/incident.md
Original file line number Diff line number Diff line change
Expand Up @@ -104,7 +104,7 @@ a. The ISM must take all necessary steps to resolve the incident and recover inf

i. Disclosures (parties to which the details of this incident were disclosed to, such as customers, vendors, law enforcement, etc.)

a. After an incident has been resolved, the ISM must conduct a post mortem that includes root cause analysis and documentation any lessons learned.
a. After an incident has been resolved, the ISM must conduct a postmortem that includes root cause analysis and documentation any lessons learned.

a. Depending on the severity of the incident, the Chief Executive Officer (CEO) may elect to contact external authorities, including but not limited to law enforcement, private investigation firms, and government organizations as part of the response to the incident.

Expand Down
4 changes: 2 additions & 2 deletions themes/comply-soc2/policies/risk.md
Original file line number Diff line number Diff line change
Expand Up @@ -93,8 +93,8 @@ Table 3: Description of Consequence Levels and Criteria
+-----------------+-----------------+--------------------------------------------------------------+
| High | 2 | Either existing security controls are not in place or |
| | | ineffective; there is a high probability of the risk being |
| | | realized. Incidents have a high likelihood of occuring in the|
| | | future. |
| | | realized. Incidents have a high likelihood of occurring in |
| | | the future. |
+-----------------+-----------------+--------------------------------------------------------------+
| | | |
+-----------------+-----------------+--------------------------------------------------------------+
Expand Down