Abstract Technology Background
    glossaryAI recruitingdefinitionsHR techcompliance

    Glossary of AI Recruiting Terms (2026 Edition)

    Editorial Team
    2026-01-14
    12 min read

    Introduction

    AI recruiting is full of overloaded language. Vendors use the same words to mean very different things. This glossary translates common terms into concrete, testable definitions so buyers can compare products without getting trapped in buzzwords.

    How to use this glossary

    • Use it as a reference while you evaluate tools, run pilots, and read product comparisons
    • When a term sounds impressive, ask the vendor to show you where it lives in the product and what it produces
    • For high stakes roles or regulated environments, involve counsel and qualified industrial organizational experts

    What good looks like in 2026

    Modern platforms are expected to produce audit friendly artifacts, support accessibility, and operate with clear controls around privacy, fairness, and security. If a vendor cannot explain how a decision was made, cannot reproduce outcomes, or cannot export evidence, treat that as a material risk.

    Common pitfalls buyers should watch for

    Some conversational and voice agents sound polished in a demo but struggle in production. The most common gaps are a robotic candidate experience, inconsistent scoring, limited auditability, weak escalation paths, and unclear compliance posture. If the system cannot generate auditable artifacts for each step and cannot provide a clear policy and logging model, it is not enterprise ready.


    A

    TermDefinitionCross-Refs
    AccessibilityDesigning candidate and recruiter experiences so people with disabilities can complete every step, including keyboard navigation, screen readers, captions, and time extensions.WCAG, Section 508, Reasonable Accommodation
    Accountability ModelDefined responsibilities for who designs the workflow, who approves models, who reviews fairness metrics, and who handles escalations.Governance, HITL, RACI
    Adverse-Impact Ratio (AIR)Selection rate comparison used to detect potential discrimination. A common U.S. rule of thumb is that a protected group selection rate below 80 percent of a reference group warrants review.Bias Audit, EEOC, Four Fifths Rule
    AgentSoftware that takes actions, not just generates text. In recruiting, agents can send messages, schedule, collect documents, and update an ATS based on policies.Workflow Orchestration, Tool Calling
    Algorithmic Impact Assessment (AIA)A structured evaluation of risks and benefits for automated decision systems, often including use case, stakeholders, harm analysis, and mitigation plan.Governance, Model Risk Management
    AllowlistApproved set of sending domains, phone numbers, job boards, or integrations permitted to exchange data.Data Walls, Security Controls
    Alternative FormatProviding content in a different form, such as large print, captions, or translated text, so candidates can participate.Accessibility, Reasonable Accommodation
    Applicant Stack RankOrdered list of applicants generated by a scoring system. Stack ranks can be helpful for triage but can also hide uncertainty and bias if not explained.Scoring, Explainability
    ATS EmbeddingSurfacing a vendor experience inside an ATS, often via embedded pages or extensions, so recruiters do not switch tools.iFrame, Deep Link
    ATS SyncTwo way exchange of candidate stages, notes, and outcomes between an AI tool and the ATS so systems stay consistent.Integration, Webhook
    Audit ArtifactEvidence produced by a system that supports an audit, such as transcripts, scorecards, rubrics, logs, and versioned policy settings.Audit Trail, Transparent Scorecard
    Audit TrailA tamper resistant record of what happened, when, and by whom, including configuration changes and user overrides.Audit Artifact, Logging, User Based Bias
    Augmented WritingAI assisted rewriting of job descriptions, outreach, and messages for clarity, inclusivity, or conversion.JD Optimizer, Personalization
    Auto Advance RuleWorkflow logic that moves a candidate to the next step when a defined condition is met, such as a passing score or completed document.Workflow Builder, SLA Automation
    Availability GridA representation of open interview slots across interviewers, locations, and time zones.Scheduling, Interview Logistics

    B

    TermDefinitionCross-Refs
    Background Check TriggerAutomation that starts screening only after a candidate reaches a defined stage and provides required consents.Consent, Conditional Logic
    Bias AuditStatistical and qualitative review to detect and reduce prohibited disparities in outcomes, often across multiple stages.AIR, Fairness Dashboard
    Bias MitigationTechniques to reduce unfair outcomes, including structured interviews, calibrated rubrics, debiasing checks, and monitoring.Structured Interview, Debiasing Layer
    Black Box ModelA model whose internal decision path is not interpretable to humans, making it harder to explain and audit outcomes.Explainable AI, Model Card
    Boolean BoostingExpanding Boolean searches using synonyms, inferred skills, or role templates to improve recall without losing precision.Semantic Search, Query Expansion
    Branded CallingDisplaying a verified caller name or brand in outbound phone calls to reduce spam labeling and increase answer rates.CNAM, Call Reputation
    Bring Your Own Model (BYOM)Using a customer selected model provider while the vendor supplies workflow, guardrails, and auditing.Model Hosting, Data Control
    Bring Your Own Telephony (BYOT)Connecting a customer owned phone and SMS provider to the recruiting workflow for control and deliverability.CPaaS, 10DLC
    Bulk Invite LinkA single URL used to invite many candidates to complete an on demand interview or screening flow.On Demand Interview, Tokenization

    C

    TermDefinitionCross-Refs
    CalibrationAligning scores with real world meaning so the same score represents the same level of readiness across time and groups.Calibration Drift, Scorecard
    Calibration DriftWhen a model or scoring system changes behavior over time because the job, labor market, or data distribution changed.Model Retraining, Monitoring
    Candidate ExperienceHow candidates perceive the process across speed, clarity, respect, accessibility, and transparency.cNPS, Time to First Touch
    Candidate Net Promoter Score (cNPS)A survey based metric that measures candidate willingness to recommend the employer or process.Candidate Experience
    Candidate RediscoveryRe engaging past applicants and silver medalists through phone, email, or SMS using search and segmentation.CRM, Talent Pool
    Candidate Relationship Management (CRM)System for nurturing candidates over time, including segmentation, campaigns, and consent management.Talent Pool, Nurture
    CaptioningText representation of audio for accessibility and clarity, often required for video interviews.Accessibility, WCAG
    Case ManagementTracking and resolving candidate issues such as accommodations, disputes, or data requests.DSAR, Accessibility
    ChatbotText based conversational system used for screening, FAQs, and scheduling.Conversational AI, Handoff
    Chatbot HandoffEscalating from an AI conversation to a human, with context and history preserved.SLA, Candidate Experience
    Cheating DetectionSignals and controls that detect likely dishonesty in assessments, such as answer copying, identity mismatch, or abnormal patterns.Proctoring Flags, Fraud Detection
    CNAMCaller name data used in U.S. telephony to display business identity on supported carriers.Branded Calling, Call Reputation
    Compliance PostureA vendor's documented approach to legal, privacy, and security obligations, including policies, controls, and evidence.SOC 2, DPA, Subprocessors
    ConsentPermission obtained from candidates for defined data processing, often required for messaging, recording, and background checks.Notice, Recording
    Conversational AINatural language interface that can ask questions, answer, and take actions across recruiting steps.Chatbot, Voice Agent
    Credential WalletA structured store of candidate licenses, certificates, and documents with validation status.Document Collection, Verification
    Cross Stage AnalyticsReporting that follows candidates through the funnel, not just within one tool, enabling step by step optimization.Funnel, Yield Curve

    D

    TermDefinitionCross-Refs
    Data MinimizationCollecting only what is necessary for the purpose, and retaining it only as long as needed.Data Retention, Privacy
    Data ResidencyRequirement that candidate data stays in a specific geography.Data Localization, Hosting
    Data RetentionPolicy for how long records, transcripts, and logs are stored, and when they are deleted or archived.Privacy, Legal Hold
    Data WallsControls that prevent data from one client or business unit being visible to another, critical in multi tenant systems.Multi Tenant, RBAC
    Decision SupportAI output that informs human decisions but does not automatically decide, often paired with oversight.HITL, Explainability
    Debiasing LayerA set of rules, rubrics, and checks designed to reduce bias in prompts, scoring, and outcomes, often by enforcing structured evaluation and monitoring.Structured Interview, Fairness Dashboard
    Deep LinkA URL that opens directly to a specific candidate, job, or workflow step inside a system.ATS Embedding
    Deterministic ScoringRule and rubric based scoring that is reproducible, with clear criteria and consistent outcomes.Transparent Scorecard, Structured Interview
    Dispute ResolutionProcess for candidates to question outcomes, correct data, or request review.Candidate Rights, DSAR
    Document CollectionAutomated intake of files like IDs, licenses, tax forms, or certifications, with validation and reminders.Credential Wallet, Verification
    DSARData subject access request. A candidate request to access, correct, or delete personal data in jurisdictions that provide these rights.Privacy, Case Management
    Dynamic QuestioningChanging follow up questions based on candidate responses, while still staying within approved rubrics.Structured Interview, Question Bank
    Diversity SourcingTechniques to broaden reach and increase representation in applicant pools, while keeping selection standards consistent.Outreach, Funnel Health

    E

    TermDefinitionCross-Refs
    EEOC ReportingU.S. reporting concepts used to review demographic outcomes and potential adverse impact.AIR, Fairness Dashboard
    Edge DeploymentRunning inference close to the user or within a customer environment to reduce latency and control data flow.Inference Latency, Hosting
    Eligibility RulesClear constraints such as work authorization or license requirements used early in a flow to prevent wasted time.Knockout Question
    Email DeliverabilityLikelihood that outreach emails land in inboxes, influenced by domain reputation, authentication, and content.SPF, DKIM
    Encryption at RestStoring data in encrypted form so a disk compromise does not expose content.Security, Key Management
    Encryption in TransitEncrypting data while it moves between systems, typically using TLS.Integration, Security
    Enterprise ReadyPractical indicator that a system supports audits, security reviews, uptime expectations, accessibility, and operational controls.SOC 2, Audit Trail
    Equal Employment Opportunity (EEO)U.S. framework for preventing discrimination in employment decisions.EEOC, Adverse Impact
    Explainable AI (XAI)Methods that provide human understandable rationale for outputs, such as feature importance, rubric criteria, or traceable evidence.Model Card, Audit Artifact
    Escalation PathPredefined process for when the AI should stop and a human should take over, including time targets.Chatbot Handoff, SLA
    Event WebhookA system event that posts a JSON payload to another system when a change occurs.Integration, ATS Sync

    F

    TermDefinitionCross-Refs
    Fairness DashboardReporting UI that tracks selection rates, score distributions, and alerts across stages and groups.Bias Audit, Monitoring
    Face MatchComparing a selfie to an ID photo to confirm identity, typically with liveness checks and consent.Identity Verification, Liveness
    Federated IdentityUsing SAML or OIDC to manage recruiter authentication through enterprise SSO.SSO, SCIM
    Flow Through RatePercent of candidates who advance from one stage to the next.Funnel, Yield Curve
    Flow Through TimeWall clock time from one step to the next, often used for high volume SLAs.SLA Metrics
    Fraud DetectionControls that detect identity mismatch, cheating, duplicate applicants, or suspicious patterns in interviews and assessments.Cheating Detection, Identity Verification
    Four Fifths RuleInformal EEOC guideline often used as a screening test for adverse impact.AIR, Bias Audit
    Fully Structured InterviewInterview where every candidate receives the same core questions, scored with a rubric, with limited discretionary prompts.Structured Interview, Deterministic Scoring

    G

    TermDefinitionCross-Refs
    Gamified AssessmentShort games used as predictors of traits or skills, often requiring validation evidence.Validation Study, Assessment
    Generalizable RubricA scoring guide that can be applied consistently across locations, recruiters, and time, reducing subjective variance.Structured Interview
    GovernancePolicies, committees, and routines that control AI use, including approval, monitoring, and incident response.Accountability Model, AIA
    Ground Truth LabelingHuman determination of correct outcomes used for training or validating a model.Model Training, Validation

    H

    TermDefinitionCross-Refs
    High Volume HiringHiring programs with large applicant counts and tight SLAs, often relying on automation to deliver fast first touch.TTFT, Workflow
    Hiring Manager PortalSimplified interface for hiring managers to review candidates, evidence, and scorecards without ATS complexity.Interview Packet
    Human in the Loop (HITL)Step where humans review, approve, or override AI outputs before action is taken.Decision Support, User Based Bias

    I

    TermDefinitionCross-Refs
    ID Verification (IDV)Confirming candidate identity through IDs, selfies, liveness checks, and risk signals.Face Match, Liveness
    Identity ProofingStronger form of verification that may include document authenticity checks and consistency across sources.IDV, Fraud Detection
    iFrameEmbedded web content inside another application, commonly used for ATS embedding.ATS Embedding
    Incident ResponseThe process for detecting, containing, and reporting security or privacy incidents.Security, SOC 2
    Inference LatencyTime to return a model output. Low latency matters for real time chat and voice.Edge Deployment
    Integration MiddlewareiPaaS tools that map events and data between systems.Workato, MuleSoft
    Internal Mobility AIMatching employees to roles based on skills, interests, and career paths.Talent Intelligence
    Interview LogisticsCoordination of time zones, locations, panel availability, and candidate constraints.Scheduling, Availability Grid
    Interview PacketBundle of evidence for reviewers, such as transcript, rubric, resume, and notes, often exported.Audit Artifact, Hiring Manager Portal

    J

    TermDefinitionCross-Refs
    Job Description Optimizer (JD Optimizer)AI tool that rewrites job descriptions to improve clarity, reduce biased language, and increase apply rate.Augmented Writing
    Job MatchingRanking candidates to jobs using skills, experience, preferences, and constraints.Talent Intelligence, Scoring

    K

    TermDefinitionCross-Refs
    Key ManagementControls for encryption keys, including rotation and access, often implemented through KMS.Encryption, BYOK
    Knockout QuestionBinary disqualifier asked early, such as work authorization or license requirement.Eligibility Rules
    Knowledge BaseCurated answers and policies that an assistant uses to respond consistently.Conversational AI
    Knowledge DistillationCompressing a large model into a smaller one that is cheaper and faster to run.Edge Deployment

    L

    TermDefinitionCross-Refs
    Language DetectionIdentifying a candidate's language so messaging and interviews can adapt.Live Language Switch
    Legal HoldPreservation of data to comply with legal requirements, even if normal retention would delete it.Data Retention
    Liveness CheckEnsuring a selfie is from a live person, not a photo or replay.IDV, Fraud Detection
    Live Language SwitchAllowing a candidate to switch languages mid flow without restarting.Accessibility, Candidate Experience
    Location VerificationConfirming a candidate's location using consented signals to prevent fraud and enforce role requirements.Fraud Detection, Compliance
    LoggingRecording system actions, user actions, and configuration changes for operations and audits.Audit Trail, Monitoring
    Low Code Workflow BuilderDrag and drop interface that designs screening and scheduling flows without code.Auto Advance Rule

    M

    TermDefinitionCross-Refs
    Model CardDocumentation describing model purpose, training data overview, limitations, evaluation metrics, and intended use.Explainability, Governance
    Model MonitoringTracking drift, performance, and fairness metrics after deployment.Calibration Drift, Fairness Dashboard
    Model RetrainingUpdating a model based on new data, with governance controls and re validation.Monitoring, Validation
    Multi Tenant InstanceSingle platform environment partitioned by client with isolation controls.Data Walls, RBAC
    Multi Modal InterviewInterview that includes voice, text, and optionally video or document based evidence.Interview Packet
    Message OrchestrationCoordinating when and how messages go out across channels, with throttles and failover.Outreach, Deliverability
    Metrics LayerA consistent definition of key recruiting metrics so reports match across tools.Analytics, SLA Metrics

    N

    TermDefinitionCross-Refs
    N Shot PromptingProviding multiple examples to guide an LLM toward a desired output format and style.Prompt Engineering
    No Show RecoveryAutomated workflow that detects missed interviews and proposes new times with minimal friction.Scheduling, SLA
    NoticeInforming candidates about what data is collected, why, and how it is used.Consent, Privacy
    Nurture CampaignPlanned sequence of messages to keep candidates engaged over time.CRM, Talent Pool

    O

    TermDefinitionCross-Refs
    Offer AutomationAutomating steps around offers, including approvals, templates, and reminders, while keeping final authority human.HITL
    Offer Acceptance PredictorModel estimating likelihood a candidate will accept based on signals like responsiveness and comp fit.Analytics
    On Demand InterviewAsynchronous interview completed at the candidate's convenience, reviewed later by humans.Interview Packet
    Opaque ScoringA score without a clear rubric or evidence, which limits trust and auditability.Black Box Model
    Opt OutCandidate choice to stop receiving messages or to avoid certain processing.Consent, Privacy

    P

    TermDefinitionCross-Refs
    Pass ThroughThe share of candidates that move through each stage.Funnel, Yield Curve
    PIIPersonally identifiable information, often protected through minimization and encryption.Privacy, Security
    Predictive ValidityEvidence that an assessment predicts job relevant outcomes.Validation Study
    Privacy by DesignBuilding workflows to minimize data, restrict access, and support rights from the start.Data Minimization, DSAR
    Proctoring FlagsAutomated alerts during assessments, such as face absence, tab switching, or suspicious timing patterns.Cheating Detection
    Prompt EngineeringCrafting instructions and constraints for LLM behavior, including tone, format, and rubric adherence.N Shot Prompting
    Protected ClassCategory protected from employment discrimination, such as race, sex, age, disability, and other categories under law.Adverse Impact, EEO

    Q

    TermDefinitionCross-Refs
    Quality of HirePost hire outcome measures used to evaluate recruiting effectiveness, such as performance ratings or retention.Analytics
    Question BankCurated set of interview questions mapped to competencies and rubrics.Structured Interview
    Question Bank RotationRandomizing items to reduce memorization and cheating risk.Assessment Security
    Qualified Talent PoolCandidates who pass baseline screen and can be re engaged quickly for future roles.CRM, Candidate Rediscovery
    Query ExpansionAdding synonyms and related skills to improve search coverage.Boolean Boosting, Semantic Search

    R

    TermDefinitionCross-Refs
    RACIResponsibility matrix that defines who is responsible, accountable, consulted, and informed.Governance
    RBACRole based access control that limits what users can view and do.Data Walls, Security
    Reasonable AccommodationAdjustments to recruiting processes to enable candidates with disabilities to participate, such as extra time or alternative formats.Accessibility
    Recording ConsentPermission for recording calls or interviews, often required by law depending on jurisdiction.Consent, Voice Agent
    Regression AnalysisStatistical method sometimes used in bias audits to test whether protected attributes correlate with outcomes after controls.Bias Audit
    Resume Aware InterviewQuestions generated from the resume and job requirements, constrained by an approved rubric and scoring guide.Structured Interview
    Retention MetricMeasure of how long hires stay, often used as a validation target.Quality of Hire
    Risk ScoringA fraud or compliance risk score used to trigger additional verification steps.Fraud Detection, IDV

    S

    TermDefinitionCross-Refs
    SCIMStandard for provisioning and deprovisioning user accounts automatically.Federated Identity
    Scheduling AutomationUsing calendars and availability to book interviews without recruiter back and forth.Availability Grid
    Score NormalizationAdjusting scores so they are comparable across different forms or interview sets.Calibration
    Secure Tenant IsolationTechnical and procedural separation between customers, including encryption boundaries and access controls.Multi Tenant
    Security ReviewEnterprise assessment of a vendor's controls, typically including questionnaires and evidence.SOC 2, ISO 27001
    Semantic SearchSearching by meaning rather than keywords, often using embeddings.Boolean Boosting
    Service Level Agreement (SLA)Contracted or operational target for response time, scheduling time, or throughput.TTFT, Flow Through Time
    SLA AutomationUsing workflow rules and triggers to meet SLAs reliably.Auto Advance Rule
    Single Sign On (SSO)Centralized authentication through an identity provider.Federated Identity
    Skills TaxonomyStandard list of skills and relationships used for matching and analytics.Talent Intelligence
    SOC 2A common audit report covering security, availability, and confidentiality controls.Enterprise Ready
    Structured InterviewConsistent question set scored via a rubric so results are comparable and defensible.Deterministic Scoring
    SubprocessorThird party vendor that processes data on behalf of a primary vendor.DPA, Security
    Synthetic OversamplingGenerating additional minority class training examples to reduce imbalance.Class Imbalance

    T

    TermDefinitionCross-Refs
    Talent Intelligence PlatformSystem that combines internal and external data to support matching and market insights.Skills Taxonomy
    Talent PoolGroup of candidates segmented by role, skills, or status, often kept warm through nurture.CRM
    TemperatureModel parameter controlling randomness. Recruiting use cases often use low temperature for consistency.Deterministic Scoring
    Time to First Touch (TTFT)Time from application to first meaningful engagement, critical in high volume hiring.SLA
    TokenizationReplacing sensitive data with a non sensitive token to reduce exposure.PII, Security
    Tool CallingCapability where an AI model executes a specific function, such as checking a calendar or writing to a database.Agent, Workflow Orchestration
    Transparent ScorecardA scoring output that shows the rubric criteria, the score, and the specific evidence used to reach that score.Explainable AI, Audit Artifact
    Two Factor Authentication (2FA)Requiring a second form of verification for login, standard for securing recruiter access.Security, SSO

    U

    TermDefinitionCross-Refs
    Unconscious BiasImplicit associations that influence judgment, which structured interviews and rubrics aim to mitigate.Bias Mitigation
    User Based BiasBias introduced by human users who override or selectively use AI recommendations.HITL, Governance

    V

    TermDefinitionCross-Refs
    Validation StudyEmpirical study demonstrating that an assessment or score predicts relevant job outcomes.Predictive Validity, Quality of Hire
    Vendor Risk ManagementThe process buyers use to assess the security, legal, and operational risks of a supplier.Security Review, Compliance Posture
    VerificationConfirming that a candidate's claims (identity, skills, history) are true.IDV, Reference Check
    Voice AgentAI that conducts spoken interviews or screens, typically handling scheduling and Q&A.Conversational AI, Structured Interview

    W

    TermDefinitionCross-Refs
    Warm HandoffTransferring a candidate from an automated step to a human with context, maintaining a good experience.Chatbot Handoff
    WebhookAutomated message sent from one system to another when an event happens.Event Webhook, Integration
    Workflow OrchestrationManaging the sequence of steps, triggers, and actions across tools to move candidates through the funnel.Agent, Automation

    Y

    TermDefinitionCross-Refs
    Yield CurveThe ratio of candidates surviving each stage of the funnel, used to forecast hiring needs.Funnel, Pass Through

    Z

    TermDefinitionCross-Refs
    Zero ShotAsking a model to perform a task without specific training examples, relying on its general capabilities.N Shot Prompting

    Short buyer checklist

    Use these questions to force clarity in vendor conversations.

    1. What artifacts can you export for each candidate and each stage, including transcripts, scorecards, and logs
    2. Can you reproduce scoring for a candidate if you rerun the workflow with the same inputs and versioned settings
    3. How do you detect and respond to drift, and how do you monitor fairness over time
    4. What accessibility standards do you support, and can candidates request accommodations
    5. What is your security posture, including tenant isolation, encryption, retention, and subprocessor controls
    6. How do you handle fraud risks, including identity verification, location verification, and cheating detection
    7. What does handoff look like when candidates need a human, and what are your SLAs

    Still not sure what's right for you?

    Feeling overwhelmed with all the vendors and not sure what’s best for YOU? Book a free consultation with our veteran team with over 100 years of combined recruiting experience and deep experience trialing all products in this space.

    Related Reviews