Privacy Program Management
Privacy Program Management
• CIPM
• CIPP/C
• CIPP/E
• CIPP/US
• CIPT
• A
• B
• C
• D
• E
• F
• G
• H
• I
• J
• K
• L
• M
• N
• O
• P
• Q
• R
• S
• T
• U
• V
• W
fullscreen_exitCOLLAPSE ALL
• remove
Abstract
• add
• add
Access Control List
A list of access control entries (ACE) that apply to an object. Each ACE controls or
monitors access to an object by a specified user. In a discretionary access
control list (DACL), the ACL controls access; in a system access control list
(SACL) the ACL monitors access in a security event log which can comprise part
of an audit trail.
Acronym(s): ACL
Associated term(s): Access Control Entry (ACE)
Return to top
• add
Accountability
• add
Accuracy
Organizations must take every reasonable step to ensure the data processed is
accurate and, where necessary, kept up to date. Reasonable measures should be
understood as implementing processes to prevent inaccuracies during the data
collection process as well as during the ongoing data processing in relation to the
specific use for which the data is processed. The organization must consider the
type of data and the specific purposes to maintain the accuracy of personal data
in relation to the purpose. Accuracy also embodies the responsibility to respond
to data subject requests to correct records that contain incomplete information or
misinformation.
Return to top
• add
Sector
A Québéquois privacy law that, other than different terminology, is similar
to PIPEDA, though at a province level. It came into force in 1994 and espouses
three principles: (1) Every person who establishes a file on another person must
have a serious and legitimate reason for doing so; (2) The person establishing the
file may not deny the individual concerned access to the information contained in
the file; (3) The person must also respect certain rules that are applicable to the
collection, storage, use and communication of this information.
Link to text of law: Act Respecting the Protection of Personal Information in the
Private Sector
Return to top
• add
When an end user deliberately provides information, typically through the use of
web forms, text boxes, check boxes or radio buttons.
Associated term(s): Passive Data Collection, First-party Collection, Surveillance
Collection, Repurposing, Third-party Collection
Return to top
• add
DLP network, storage, scans and privacy tools can be used to identify security and
privacy risks to personal information. They can also be used to monitor for
compliance with internal policies and procedures, and block e-mail or file
transfers based on the data category and definitions.
Return to top
• add
Ad Exchange
• add
Ad Network
A company that serves as a broker between a group of publishers and a group of
advertisers. Networks traditionally aggregate unsold inventory from publishers in
order to offer advertisers a consolidated and generally less expensive pool of
impressions, but they can have a wide variety of business models and clients.
Return to top
• add
AdChoices
• add
• add
Administrative Purpose
• add
• add
Adverse Action
Under the Fair Credit Reporting Act, the term “adverse action” is defined very
broadly to include all business, credit and employment actions affecting
consumers that can be considered to have a negative impact, such as denying or
canceling credit or insurance, or denying employment or promotion. No adverse
action occurs in a credit transaction where the creditor makes a counteroffer that
is accepted by the consumer. Such an action requires that the decision maker
furnish the recipient of the adverse action with a copy of the credit report leading
to the adverse action.
Associated law(s): FCRA
Return to top
• add
A process of software system and product design that incorporates new system
requirements during the actual creation of the system, as opposed to the Plan-
Driven Development Model. Agile development takes a given project and focuses
on specific portions to develop one at a time. An example of Agile development is
the Scrum Model.
Associated term(s): Plan-Driven Development Model, User Stories, SRS
Return to top
• add
Alberta PIPA
A privacy law in the Canadian province of Alberta, similar to PIPEDA, that came
into force in 2004. Unlike PIPEDA, these acts clearly apply to employee
information.
Link to text of law: Alberta PIPA
Associated law(s): PIPEDA
Return to top
• add
Algorithms
• add
• add
A U.S. law that bars discrimination against qualified individuals with disabilities.
Link to text of law: Americans with Disabilities Act
Acronym(s): ADA
Return to top
• add
• add
Annual Reports
The requirement under the General Data Protection Regulation that the
European Data Protection Board and each supervisory authority periodically
report on their activities. The supervisory authority report should include
infringements and the activities that the authority conducted under their Article
58(2) powers. The EDPB report should include guidelines, recommendations,
best practices and binding decisions. Additionally, the report should include the
protection of natural persons with regard to processing in the EU and, where
relevant, in third countries and international organisations. The report shall be
made public and be transmitted to the European Parliament, to the Council and
to the Commission.
Associated law(s): EU Data Protection Directive
Return to top
• add
Anonymization
The process in which individually identifiable data is altered in such a way that it
no longer can be related back to a given individual. Among many techniques,
there are three primary ways that data is anonymized. Suppression is the most
basic version of anonymization and it simply removes some identifying values
from data to reduce its identifiability. Generalization takes specific identifying
values and makes them broader, such as changing a specific age (18) to an age
range (18-24). Noise addition takes identifying values from a given data set and
switches them with identifying values from another individual in that data set.
Note that all of these processes will not guarantee that data is no longer
identifiable and have to be performed in such a way that does not harm the
usability of the data.
Associated law(s):Anonymous Data, De-Identification, Mircodata Sets, Re-
identification
Return to top
• add
Anonymous Information
In contrast to personal data, anonymous information or data is not related to an
identified or an identifiable natural person and cannot be combined with other
information to re-identify individuals. It has been rendered unidentifiable and, as
such, is not protected by the GDPR.
Associated term(s): Pseudonymous Data, De-Identification, Re-Identification
Return to top
• add
Anthropomorphism
• add
Anti-discrimination Laws
• add
• add
Ability to encrypt specific fields of data; specifically sensitive data such as credit
cards numbers or health-related information.
Return to top
• add
Application-Layer Attacks
• add
Appropriate Safeguards
• add
• add
Appropriation
• add
The Article 29 Working Party (WP29) was a European Union organization that
functioned as an independent advisory body on data protection and privacy and
consisted of the collected data protection authorities of the member states. It was
replaced by the similarly constituted European Data Protection Board (EDPB) on
May 25, 2018, when the General Data Protection Regulation (GDPR) went into
effect.
Acronym(s): WP29
Return to top
• add
Artificial Intelligence
• add
Assess
The first of four phases of the privacy operational life cycle; provides the steps,
checklists and processes necessary to assess any gaps in a privacy program as
compared to industry best practices, corporate privacy policies, applicable privacy
laws, and objective-based privacy program frameworks.
Associated term(s): Privacy Operational Life Cycle; Protect; Sustain; Respond
Return to top
• add
Asymmetric Encryption
A form of data encryption that uses two separate but related keys to encrypt data.
The system uses a public key, made available to other parties, and a private key,
which is kept by the first party. Decryption of data encrypted by the public key
requires the use of the private key; decryption of the data encrypted by the private
key requires the public key.
Associated term(s): Symmetric Encryption, Encryption
Return to top
• add
• add
High-level, five-phase audit approach. The steps include: Audit Planning; Audit
Preparation; Conducting the Audit; Reporting; and Follow-up.
Return to top
• add
Audit Trail
• add
Authentication
The process by which an entity (such as a person or computer system) determines
whether another entity is who it claims to be.
Associated term(s): Authorization
Return to top
• add
Authorization
• add
• add
Automated Processing
• add
Availability
Data is "available" if it is accessible when needed by the organization or data
subject. The General Data Protection Regulation requires that a business be able
to ensure the availability of personal data and have the ability to restore the
availability and access to personal data in a timely manner in the event of a
physical or technical incident.
Return to top
• add
Background Screening/Checks
• add
A U.S. federal law that requires U.S. financial institutions and money services
businesses (MSBs), which are entities that sell money orders or provide cash
transfer services, to record, retain and report certain financial transactions to the
federal government. This requirement is meant to assist the government in the
investigation of money laundering, tax evasion, terrorist financing and various
other domestic and international criminal activities.
Link to text of law: The Bank Secrecy Act (BSA)
Acronym(s): BSA
Associated term(s): Financial Record Keeping and Reporting Currency and
Foreign Transactions Act of 1970
Return to top
• add
Basel III
• add
BC PIPA
A privacy law in the Canadian province of British Columbia, similar to PIPEDA,
that came into force in 2004. Unlike PIPEDA, these acts clearly apply to
employee information.
Link to text of law: BC PIPA
Associated law(s): PIPEDA
Return to top
• add
Behavioral Advertising
• add
Big Data
A term used to describe the large data sets which exponential growth in the
amount and availability of data have allowed organizations to collect. Big data has
been articulated as “the three V’s: volume (the amount of data), velocity (the
speed at which data may now be collected and analyzed), and variety (the format,
structured or unstructured, and type of data, e.g. transactional or behavioral).
Associated term(s): Metadata
Return to top
• add
• add
• add
Biometrics
• add
Blackmail
• add
Bodily Privacy
One of the four classes of privacy, along with information privacy, territorial
privacy and communications privacy. It focuses on a person’s physical being and
any invasion thereof. Such an invasion can take the form of genetic testing, drug
testing or body cavity searches.
Return to top
• add
Breach Disclosure
• add
• add
Breach of confidentiality
• add
• add
Browser Fingerprinting
• add
Bundesdatenschutzgesetz-neu
Germany's federal data protection act, implementing the General Data Protection
Regulation. With the passage of the GDPR, it replaced a previous law with the
same name (hence "neu" in common parlance) and enhanced a series of other
acts mainly in areas of law enforcement and intelligence services. Furthermore,
the new version suggests a procedure for national data protection authorities to
challenge adequacy decisions of the EU Commission.
Link to text of law: Bundesdatenschutzgesetz
Return to top
• add
Bureau of Competition
• add
• add
Bureau of Economics
The United States’ Federal Trade Commission’s Bureau of Economics helps the
FTC evaluate the economic impact of its actions by providing economic analysis
for competition and consumer protection investigations and rulemakings, and
analyzing the economic impact of government regulations on businesses and
consumers.
Associated term(s): Bureau of Competition; Bureau of Consumer Protection
Return to top
• add
Business case
The starting point for assessing the needs of the privacy organization, it defines
the individual program needs and the ways to meet specific business goals, such
as compliance with privacy laws or regulations, industry frameworks, customer
requirements and other considerations.
Return to top
• add
• add
• add
Caching
The saving of local copies of downloaded content, reducing the need to repeatedly
download content. To protect privacy, pages that display personal
information should be set to prohibit caching.
Return to top
• add
The first state-level comprehensive privacy law in the U.S. The CCPA, which
comes into force in 2020, will apply broadly to businesses that collect personal
information from California consumers, imposing extensive transparency and
disclosure obligations. It also creates consumers’ rights to access their personal
data and to request its deletion; to opt-out of the sale of their personal data; and
to nondiscrimination on the basis of their exercising any of their CCPA rights.
Return to top
• add
A California state law that requires employers to notify applicants and employees
of their intention to obtain and use a consumer report.
Link to text of law: California Investigative Consumer Reporting Agencies Act
Acronym(s): CICRAA
Return to top
• add
• add
• add
• add
• add
Case Law
Principles of law that have been established by judges in past decisions. When
similar issues arise again, judges look to the past decisions as precedents and
decide the new case in a manner that is consistent with past decisions.
Return to top
• add
CCTV
• add
Census Bureau
The Census Bureau collects data to meet the nation’s statistical needs. Because
the data that the Census Bureau collects is often highly personal in nature, and
the Census Bureau depends on the trust of the individuals and businesses that
supply the data, privacy protection is a high priority.
Return to top
• add
Centralized governance
Privacy governance model that leaves one team or person responsible for privacy-
related affairs; all other persons or organizations will flow through this point.
Return to top
• add
Certification Mechanisms
• add
A treaty that consolidates human rights within the EU. The treaty states that
everyone has a right to protect their personal data, that data must be processed
for legitimate and specified purposes and that compliance is subject to control by
an authority.
Link to text of law: Charter of Fundamental Rights of the European Union
Return to top
• add
Charter Rights
Rights created by the Canadian Charter of Rights and Freedoms. They are
constitutional rights and thus are considered to be the most valued rights in
Canada. The Charter of Rights and Freedoms was made part of the Canadian
Constitution in 1982.
Link to text of law: Canadian Charter of Rights and Freedoms
Return to top
• add
Chat bots
• add
• add
• add
A U.S. federal law that applies to the operators of commercial websites and online
services that are directed to children under the age of 13. It also applies to general
audience websites and online services that have actual knowledge that they are
collecting personal information from children under the age of 13. COPPA
requires these website operators: to post a privacy notice on the homepage of the
website; provide notice about collection practices to parents; obtain verifiable
parental consent before collecting personal information from children; give
parents a choice as to whether their child’s personal information will be disclosed
to third parties; provide parents access and the opportunity to delete the child’s
personal information and opt out of future collection or use of the information,
and maintain the confidentiality, security and integrity of personal information
collected from children.
Acronym(s): COPPA
Link to text of law: 15 U.S.C. §§ 6501-6508
Return to top
• add
Choice
In the context of consent, choice refers to the idea that consent must be freely
given and that data subjects must have a genuine choice as to whether to provide
personal data or not. If there is no true choice it is unlikely the consent will be
deemed valid under the General Data Protection Regulation.
Associated term(s): Consent
Return to top
• add
CIA Triad
• add
CIO Council
The CIO Council is the principal interagency forum on Federal agency practices
for IT management. Originally established by Executive Order 13011 (Federal
Information Technology) and later codified by the E-Government Act of 2002,
the CIO Council’s mission is to improve practices related to the design,
acquisition, development, modernization, use, sharing and performance of
Federal Government information resources.
Return to top
• add
Ciphertext
Encrypted (enciphered) data.
Associated term(s): NIST SP 800-21
Return to top
• add
Cloud Computing
The provision of information technology services over the Internet. These services
may be provided by a company for its internal users in a "private cloud" or by
third-party suppliers. The services can include software, infrastructure (i.e.,
servers), hosting and platforms (i.e., operating systems). Cloud computing has
numerous applications, from personal webmail to corporate data storage, and can
be subdivided into different types of service models.
Return to top
• add
Co-regulatory Model
• add
Code audits
Provide analysis of source code that detect defects, security breaches or violations
within a technology ecosystem.
Return to top
• add
Code reviews
Generally in-person meeting organized by developers who authored the code. The
review may consist of a reader, moderator and privacy specialist.
Return to top
• add
Codes of Conduct
• add
Collection Limitation
• add
Commercial Activity
• add
Any form of electronic messaging, including e-mail, SMS text messages and
messages sent via social networking about which it would be reasonable to
conclude its purpose is to encourage participation in a commercial activity.
Examples include electronic messages that offer to purchase, sell, barter or lease
products, goods, services, land or an interest or right in land; offers to provide a
business, investment or gaming opportunity; advertises or promotes anything
previously mentioned.
Acronym(s): CEM
Return to top
• add
Common Law
Unwritten legal principles that have developed over time based on social customs
and expectations.
Return to top
• add
Communications Privacy
One of the four classes of privacy, along with information privacy, bodily privacy
and territorial privacy. It encompasses protection of the means of
correspondence, including postal mail, telephone conversations, electronic e-mail
and other forms of communicative behavior and apparatus.
Return to top
• add
Completeness Arguments
Used as a means of assuring compliance with privacy rules and policies in the
design of new software systems. Completeness arguments take privacy rules and
compare them to the system requirements that have been used to design a new
software system. By pairing privacy rules with specific system requirements,
necessary technical safeguards can be accounted for, preventing the software
from being designed in such a way that would violate privacy policies and
regulations.
Associated term(s): SRS, User Stories, Plan-driven Development Model, Agile
Development Model
Return to top
• add
Comprehensive Laws
Laws that govern the collection, use and dissemination of personal information in
the public and private sectors.
Associated term(s): Omnibus Laws
Return to top
• add
Computer Forensics
• add
Requires agencies that match data among agency systems granting financial
benefits to publicly disclose that matching and explain its scope.
Return to top
• add
Concept of Operations
• add
Confidentiality
• add
Confirmed Opt-In
• add
Consent
• add
This privacy requirement is one of the fair information practices. In the General
Data Protection Regulation, however, consent is specifically one of the legal bases
for processing personal data. According to the GDPR, for consent to be valid, it
must be: clearly distinguishable from other matters, intelligible, and in clear and
plain language; freely given; as easy to withdraw as it was to provide; specific;
informed; and unambiguous. Further, it must be a positive, affirmative action
(e.g., checking opt-in or choosing technical settings for web applications), with
pre-ticked boxes expressly not allowed. For certain special categories of data, as
outlined in Article 9, explicit consent is required for processing, a higher standard
than unambiguous consent.
Return to top
• add
Consent Decree
• add
Consistency Mechanism
• add
• add
Consumer Report
As defined in the U.S. Fair Credit Reporting Act: Any written, oral, or other
communication of any information by a consumer reporting agency bearing on a
consumer's credit worthiness, credit standing, credit capacity, character, general
reputation, personal characteristics, or mode of living which is used or expected
to be used or collected in whole or in part for the purpose of serving as a factor in
establishing the consumer's eligibility for (1) credit or insurance to be used
primarily for personal, family, or household purposes, or (2) employment
purposes, or (3) other purposes authorized under section 604. The term does not
include any (A) any report containing information solely as to transactions or
experiences between the consumer and the person making the report; (B)
authorization or approval of a specific extension of credit directly or indirectly by
the issuer of a credit card or similar device; or (C) report in which a person who
has been requested by a third party to make a specific extension of credit directly
or indirectly to a consumer conveys his decision with respect to such request, if
the third party advises the consumer of the name and address of the person to
whom the request was made and such person makes the disclosures to the
consumer required under section 615.
Associated term(s): Credit Reporting Agency
Associated law(s): Fair Credit Reporting Act
Return to top
• add
Any person or entity that complies or evaluates personal information for the
purpose of furnishing consumer reports to third parties for a fee.
Acronym(s): CRAs
Associated term(s): Credit Reporting Agency
Return to top
• add
• add
Content Data
The text, images, etc., contained within any communication message, such as an
email, text, or instant message on any given communications platform.
Specifically used often to distinguish from metadata (see Metadata). The ePrivacy
Directive and draft ePrivacy Regulation protect the confidentiality of content
data.
Return to top
• add
The servers that contain most or all of the visible elements of a web page and that
are contacted to provide those elements. In the realm of advertising, a general ad
server is contacted after a webpage is requested, that ad server looks up any
known information on the user requesting to access the webpage.
Return to top
• add
• add
Context of authority
Control over the access to resources on a network is based on the context in which
the employee is connected to the network.
Return to top
• add
Contextual Advertising
The most used form of targeted advertising on the internet. The content of the ad
relies on the content of the webpage or the query entered by a user.
Associated term(s): Behavioral Advertising, Demographic Advertising, Premium
Advertising, Psychographic Advertising, Remnant Advertising.
Return to top
• add
Contextual Integrity
• add
Contractual Clauses
• add
A system that standardizes and simplifies the way the executive branch handles
unclassified information that requires safeguarding or dissemination controls,
pursuant to and consistent with applicable law, regulations, and government-
wide policies. The program emphasizes the openness and uniformity of
government-wide practices. Its purpose is to address the current inefficient and
confusing patchwork that leads to inconsistent marking and safeguarding as well
as restrictive dissemination policies, which are often hidden from public view.
Acronym(s): CUI
Return to top
• add
Convention 108
Convention 108 is a legally binding international instrument that requires
signatory countries to take the necessary steps in their domestic legislation to
apply the principles it lays down ensuring fundamental human rights with regard
to the processing of personal information.
Link to text of law: The Convention for the Protection of Individuals with Regard
to Automatic Processing of Personal Data
Return to top
• add
Cookie
A small text file stored on a client machine that may later be retrieved by a web
server from the machine. Cookies allow web servers to keep track of the end
user’s browser activities, and connect individual web requests into a session.
Cookies can also be used to prevent users from having to be authorized for every
password protected page they access during a session by recording that they have
successfully supplied their username and password already. Cookies may be
referred to as "first-party" (if they are placed by the website that is visited) or
"third-party" (if they are placed by a party other than the visited website).
Additionally, they may be referred to as "session cookies" if they are deleted when
a session ends, or "persistent cookies" if they remain longer. Notably, the General
Data Protection Regulation lists this latter category, so-called "cookie identifiers,"
as an example of personal information. The use of cookies is regulated both by the
GDPR and the ePrivacy Directive (see Cookie Directive).
Associated term(s): First-Party Cookie, Persistent Cookie, Third-Party Cookie,
Tracking Cookie, Web Cookie
Return to top
• add
Cookie Directive
• add
Cooperation
Part of the consistency mechanism (see Consistency Mechanism) of the General
Data Protection Regulation, cooperation is required between supervisory
authorities when working with controllers or processors handling the personal
data of data subjects in multiple member states. This is often referred to as the
"one-stop shop," whereby a lead supervisory authority works with the supervisory
authorities of other member states with affected data subjects.
Return to top
• add
A case in which the European Court of Human Rights held that monitoring an
applicant's email at work was contrary to Article 8 of the Convention on Human
Rights.
Link to case: Copland v. United Kingdom
Return to top
• add
• add
Costeja
Shorthand for the case of Google Spain v AEPD and Mario Costeja González,
where Costeja successfully sued Google Spain, Google Inc. and La Vanguardia
newspaper. When the Court of Justice of the EU ruled that Google Spain must
remove the links to the article, the "right to be forgotten" (see Right To Be
Forgotten) was effectively established in the European Union. The General Data
Protection Regulation subsequently more formally granted data subjects the right
to deletion in certain circumstances.
Return to top
• add
Council of Europe
The Council of Europe, launched in 1949, is a human rights organization with 47
member countries, including the 28 member states of the European Union. The
members have all signed the European Convention on Human rights and are
subject to the European Court of Human Rights. The Council's Convention 108
(see Convention 108) was the first legally binding international agreement to
protect the human right of privacy and data protection.
Return to top
• add
A council of ministers from the 28 member states of the European Union, this is
the main decision-making body of the EU, with a central role in both political and
legislative decisions. The council was established by the treaties of the 1950s,
which laid the foundations for the EU, and works with the European Parliament
to create EU law.
Link to: Council of the European Union
Associated term(s): Council of Ministers
Return to top
• add
Coupling
• add
The Court of Justice is the judicial body of the EU that makes decisions on issues
of EU law and enforces European decisions either in respect to actions taken by
the European Commission against a member state or actions taken by individuals
to enforce their rights under EU law. Based in Luxembourg, the Court was set up
in 1951, and was originally named the Court of Justice of the European
Communities. The court is frequently confused with the European Court of
Human Rights (ECHR), which oversees human rights laws across Europe,
including in many non-EU countries, and is not linked to the EU institutions.
Acronym(s): CJEU
Link to: Court of Justice of the European Union
Return to top
• add
Credit Freeze
• add
Under the Fair Credit Reporting Act, any organization that regularly engages in
assembling or evaluating consumer credit information or other information on
consumers for the purpose of furnishing consumer reports to third parties for a
fee.
Acronym(s): CRA
Associated term(s): Consumer reporting agency
Associated law(s): FCRA
Return to top
• add
• add
Transfers of personal data to any country outside the European Economic Area
(EEA) may only take place subject to the condition that the third country ensures
an adequate level of protection for the personal data as determined by the
European Commission. It also applies to onward transfers — from one third
country or international organisation to another (outside the EEA). In the
absence of an adequacy finding, organizations must use other mechanisms, such
as binding corporate rules, contractual clauses, or certification, for lawful
transfer.
Return to top
• add
Cross-site Scripting
Code injected by malicious web users into web pages viewed by other users.
Acronym(s): XSS
Return to top
• add
Cryptography
• add
Cryptosystem
• add
The Canadian Standards Association (CSA) ten privacy principles are based on
the OECD Guidelines and serve as the basis of Canada’s PIPEDA.
Associated term(s): Canadian Standards Association
Associated law(s): PIPEDA
Return to top
• add
Current baseline
“As-is” data privacy requirements; the current environment and any protections,
policies, and procedures currently deployed.
Return to top
• add
Customer Access
• add
The consolidation and managing of customer information in all forms and from
all sources allowable. CDI is a vital component of customer relationship
management.
Acronyms: CDI
Associated term(s): Customer Relationship Management
Return to top
• add
Customer Information
• add
• add
Cyberbullying
• add
Dark patterns
• add
Data Aggregation
Taking Individual data sets and combining them to statistically analyze data
trends while protecting individual privacy by using groups of individuals with
similar characteristics rather than isolating one individual at a time. To effectively
aggregate data so that it cannot be re-identified (or at least make it difficult to do
so) the data set should: (1) have a large population of individuals, (2) Categorized
to create broad sets of individuals, and; (3) not include data that would be unique
to a single individual in a data set.
Associated term(s): De-identification, Re-identification, Pseudonymous
Data, Anonymous Information, Identifiability, Identifiers.
Return to top
• add
Data Breach
The unauthorized acquisition of computerized data that compromises the
security, confidentiality, or integrity of personal information maintained by a
data collector. Breaches do not include good faith acquisitions of personal
information by an employee or agent of the data collector for a legitimate purpose
of the data collector—provided the personal information is not used for a purpose
unrelated to the data collector's business or subject to further unauthorized
disclosure.
Associated term(s): Breach, Privacy Breach (Canadian)
Return to top
• add
• add
• add
Data Brokers
Entities that collect, aggregate and sell individuals’ personal data, derivatives and
inferences from disparate public or private sources.
Return to top
• add
Data Centers
Facilities that store, manage and disseminate data and house a network’s most
critical systems. Data centers can serve either as a centralized facility for a single
organization’s data management functions or as a third-party provider for
organization’s data management needs.
Return to top
• add
Data Classification
A scheme that provides the basis for managing access to, and protection of, data
assets.
Return to top
• add
Data Controller
The natural or legal person, public authority, agency or any other body which
alone or jointly with others determines the purposes and means of the processing
of personal data. Where the purposes and means of such processing are
determined by EU or member state law, the controller or the specific criteria for
its nomination may be provided for by EU or member state law.
Associated term(s): Data Processor
Return to top
• add
Data Elements
A unit of data that cannot be broken down further or has a distinct meaning. This
may be a date of birth, a numerical identifier, or location coordinates. In the
context of data protection, it is important to understand that data elements in
isolation may not be personal data but, when combined, become personally
identifiable and therefore personal data.
Return to top
• add
• add
Under the Privacy Act, federal agencies using computerized means to match data
between electronic federal privacy record systems, or to match data from any
federal system with non federal records, are required to create a DIB composed of
senior officials and the agency’s inspector general. The DIB shall, among other
things: review, approve and maintain all matching programs; review all existing
matching programs annually to determine compliance with laws, regulations,
guidelines and agreements, and; assess the cost and benefits of the agreements.
Link to law: Privacy Act
Acronym(s): DIB
Associated term(s): Data Matching
Return to top
• add
Data Inventory
• add
• add
Term used to describe both the strategy for ensuring end users do not
disseminate sensitive information, whether intentionally or unintentionally, to
outside ineligible sources and the software products that aid network
administrators in controlling what data end users can transfer.
Acronym: DLP
Return to top
• add
Data Masking
• add
Data Matching
• add
The idea that one should only collect and retain that personal data which is
necessary.
Link to text of law: Directive 95/46/EC
Link to text of law: Regulation EC (No) 45/2001
Return to top
• add
Data controllers must only collect and process personal data that is relevant,
necessary and adequate to accomplish the purposes for which it is processed.
Return to top
• add
Data Portability
• add
Data Processing
• add
Data Processor
Data Protection
The rules and safeguards applying under various laws and regulations to personal
data about individuals that organizations collect, store, use and disclose. “Data
protection” is the professional term used in the EU, whereas in the U.S. the
concept is generally referred to as “information privacy.” Importantly, data
protection is different from data security, since it extends beyond securing
information to devising and implementing policies for its fair use.
Return to top
• add
• add
• add
• add
• add
• add
• add
• add
While the title of data protection officer has long been in use, particularly in
Germany and France, the General Data Protection Regulation introduced a new
legal defintion of a DPO with specific tasks. Certain organizations, particularly
those that process personal data as part of their business model or those who
process special categories of data as outlined in Article 9, are obligated to
designate a DPO on the basis of professional qualities and, in particular, expert
knowledge of data protection law and practices. The DPO has a variety of
mandated tasks, including communication with the supervisory authority,
conducting DPIAs, and advising the organization on the mandates of the GDPR
and how to comply with it.
Return to top
• add
• add
Article 5 of the General Data Protection Regulation lists the principles as such:
Lawfulness, fairness and transparency; Purpose limitation; Data minimisation;
Accuracy; Storage limitation; Integrity and confidentiality.
Return to top
• add
Data Quality
A fair information practices principle, it is the principle that personal data should
be relevant to the purposes for which it is to be used, and, to the extent necessary
for those purposes, should be accurate, complete and kept up-to-date. The quality
of data is judged by four criteria: Does it meet the business needs?; Is it
accurate?; Is it complete?, and is it recent? Data is of an appropriate quality if
these criteria are satisfied for a particular application.
Return to top
• add
One of the General Data Protection Regulation's explicitly stated data protection
principles, personal data should be relevant to the purposes for which it is to be
used, and, to the extent necessary for those purposes, should be accurate,
complete and kept up-to-date. The quality of data is judged by four criteria: Does
it meet the business needs?; Is it accurate?; Is it complete?, and is it recent? Data
is of an appropriate quality if these criteria are satisfied for a particular
application.
Return to top
• add
Passed in response to the increased use of the Internet by U.S. federal agencies,
the act was designed to ensure the quality of information released by agencies by
establishing four major requirements: (1) Office of Management and Budget was
to issue guidelines "ensuring and maximizing the quality, objectivity, utility and
integrity" of disseminated information; (2) agencies must issue their own sets of
information quality guidelines; (3) agencies must establish administrative
mechanisms for persons to correct erroneous information about themselves; (4)
agencies must annually report to OMB regarding the number, nature and
handling of complaints.
Link to text of law: Data Quality Act of 2000
Acronym(s): DQA
Associated term(s): Information Quality
Return to top
• add
Data Recipient
• add
The now-defunct Data Retention Directive was designed to align the rules on data
retention across the EU member states in order to ensure the availability of traffic
and location data for serious crime and antiterrorism purposes. The Data
Retention Directive is no longer part of EU law, although member states retain
competence to adopt their own national data retention laws under Article 15(1) of
the ePrivacy Directive (2002/58/EC) provided that those laws comply with the
fundamental rights principles that form part of EU law and the CJEU ruling that
struck down the Data Retention Directive. Accordingly, EU member states have
introduced draft legislative amendments or implemented national data retention
laws at an individual country level.
Link to text of law: Directive 2006/24/EC
Return to top
• add
Data schema
• add
Data Subject
• add
De Novo
• add
De-identification
• add
Decentralized Governance
Also known as “local governance,” this governance model involves the delegation
of decision-making authority down to the lower levels in an organization, away
from and lower than a central authority. There are fewer tiers in the
organizational structure, wider span of control and bottom-to-top flow of
decision-making and ideas.
Associated term(s): Local Governance
Return to top
• add
In the context of U.S. federal law, a term associated with corporate entities who
mislead or misrepresent products or services to consumers and customers. These
practices are regulated in the U.S. by the Federal Trade Commission at the federal
level and typically by an attorney general or office of consumer protection at the
state level. Law typically provides for both enforcement by the government to
stop the practice and individual actions for damages brought by consumers who
are hurt by the practices.
Associated term(s): Unfair Trade Practices
Link to text of law: U.S. Federal Trade Commission Act
Return to top
• add
Declared Data
• add
Deep learning
• add
Defamation
• add
A company that allows advertising clients to buy digital media on several different
selling systems, or exchanges, through one interface.
Return to top
• add
Demographic Advertising
Return to top
• add
Derogation
In the context of European Union legislation interacting with member state law, a
derogation is a place in an EU-wide regulation where individual member states
are left to make their own law or have the option to deviate. A derogation can also
simply refer to an exception to a certain basic rule or principle.
Return to top
• add
Design patterns
• add
Used in combination with value-sensitive design. The design thinking process has
five phases: empathize, define, ideate, prototype and test.
Return to top
• add
Differential identifiability
Setting parameters that limits the confidence that any particular individual has
contributed to an aggregated value.
Return to top
• add
Digital Advertising Alliance
• add
Digital Fingerprinting
The use of log files to identify a website visitor. It is often used for security and
system maintenance purposes. Log files generally include: the IP address of the
visitor; a time stamp; the URL of the requested page or file; a referrer URL, and
the visitor’s web browser, operating system and font preferences. In some cases,
combining this information can be used to “fingerprint” a device. This more
detailed information varies enough among computing devices that two devices
are unlikely to be the same. It is used as a security technique by financial
institutions and others initiating additional security assurances before allowing
users to log on from a new device. Some privacy enforcement agencies; however,
have questioned what would constitute sufficient notice and consent for digital
fingerprinting techniques to be used for targeted advertising.
Associated term(s): Biometric Data, Authentication, Authorization
Return to top
• add
The management of access to and use of digital content and devices after sale.
DRM is often associated with the set of access control (denial) technologies.
These technologies are utilized under the premise of defending copyrights and
intellectual property but are considered controversial because they may often
restrict users from utilizing digital content or devices in a manner allowable by
law.
Acronym(s): DRM
Return to top
• add
Digital Signature
• add
Direct Marketing
• add
In the context of data protection law, direct marketing can be defined as personal
data processed to communicate a marketing or advertising message. This
definition includes messages from commercial organisations, as well as from
charities and political organisations. While direct marketing is offered in the
General Data Protection Regulation as an example of processing for the
legitimate interest of an organization, it also says the data subject shall have the
right to object at any time to processing of personal data concerning him or her
for such marketing, which includes profiling to the extent that it is related to such
direct marketing.
Return to top
• add
A continuation of policy directives for the European Union Member States as set
forth in the Data Protection Directive. It has been amended by the Cookie
Directive 2009/136EC, which added a requirement that all websites using
tracking cookies obtain user consent unless the cookie is “strictly necessary for
the delivery of a service requested by the use.” This policy recognizes the
importance of cookies for the functioning of modern websites while still making
users aware of any tracking the user may not want to participate in.
Link to text of law: Directive on Privacy and Electronic Communications Act
2002/58EC
Acronyms: ePrivacy Directive, Cookie Directive
Associated term(s): Data Protection Directive
Return to top
• add
Disassociability
• add
Disclosure
• add
• add
Dispute Resolution
• add
Distortion
Spreading false and inaccurate information about an individual.
Return to top
• add
• add
Do Not Track
• add
Do Not Track
A catch-all term for various technologies and browser settings designed to allow
data subjects to indicate their objection to tracking by websites. Years of effort, by
the W3C and other organizations, to create an official Do Not Track standard for
HTTP headers has of yet led to naught.
Acronym(s): DNT
Return to top
• add
Grants the authority to the Federal Trade Commission to create the National Do-
Not-Call Registry in the United States. The registry is open to all consumers,
allowing them to place their phone numbers on a national list which makes it
illegal for telemarketers to make unsolicited calls to those numbers, the only
exceptions being for political activities and non-profit organizations. Originally
consumers would have to re-register their numbers with the FTC every five years
for continued prevention, but the Do-Not-Call Improvement Act of
2007 extended registration indefinitely. Violations can be enforced by the
FTC, Federal Communications Commission, and state attorneys general with up
to a $16,000 fine per violation.
Associated term(s): Federal Trade Commission, Federal Communication
Commission, Do-Not-Call Improvement Act, National Do-Not-Call Registry
Return to top
• add
• add
In 2010 the U.S. Congress passed the Dodd-Frank Act to reorganize and improve
financial regulation. Among other reforms it put in place, the Dodd-Frank Act
created the Consumer Financial Protection Bureau and granted it rule-making
authority over FCRA and GLBA as well as a few other regulations.
Link to text of law: Dodd-Frank Wall Street Reform and Consumer Protection Act
Associated law(s): Gramm-Leach-Bliley Act, Fair Credit Reporting Act, Consumer
Financial Protection Bureau
Return to top
• add
A court case in which the Court of Appeal of the United Kingdom narrowed the
definition of personal data under the Data Protection Act of 1998. It established a
two-stage test; the information must be biographical in a significant sense and
the individual must be the focus of the information.
Link to text of case: Durant v. Financial Services Authority
Return to top
• add
E-Authentication
• add
E-Commerce Websites
Websites with online ordering capabilities have special privacy advantages and
risks. Unlike other web advertisers, E-Commerce websites have direct access to
information regarding user purchases and payment information. While creating a
great opportunity for targeted advertising, it also puts extra onus on these
websites to protect user information.
Return to top
• add
E-Government Act
A U.S. federal law that, among other things, requires federal agencies to conduct
Privacy Impact Assessments on new or substantially revised information
technology.
Link to text of law: E-Government Act
Associated law(s): FISMA
Return to top
• add
• add
Electronic Communications Network
• add
The collective name of the Electronic Communications Privacy and Stored Wire
Electronic Communications Acts, which updated the Federal Wiretap Act of 1968.
ECPA, as amended, protects wire, oral and electronic communications while
those communications are being made, are in transit, and when they are stored
on computers. The act applies to e-mail, telephone conversations and data stored
electronically. The USA PATRIOT Act and subsequent federal enactments have
clarified and updated ECPA in light of the ongoing development of modern
communications technologies and methods, including easing restrictions on law
enforcement access to stored communications in some cases.
Link to text of law: Electronic Communications Privacy Act of 1986
Acronym(s): ECPA
Associated law(s): Stored Communications Act, Stored Wire Electronic
Communications Act, USA Patriot Act
Return to top
• add
Any service which provides to users thereof the ability to send or receive wire or
electronic communications.
Acronym(s): ECS
Return to top
• add
Electronic Discovery
Prior to trial, information is typically exchanged between parties and their
attorneys. E-discovery requires civil litigants to turn over large volumes of a
company’s electronic records in litigation.
Associated term(s): Electronically stored information (ESI), Sedona Conference
Associated law(s): Federal Rules of Civil Procedure
Return to top
• add
• add
Electronic Surveillance
• add
Employee Information
• add
Employee Personal Data
• add
Employment at Will
• add
Encryption
• add
Encryption Key
• add
End-User License Agreement
A contract between the owner of the software application and the user. The user
agrees to pay for the use of the software and promises to comply with certain
restrictions on that use.
Acronym(s): EULA
Associated term(s): Terms of Service
Return to top
• add
Enterprise Architecture
A conceptual outline, blueprint, or diagram that defines the structure and the
operation of an organization, normally in the context of developing a strategy for
the realization of current and future goals or objectives.
Acronym(s): EA
Associated term(s): IT Architecture
Return to top
• add
• add
ePrivacy Directive
A sectoral privacy directive for European Union Member States, which applies to
the digital industry. Among other provisions, the ePrivacy Directive requires
websites to obtain consumer consent before placing cookies for marketing
purposes. The EU is currently considering reform of the ePrivacy Directive.
Return to top
• add
Equal Employment Opportunity Commission, The
• add
Erasure
Article 17(1) of the GDPR establishes that data subjects have the right to erasure
of their personal data if: the data is no longer needed for its original purpose and
no new lawful purpose exists; the lawful basis for the processing is the data
subject’s consent, the data subject withdraws that consent, and no other lawful
ground exists; the data subject exercises the right to object, and the controller has
no overriding grounds for continuing the processing; the data has been processed
unlawfully; or erasure is necessary for compliance with EU law or the national
law of the relevant member state.
Return to top
• add
• add
• add
Establishment
Establishment implies the effective and real exercise of activity through stable
arrangements. The legal form of such arrangements, whether through a branch or
a subsidiary with a legal personality, is not the determining factor in that respect
(see Main Establishment).
Return to top
• add
The EU Data Protection Directive (95/46/EC) was replaced by the General Data
Protection Regulation in 2018. The Directive was adopted in 1995, became
effective in 1998 and was the first EU-wide legislation that protected individuals’
privacy and personal data use.
Associated term(s): Data Protection Directive
Return to top
• add
• add
An agreement between the European and United States, invalidated by the Court
of Justice of the European Union in 2015, that allowed for the legal transfer of
personal data between the EU and U.S. in the absence of a comprehensive
adequacy decision for the United States (see Adequacy). It was replaced by the
EU-U.S. Privacy Shield in 2016 (see Privacy Shield).
Return to top
• add
Created in 2016 to replace the invalidated EU-U.S. Safe Harbor agreement, the
Privacy Shield is an adequacy agreement that allows for the transfer of personal
data from the EU to the United States for companies participating in the
program. Only those companies that fall under the jurisdiction of the U.S. Federal
Trade Commission may certify to the Shield principles and participate, which
notably excludes health care, financial services, and non-profit institutions.
Return to top
• add
European Commission
The executive body of the European Union. Its main function is to implement the
EU’s decisions and policies, along with other functions. It initiates legislation in
the EU, proposing initial drafts that are then undertaken by the Parliament and
Council of the European Union. It is also responsible for making adequacy
determinations with regard to data transfers to third-party countries.
Return to top
• add
• add
European Council
The European Council is the collection of heads of states of European Union
member states. It provides general political direction for the EU and does not
exercise legislative functions.
Link to: European Council
Return to top
• add
• add
The successor to the Article 29 Working Party, it consists of the heads of the
supervisory authorities of the member states and the European Data Protection
Supervisor (see European Data Protection Supervisor), and the Commission is
entitled to send a delegate to its meetings. The EDPB’s role is to ensure the
consistent application of the Regulation and, in addition to supporting
cooperation between the regulators and applying the consistency mechanism (see
Consistency Mechanism), it shall publish advice, guidance, recommendations and
best practices. The supervisory authorities elect a chairperson, with certain
powers, from amongst their membership.
Acronym(s): EDPB
Return to top
• add
The data protection regulator for the European Union as an entity, ensuring the
EU institutions, such as the Parliament, Commission, and Council of the
European Union, protect the rights and freedoms of data subjects. The EDPS acts
as secretariat to the European Data Protection Board (see European Data
Protection Board).
Link to: European Data Protection Supervisor
Acronym(s): EDPS
Associated law(s): Regulation (EC) No 45/2001
Return to top
• add
An economic region that includes the European Union (EU) and Iceland, Norway
and Liechtenstein—which are not official members of the EU but are closely
linked by economic relationship. Non-EU countries in the EEA are required to
adopt EU legislation regarding the single market.
Link to: European Economic Area
Acronym(s): EEA
Return to top
• add
Created by the Treaty of Rome, the EEC was a predecessor to the European Union
that promoted a single economic market across Europe.
Link to text of treaty: European Economic Community
Associated term(s): The Common Market
Return to top
• add
European Parliament
• add
European Union
The European Union replaced the EEC, which was created by the Treaty of Rome
and first promoted a single economic market across Europe. The EU currently
comprises 28 member states: Austria, Belgium, Bulgaria, Croatia, Cyprus, Czech
Republic, Denmark, Estonia, Finland, France, Germany, Greece, Hungary,
Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta, Netherlands, Poland,
Portugal, Romania, Slovakia, Slovenia, Spain, Sweden and the United Kingdom.
The U.K. is currently slated to leave the European Union in March 2019.
Acronym(s): EU
Return to top
• add
Exclusion
• add
The order that provides information about the goals, direction, duties and
responsibilities with respect to the national intelligence effort and provides basic
information on how intelligence activities should be conducted. The executive
order states that agencies within the intelligence community are authorized to
collect, retain or disseminate information concerning United States persons only
in accordance with procedures established by the head of the agency concerned,
and must be approved by the attorney general.
Link to text of law: Executive Order 12333
Return to top
• add
Exposure
• add
• add
Extranet
• add
FAIR constructs a framework that breaks risk into the frequency of action and
magnitude of the violations.
Return to top
• add
Factortame
A 1989 case brought before the European Court of Justice which established the
precedence of EU law over national laws of member states in areas where the EU
has competence.
Link to decision: The Queen v Secretary of State for Transport, ex parte:
Factortame Ltd and others
Return to top
• add
Fair and Accurate Credit Transactions Act of 2003
An expansion of the Fair Credit Reporting Act which focuses on consumer access
and identity theft prevention. The act mandates that credit reporting
agencies allow consumers to obtain a free credit report once every twelve months.
Additionally, it allows consumers to request alerts when a creditor suspects
identity theft and gave the Federal Trade Commission (FTC) authority to
promulgate rules to prevent identity theft. The FTC used the authority to create
the Red Flags Rule.
Link to text of law: Fair and Accurate Credit Transactions Act of 2003
Acronym(s): FACTA, FACT Act
Associated term(s): Red Flags Rule
Associated law(s): Fair Credit Reporting Act
Return to top
• add
One of the oldest U.S. federal privacy laws still in force today. It was enacted in
1970 to mandate accurate and relevant data collection, give consumers the ability
access and correct their information, and limit the use of consumer reports to
permissible purposes, such as employment and extension of credit or insurance.
Link to text of law: The Fair Credit Reporting Act
Acronym(s): FCRA
Associated law(s): Fair and Accurate Credit Transactions Act of 2003 (FACTA)
Return to top
• add
(1) The Collection Limitation Principle. There should be limits to the collection of
personal data and any such data should be obtained by lawful and fair means and,
where appropriate, with the knowledge or consent of the data subject.
(2) The Data Quality Principle. Personal data should be relevant to the purposes
for which they are to be used and, to the extent necessary for those purposes,
should be accurate, complete and kept up-to-date.
(3) The Purpose Specification Principle. The purposes for which personal data are
collected should be specified not later than at the time of data collection and the
subsequent use limited to the fulfillment of those purposes or such others as are
not incompatible with those purposes and as are specified on each occasion of
change of purpose.
(4) The Use Limitation Principle. Personal data should not be disclosed, made
available or otherwise used for purposes other than those specified, except a) with
the consent of the data subject, or b) by the authority of law.
(5) The Security Safeguards Principle. Personal data should be protected by
reasonable security safeguards against such risks as loss or unauthorized access,
destruction, use, modification or disclosure of data.
(6) The Openness Principle. There should be a general policy of openness about
developments, practices and policies with respect to personal data. Means should
be readily available of establishing the existence and nature of personal data and
the main purposes of their use, as well as the identity and usual residence of the
data controller.
(7) The Individual Participation Principle. An individual should have the right:
a) to obtain from a data controller, or otherwise, confirmation of whether or not
the data controller has data relating to him;
b) to have data relating to him communicated to him, within a reasonable time, at
a charge, if any, that is not excessive; in a reasonable manner, and in a form that
is readily intelligible to him;
c) to be given reasons if a request made under subparagraphs (a) and (b) is
denied and to be able to challenge such denial; and
d) to challenge data relating to him and, if the challenge is successful, to have the
data erased, rectified, completed or amended;
(8) The Accountability Principle. A data controller should be accountable for
complying with measures which give effect to the principles stated above.
Acronym(s): FIPs
Return to top
• add
Fairness
• add
• add
• add
A federal law requiring agencies found of data mining to submit a yearly report to
Congress. The privacy office of that agency must be involved in producing the
report. The report will be made public and describe all of the agency’s data-
mining activity, goals and an assessment of the effectiveness of the data mining
activity.
Link to text of law: Federal Agency Data Mining Reporting Act
Return to top
• add
The FEA-SPP serves two functions in the integration of privacy and security risk-
management practices. First, it clearly articulates that while there is a symbiotic
relationship between security and privacy, these practices are not identical; they
are distinct practices, but intertwined. Second, the FEA-SPP lays the groundwork
for driving agency integration of privacy risk management into the fundamental
design of technical systems and technologies.
Link to text of law: Federal Enterprise Architecture Security and Privacy Profile
Acronym(s): FEA-SPP
Return to top
• add
• add
A U.S. federal law enacted as part of the E-Government Act of 2002. The act
requires each federal agency to develop, document and implement an agency-
wide program to provide information security for the data and data systems that
support the operations and assets of the agency, including those provided or
managed by another agency, contractor or other source. FISMA requires agency
program officials, chief information officers and inspectors general to conduct
annual reviews of the agency’s information security program and report the
results to Office of Management and Budget. OMB uses this data to assist in its
oversight responsibilities and to prepare this annual report to Congress on agency
compliance with the act. In FY 2008, federal agencies spent $6.2 billion securing
the government’s total information technology investment of approximately $68
billion or about 9.2 percent of the total information technology portfolio.
Link to text of law: Federal Information Security Management Act of 2002
Acronym(s): FISMA
Return to top
• add
The Federal Records Act requires the establishment of standards and procedures
to ensure efficient and effective records management. The objectives of the
Federal Records Act interact with federal privacy to: Ensure appropriate
maintenance of a record that allows access rights to subject of the record;
Minimize the collection of PII; Ensure the destruction of PII when there is no
longer a business, legal, or historical need for the record.
Link to text of law: Federal Records Act
Associated term(s): PII
Associated law(s): Privacy Act
Return to top
• add
The United States' primary consumer protection agency, the FTC collects
complaints about companies, business practices and identity theft under the FTC
Act and other laws that they enforce or administer. Importantly, the FTC brings
actions under Section 5 of the FTC Act, which prohibits unfair and deceptive
trade practices.
Acronym(s): FTC
Associated law(s): FTC Act
Return to top
• add
Section 5(a) of the FTC Act empowers the agency to enforce against “unfair or
deceptive acts or practices in or affecting commerce.” Over the past two decades,
the FTC has used this authority extensively to hold businesses to fair and
transparent privacy and security standards.
Return to top
• add
Federated identity
A model in which a person's identity is authenticated in a trusted centralized
service.
Return to top
• add
• add
A corporation that acts as a regulator for brokerage firms and exchange markets.
Its primary charge is to make sure that security exchange markets, such as the
New York Stock Exchange, operate fairly and honestly and to protect investors.
Although it is a non-governmental regulator, ultimately it is subject to the
regulations of the Securities and Exchange Commission along with the rest of the
security exchange industry.
Link to: FINRA
Acronym: FINRA
Associated law(s): Dodd-Frank Act, Gramm-Leach-Bliley Act
Return to top
• add
1989
After the savings and loans crisis of the 1980s, the U.S Congress passed FIRREA
to enable financial regulators to levy penalties up to $5,000,000 for failure to
comply with regulations. These penalties can be levied if a Financial institution
fails to comply with the information privacy requirements contained in GLBA.
Link to text of law: Financial Institutions Reform, Recovery, and Enforcement Act
of 1989
Acronym: FIRREA
Associated law(s): Gramm-Leach-Bliley Act
Return to top
• add
Japanese legislation aimed at the financial services sector that established cross-
sectional legislative framework for investor protections, enhanced disclosure
requirements, provided guidelines for the management of self-regulatory
operations by financial exchanges, and implemented strict countermeasures
against unfair trading.
Link to text of law: Financial Instruments and Exchange Law of Japan
Return to top
• add
First-Party Collection
A data subject provides personal data to the collector directly, through a form or
survey that is sent to the collector upon the data subject submitting the
information
Associated term(s): Active Collection, Passive Collection, Surveillance
Collection, Repurposing, Third-party Collection
Return to top
• add
See Metrics
Return to top
• add
Flash
Software that is used to add animation and other visual effects to web-based
content.
Return to top
• add
• add
A U.S. federal law that ensures citizen access to federal government agency
records. FOIA only applies to federal executive branch documents. It does not
apply to legislative or judicial records. FOIA requests will be fulfilled unless they
are subject to nine specific exemptions. Most states have some state level
equivalent of FOIA. The federal and most state FOIA statutes include a specific
exemption for personal information so that sensitive data (such as Social Security
numbers) are not disclosed.
Link to text of law: The Freedom of Information Act
Acronym(s): FOIA
Return to top
• add
Freely Given
The General Data Protection Regulation requires that consent be a freely given,
specific, informed and unambiguous indication of the data subject’s wishes by
which he or she, by a statement or by a clear affirmative action, signifies
agreement to the processing of personal data relating to him or her. The data
subject must have a genuine choice, must be able to refuse or withdraw consent
without fear of consequence. Where there is a power imbalance, as in an
employer-employee relationship, for example, it's likely that consent cannot be
freely given.
Return to top
• add
Frequency data
The number of times a data value occurs.
Return to top
• add
Specific details about how a system should work, what inputs create what
outputs, and design elements to be implemented. For example, “A system shall do
processing of personal information to create user profiles.”
Associated term(s): Plan-driven Development Model, Agile Development
Model, SRS, User Stories, Non-functional System Requirements
Return to top
• add
Gap Analysis
• add
• add
• add
• add
Geo-social patterns
Data from smartphones and other devices that provide information regarding
mobility and social patterns and behaviors. Individuals share information such as
emotions, opinions, experiences and locations; generating a data about human
activity via artificial intelligence and machine learning which allows for
meaningful patterns and trends to be surmised.
Return to top
• add
Geocoding
• add
Geofencing
Geofencing is the creation of virtual perimeters linked to the geographic position
of a mobile device. In the BYOD context, geofencing may be used to restrict
access to applications or sensitive information inside of or outside of specific
locations. For example, a company may be able to restrict access to potentially
risky applications on a personal device when the device is connected to the
company’s network or, conversely, restrict access to company resources when the
device is outside of the company’s network.
Return to top
• add
Geotagging
• add
Geotargeting
• add
GET Method
The GET and POST HTML method attributes specify how form data is sent to a
web page. The GET method appends the form data to the URL in name/value
pairs allowing passwords and other sensitive information collected in a form to be
visible in the browser’s address bar, and is thus less secure than the POST
method.
Associated term(s): POST Method
Return to top
• add
• add
An identifier that is one of a kind to a specific user. For example, biometric data
or a loginID for a social network.
Acronym(s): GUID
Associated term(s): Authentication, Authorization, Identifiability, Identifiers.
Return to top
• add
The Government in the Sunshine Act, 5 U.S.C. § 552b, generally requires multi-
member federal agencies; i.e., the FCC and SEC, to hold their meetings in public
and to give advance public notice of their meetings. The goal of the Sunshine Act
is to promote public access to information about the decision-making processes
of the federal government and to improve those processes by exposing them to
public view.
Link to text of law: 5 U.S.C. § 552b
Acronym(s): GSA
Return to top
• add
Gramm-Leach-Bliley Act
The commonly used name for The Financial Services Modernization Act of 1999.
The act re-organized financial services regulation in the United States and applies
broadly to any company that is “significantly engaged” in financial activities in
the U.S. In its privacy provisions, GLBA addresses the handling of non-
public personal information, defined broadly to include a consumer’s name and
address, and consumers’ interactions with banks, insurers and other financial
institutions. GLBA requires financial institutions to securely store personal
financial information; give notice of their policies regarding the sharing of
personal financial information, and give consumers the ability to opt-out of some
sharing of personal financial information.
Link to text of law: Gramm-Leach-Bliley Act
Acronym(s): GLBA
Return to top
• add
Haralambie v. Romania
The European Court of Human Rights decided in 2009 that Haralambie's Article
8 right to respect for private life and family life had been violated when the
applicant sought access to the secret service file on him drawn up in the days of
Communist rule in Romania and was made to wait six years. The court awarded
6,000 euros.
Link to case summary: Haralambie v. Romania
Return to top
• add
Harm Dimensions
• add
Hashing Functions
• add
• add
The
Enacted as part of the American Recovery and Reinvestment Act of 2009, the
HITECH Act, among other objectives, further addresses privacy and security
issues involving PHI as defined by HIPAA. The HITECH privacy provisions
include the introduction of categories of violations based on culpability that, in
turn, are tied to tiered ranges of civil monetary penalties. Its most noteworthy
elements elaborate upon breach notifications resulting from the use or disclosure
of information that compromises its security or privacy.
Link to text of law: HITECH Act
Associated term(s): EHR
Associated law(s): HIPAA
Return to top
• add
• add
Hide
Personal information is made un-connectable or un-observable to others.
Return to top
• add
How the system's part, both front end and back end work together to implement
the behaviors that a system should exhibit.
Return to top
• add
High-level design
How the system's part, both front end and back end work together to implement
the behaviors that a system should exhibit.
Return to top
• add
Homomorphic
• add
House of Commons
One of two chambers of the Canadian Parliament, along with the Senate.
Members of the House of Commons are elected at least every five years.
Return to top
• add
HTML
Hybrid Governance
This privacy governance model allows for a combination of centralized and local
governance. Typically seen when a large organization assigns a main individual
responsibility for privacy-related affairs, and the local entities then fulfill and
support the policies and directives from the central governing body.
Return to top
• add
Hyperlink
Linked graphic or text that is used to connect an end user to other websites, parts
of websites or web-enabled services. The URL of a web location is embedded in
the HTML code, so that when certain words or images are selected through the
web browser, the end user is transported to the destination website or page.
Return to top
• add
A content authoring language used to create web pages. Web browsers use HTML
to interpret and render visible and audible content from the web pages.
Document “tags” can be used to format and lay out web page content and to
“hyperlink”—connect dynamically—to other web content. Forms, links, pictures
and text may all be added with minimal commands. Headings are also embedded
into the text and are used by web servers to process commands and return data
with each request.
Acronym(s): HTML
Associated term(s): HTTP, HTTPS
Return to top
• add
A networking language that manages data packets over the Internet. It defines
how messages are formatted and transmitted over a TCP/IP network for websites.
Further, it defines what actions Web servers and web browsers take in response
to various commands.
Acronym(s): HTTP
Associated term(s): HTML, HTTPS
Return to top
• add
• add
Identifiability
• add
Identifiers
• add
Identifying Purposes
• add
Individual Access
• add
Individual Participation
It is fair information practices principle that an individual should have the right:
a) to obtain from a data controller, or otherwise, confirmation of whether or not
the data controller has data relating to them; b) to have data relating to them
communicated to them within a reasonable time; at a charge, if any, that is not
excessive; in a reasonable manner, and in a form that is readily intelligible to
them; c) to be given reasons if a request made under subparagraphs (a) and (b) is
denied, and to be able to challenge such denial; and d) to challenge data relating
to them and, if the challenge is successful, to have the data erased, rectified,
completed or amended.
Associated term(s): FIPs
Return to top
• add
Information Banks
• add
Information governance
• add
Information hiding
Identifies data that has been assigned to specific levels of classification and
restrict access tot hat data via limited class functions.
Return to top
• add
The information life cycle recognizes that data has different value, and requires
approaches, as it moves through an organization from collection to deletion. The
stages are generally considered to be: Collection, processing, use, disclosure,
retention, and destruction.
Return to top
• add
Also known as data life cycle management (DLM) or data governance, ILM is a
policy-based approach to managing the flow of information through a life cycle
from creation to final disposition. ILM provides a holistic approach to the
processes, roles, controls and measures necessary to organize and maintain data,
and has 11 elements: Enterprise objectives; minimalism; simplicity of procedure
and effective training; adequacy of infrastructure; information security;
authenticity and accuracy of one’s own records; retrievability; distribution
controls; auditability; consistency of policies; and enforcement.
Acronym(s): DLM, ILM
Associated term(s): Data Life Cycle Management
Return to top
• add
Information Privacy
One of the four classes of privacy, along with territorial privacy, bodily privacy,
and communications privacy. The claim of individuals, groups or institutions to
determine for themselves when, how and to what extent information about them
is communicated to others.
Return to top
• add
Information Security
The protection of information for the purposes of preventing loss, unauthorized
access and/or misuse. It is also the process of assessing threats and risks to
information and the procedures and controls to preserve confidentiality, integrity
and availability of information.
Acronym(s): IS
Return to top
• add
• add
Also known as “the C-I-A triad”; consists of three common information security
principles: Confidentiality, integrity, and availability.
Associated law(s): C-I-A Triad
Return to top
• add
• add
Information Utility
The culture and desire of a business that seeks to use information collected by a
company in every way possible to improve services and products. This needs to be
balanced with privacy considerations.
Return to top
• add
Insecurity
• add
Integrity
The General Data Protection Regulation requires that controllers and processors
implement measures to ensure the ongoing confidentiality, integrity, availability
and resilience of processing systems and services. Integrity refers to the
consistency, accuracy and trustworthiness of the data (see Accuracy).
Return to top
• add
• add
Internal Partners
• add
Internet of Things
A term used to describe the many devices that are connected to the internet. Any
device that is built with a network interface can be assigned an IP address to
allow for automation and remote access.
Return to top
• add
• add
• add
• add
Interrogation
• add
A system that inspects network activity and identifies suspicious patterns that
may someone is attempting to penetrate or compromise a system or network. An
IDS: may be network-based or host-based; signature-base or anomaly-based, and
requires human intervention in order to respond to the attack.
Acronym(s): IDS
Associated term(s): Intrusion Prevention System (IPS)
Return to top
• add
A form of access control. An IPS is much like an application firewall. Its intent is
not only to detect a network attack but to prevent it. It neither requires nor
involves human intervention in order to respond to a system attack.
Acronym(s): IPS
Associated term(s): Intrusion Detection System (IDS)
Return to top
• add
Intrusion reports
• add
As defined in the U.S. Fair Credit Reporting Act: A consumer report or portion
thereof in which information on a consumer’s character, general reputation,
personal characteristics, or mode of living is obtained through personal
interviews with neighbors, friends, or associates of the consumer reported on or
with others with whom he is acquainted or who may have knowledge concerning
any such items of information. However, such information shall not include
specific factual information on a consumer’s credit record obtained directly from
a creditor of the consumer or from a consumer reporting agency when such
information was obtained directly from a creditor of the consumer or from the
consumer.
Associated term(s): Credit Reporting Agency
Associated law(s):Fair Credit Reporting Act
Return to top
• add
ISO 27001
• add
ISO 27002
• add
IT Architecture
Also known as Enterprise Architecture (EA) is the set of policies (standards and
guidelines), principles, services, and products used by IT providers.
Associated term(s): Enterprise Architecture (EA)
Return to top
• add
IT Department
• add
Javascript
• add
Joint Operations
• add
• add
Jurisdiction
The authority of a court to hear a particular case. Courts must have jurisdiction
over both the parties to the dispute (personal jurisdiction) and the type of dispute
(subject matter jurisdiction). The term is also used to denote the geographical
area or subject-matter to which such authority applies.
Return to top
• add
Just-in-Time Notification
• add
k-anonymity
• add
l-diversity
• add
• add
• add
• add
Lawfulness
• add
Layered Notice
• add
A layered approach defines three levels of security policies. The top layer is a
high-level document containing the controller’s policy statement. The next layer
is a more detailed document that sets out the controls that will be implemented to
achieve the policy statements. The third layer is the most detailed and contains
the operating procedures, which explain how the policy statements will be
achieved in practice.
Return to top
• add
Least Privilege
A security control where access is granted at the lowest possible level required to
perform the function.
Return to top
• add
• add
One of the six legal bases for processing personal data in the General Data
Protection Regulation, the legitimate interests of a controller, including those of a
controller to which the personal data may be disclosed, or of a third party, may
provide a legal basis for processing, provided that the interests or the
fundamental rights and freedoms of the data subject are not overriding, taking
into consideration the reasonable expectations of data subjects based on their
relationship with the controller.
Associated term(s): EU Data Protection Directive, Legitimate Processing Criteria
Return to top
• add
Limiting Use
The concept that personal information shall not be used or disclosed for purposes
other than those for which it was collected, except with the consent of the
individual or as required by the law.
Return to top
• add
Lindqvist Judgement
A case in which the European Court of Justice ruled that a woman who identified
and included information about fellow church volunteers on her website was in
breach of the Data Protection Directive 95/46/EC. The ECJ held that the creation
of a personal website was not a personal activity allowing the woman to be
exempted from the data protection rules. Some observers wonder whether Recital
18 of the General Data Protection Regulation, which says the law does not apply
to the processing of personal data by a natural person in the course of a purely
personal or household activity and thus with no connection to a professional or
commercial activity, might affect this precedential ruling. Recital 18 says personal
or household activities could include correspondence and the holding of
addresses, or social networking and online activity undertaken within the context
of such activities.
Link to text of: Lindqvist Judgement
Associated law(s): Directive 95/46/EC
Return to top
• add
Linkability
The degree to which identifiers used to track an individual user can be paired
with outside information to identify that individual. For example, public record
can be paired with date of birth, gender and zip code to identify an individual.
Associated term(s): Anonymous Information, Pseudonymous Data, De-
Identification, Identifiability, Re-Identification, Identifiers, GUID
Return to top
• add
• add
Local Governance
• add
• add
Location Data
• add
Location-Based Service
Services that utilize information about location to deliver, in various contexts, a
wide array of applications and services, including social networking, gaming and
entertainment. Such services typically rely upon GPS, RFID, Wi-Fi, or similar
technologies in which geolocation is used to identify the real-world geographic
location of an object, such as a mobile device or an internet-connected computer
terminal.-
Acronym(s): LBS
Associated term(s): Geolocation; GPS; Global Positioning System; RFID
Return to top
• add
Logs
• add
• add
Machine Learning
• add
Machine-readable Formats
“[W]ritten in a standard computer language (not English text) that can be read
automatically by a web browser.” (Source: OMG PIA Guidance)
Return to top
• add
Madrid Resolution
• add
Magnitude data
Refers to the size of the data. A table showing average income by age is magnitude
data.
Return to top
• add
Main Establishment
The main establishment of a controller in the Union should be the place of its
central administration in the European Union, unless the decisions on the
purposes and means of the processing of personal data are taken in another
establishment of the controller in the EU in which case that other establishment
should be considered to be the main establishment. The main establishment of
the processor should be the place of its central administration in the EU or, if it
has no central administration in the EU the place where the main processing
activities take place in the EU. The member state location of the main
establishment determines the controller or processor's lead supervisory authority
(see Lead Supervisory Authority).
Return to top
• add
Manageability
• add
• add
• add
Material Scope
The actions covered by a particular law or regulation. The material scope of the
General Data Protection Regulation, for example, is the processing of personal
data wholly or partly by automated means and to the processing other than by
automated means of personal data which form part of a filing system or are
intended to form part of a filing system, other than that processing that falls
outside of the scope of EU law, is done for personal or household use, or is done
for law enforcement purposes.
Return to top
• add
Max Schrems
Chairman and founder of noyb, a "privacy enforcement platform" that brings data
protection cases to the courts under the General Data Protection Regulation.
Schrems first came notoriety as an Austrian law student, who complained to the
Irish Data Commissioner that Facebook Ireland was illegally sharing his personal
data with the U.S. government, following the revelations of Edward Snowden.
The case, known as "The Schrems case" or "Schrems I," eventually caused the
invalidation of the Safe Harbor data-transfer agreement between the EU and U.S.
(see "Safe Harbor" and "Privacy Shield"). At the time of this writing, a second
case brought by Schrems, known as Schrems 2.0 or Schrems II, seeks to
invalidate standard contratual clauses when used to transfer data to the United
States from the EU.
Return to top
• add
• add
Medical Information
Information or records obtained, with the consent of the individual to whom it
relates, from licensed physicians or medical practitioners, hospitals, clinics or
other medical or medically related facilities.
Associated term(s): HIPAA
Return to top
• add
Member State
• add
The only directly elected body of the European Union, the Parliament represents
one half of the legislative arm of the EU, alongside the Council of the European
Union. Members of Parliament are elected by citizens of the member states, in
proportion to the size of each country, every five years. Those MEPs then elect the
president of the European Commission. Its three primary responsibilities are
legislative development, supervisory oversight of the other institutions, and
development of the budget. As of 2018, the Parliament had 751 members.
Link to list of: Members of the European Parliament
Acronym(s): MEPs
Return to top
• add
Memorandum of Understanding/Agreement
Return to top
• add
Metadata
Data that describes other data. “Meta” is a prefix meaning “an underlying
description” in information technology usage.
Return to top
• add
The processes and methods to sustain a metric to match the ever-changing needs
of an organization. Consists of a 5-step process: (1) Identification of the intended
audience; (2) Definition of data sources; (3) Selection of privacy metrics; (4)
Collection and refinement of systems/application collection points; and (5)
Analysis of the data/metrics to provide value to the organization and provide a
feedback quality mechanism.
Return to top
• add
Metrics
• add
Microdata Sets
• add
Under HIPAA, the standard that the level of information that may be disclosed by
healthcare providers to third parties is the minimum amount necessary to
accomplish the intended purpose.
Associated term(s): Minimum Necessary Standard
Associated law(s): HIPAA
Return to top
• add
MDM refers to software solutions that allow administrators to oversee the use of
mobile devices for productivity and security reasons. MDM solutions usually
allow an organization to control mobile apps, networks and data used by the
mobile device from a single centralized software product, thereby assuring better
control of company information on personal devices. MDM solutions also present
challenges in the BYOD context because they allow for greater monitoring of
employees' personal use of their devices. Some MDM solutions enable
organizations to remotely wipe a mobile device if it is suspected of being lost or
compromised, which raises additional concerns if personal employee
information is deleted.
Return to top
• add
Mobility
The extent to which a system moves from one location to another, as in laptop
and mobile phone capabilities.
Return to top
• add
Model Clauses
• add
• add
Under the Bank Secrecy Act, the log of transactions a financial institution must
retain a record for cash purchases of monetary instruments (e.g., money orders,
cashier’s checks, travelers checks) ranging from $3,000 to $10,000.
Acronym(s): MIL
Associated law(s): Bank Secrecy Act
Return to top
• add
Multi-Factor Authentication
An authentication process that requires more than one verification method (see
Authentication), such as a password and biometric identifier, or log-in credentials
and a code sent to an email address or phone number supplied by a data subject.
Associated term(s): Two-Factor Authentication; Two-Step Authentication
Return to top
• add
Mutual Assistance
• add
NARA is charged with providing guidance and assistance with respect to records
management and maintaining those records that are of sufficient value to warrant
permanent preservation. Further, NARA establishes general records schedules,
which provide mandatory disposal authorization for temporary administrative
records common to several or all agencies of the federal government. These
include records relating to civilian personnel, fiscal accounting, procurement,
communications, printing and other common functions and certain nontextual
records.
Link to: National Archives and Records Administration
Acronym(s): NARA
Return to top
• add
Allows U.S. consumers to place their phone number on a national list, preventing
calls from unsolicited telemarketers. This registration is now permanent and can
be enforced by the Federal Trade Commission, Federal Communication
Commission and state attorneys general with up to a $16,000 fine per violation.
Cell phones are protected from any unsolicited automatic-dialed calls through
other FCC regulations.
Link to: National Do-Not-Call Registry
Associated term(s): Federal Trade Commission, Federal Communication
Commission, Do-Not-Call Implementation Act, Do-Not-Call Improvement Act
Return to top
• add
• add
NIST is an agency within the Department of Commerce. NIST has the lead
responsibility for the development and issuance of security standards and
guidelines for the federal government, contractors, and the United States critical
information infrastructure.
The NIST has published a series of publications in support of its risk management
framework (RMF). The RMF is a multi-tiered and structured methodology for
creating a unified information security framework for the federal government in
order to meet the vast array of requirements set forth in FISMA.
Link to: National Institute of Standards and Technology
Acronym(s): NIST
Associated term(s): FISMA
Associated law(s): FISMA
Return to top
• add
• add
A U.S. federal agency that administers the National Labor Relations Act. The
board conducts elections to determine if employees want union representation
and investigates and remedies unfair labor practices by employers and unions.
Link to: National Labor Relations Board
Acronym(s): NLRB
Associated law(s): National Labor Relations Act
Return to top
• add
National Security Letter
A category of subpoena. The USA PATRIOT Act expanded the use of national
security letters. Separate and sometimes differing statutory provisions now
govern access, without a court order, to communication providers, financial
institutions, consumer credit agencies and travel agencies.
Acronym(s): NSL
Associated law(s): USA-PATRIOT Act
Return to top
• add
• add
• add
• add
Natural language understanding
• add
Necessity
• add
Negligence
• add
Network Centricity
• add
Network Devices
The components used to link computers and other devices so they may share files
and utilize other electronic resources, e.g. printers and fax machines. The most
common network devices are those used to create Local Area Networks (LAN),
which require a hub, router, cable or radio connection devices, network cards,
and (for access to the internet) a modem.
Return to top
• add
Network Encryption
A type of network security that protects data traffic by providing encryption at the
network transfer layer. This form of encryption operates independently of other
security measures and is invisible to the ender user as data is only encrypted
while in transit.
Return to top
• add
Network-Layer Attacks
Attacks that exploit the basic network protocol in order to gain any available
advantage. These attacks generally involve “spoofing” a network address so that a
computer sends data to an intruder rather than their proper recipient or
destination. Other attacks can involve service disruptions through a denial of
service (DOS) attack—a brute force method that overloads the capacity of a
website’s domain to respond to incoming requests such that it renders the server
inoperable.
Return to top
• add
Noise addition
Blurring data to ensue that aggregated data is useful, yet nonspecific enough to
avoid revealing identifiers.
Return to top
• add
• add
• add
Non-Repudiation
The ability to ensure that neither the originator nor the receiver in a transaction
can dispute the validity of the transaction or access request. An independent
verification takes place which allows the sender’s identity to be verified, typically
by a third party, and also allows the sender to know that the intended recipient of
the message actually received it. Non-repudiation of origin proves that data has
been sent and non-repudiation of delivery proves that the data has been received.
Return to top
• add
Obfuscation
To make (something) more difficult to understand; to hide the true meaning. For
Data Obfuscation see Data Masking.
Associated term(s): Data Masking
Return to top
• add
Objective Harm
Measurable and observable, wherein a person's privacy has been violated and a
direct harm is known to exist.
Return to top
• add
OECD Guidelines
First released in 1980, and then updated in 2013, these guidelines represent
perhaps the most widely accepted and circulated set of internationally agreed
upon privacy principles along with guidance for countries as they develop
regulations surrounding cross-border data flows and law-enforcement access to
personal data. The principles, widely emulated in national privacy laws,
include Collection Limitation, Data Quality, Purpose Specification, Use
Limitation, Security Safeguards, Openness, Individual Participation,
and Accountability (see entries for each principle under their own listing
elsewhere in the glossary).
Link to text of: OECD Guidelines Governing the Protection of Privacy and
Transborder Data Flows of Personal Data
Return to top
• add
Under the Privacy Act, the OMB is charged with the responsibility to supervise
agencies’ implementation of the act’s provisions. In order to perform this task,
the act provides that the director of the OMB shall develop and prescribe
guidelines and regulations, as well as provide assistance and oversight of their
implementation by agencies.
Acronym(s): OMB
Return to top
• add
• add
Omnibus Laws
Used to distinguish from sectorial laws (see Sectorial Laws), to mean laws that
cover a broad spectrum of organizations or natural persons, rather than simply a
certain market sector or population.
Return to top
• add
One-stop Shop
• add
• add
Refers to the storage of data by a third-party vendor made accessible through the
Internet.(Hosted storage, Internet storage, cloud storage) This is a common data
storage alternative to local storage, such as on a hard drive, and portable storage,
such as a flash drive.
Associated term(s): Cloud Computing
Return to top
• add
• add
Onward Transfer
A transfer of personal data to a fourth party or beyond. For instance, the first
party is the data subject, the second party is the controller, the third party is the
processor, and the fourth party is a sub-contractor of the processor. In the context
of binding corporate rules, this might mean the third party is another unit of the
controller organization outside of the EEA and the fourth party is a processor. If
an onward transfer occurs, the controller remains accountable for processing of
the personal data.
Return to top
• add
• add
• add
Openness
• add
Various opinions of the Article 29 Working Party (see Article 29 Working Party)
continue to be relevant even after the body's transition into the European Data
Protection Board (EDPB). They continue to provide guidance and context as to
the stance of European Union member state regulators in how data protection
law should be interpreted.
Return to top
• add
Opt-In
One of two central concepts of choice. It means an individual makes an active
affirmative indication of choice; i.e., checking a box signaling a desire to share his
or her information with third parties.
Associated term(s): Choice; Consent; Opt-Out
Return to top
• add
• add
Opt-Out
• add
• add
• add
Outsourcing
• add
Outsourcing (EU-specific)
• add
• add
Passive Collection
Collecting data from a data subject that is unaware of such collection.
Associated term(s): Active Collection, First-party Collection, Surveillance
Collection, Repurposing, Third-party Collection
Return to top
• add
• add
Patches
• add
• add
• add
Performance Measurement
• add
Perimeter Controls
• add
Persistent Storage
The storage of data in a non-volatile storage medium such as a hard drive. In the
absence of persistent data storage, data would only be stored in RAM (random
access memory) and would be lost whenever the device lost power.
Associated term(s): Transient Storage
Return to top
• add
Personal Data
The predominant term for Personal Information in the European Union, defined
broadly in the General Data Protection Regulation as any information relating to
an identified or identifiable natural person.
Associated term(s): Personal Information; Personally Identifying Information;
Personally Identifiable Information
Return to top
• add
• add
Personal Information
A synonym for "personal data." It is a term with particular meaning under the
California Consumer Privacy Act, which defines it as information that identifies,
relates to, describes, is capable of being associated with, or could reasonably be
linked, directly or indirectly, with a particular consumer.
Acronym(s): PI
Associated term(s): Personal Data; Personally Identifying Information;
Personally Identifiable Information
Return to top
• add
• add
• add
Any information about an individual, including any information that can be used
to distinguish or trace an individual’s identity, such as name, social security
number, date and place of birth, mother’s maiden name, or biometric records;
and any other information that is linkable to an individual, such as medical,
educational, financial, and employment information.
Return to top
• add
Pharming
• add
Phishing
E-mails or other communications that are designed to trick a user into believing
that he or she should provide a password, account number or other information.
The user then typically provides that information to a website controlled by the
attacker. “Spear phishing” is a phishing attack that is tailored to the individual
user, such as when an e-mail appears to be from the user’s boss, instructing the
user to provide information.
Associated term(s): Spear Phishing; Social Engineering
Return to top
• add
PIA Triggers
These events constitute triggers for an organization to conduct a privacy impact
assessment: Conversion of records from paper-based to electronic form;
Conversion of information from anonymous to identifiable form; System
management changes involving significant new uses and/or application of new
technologies; Significant merging, matching or other manipulation of multiple
databases containing PII; Application of user-authenticating technology to a
system accessed by members of the public; Incorporation into existing databases
of PII obtained from commercial or public sources; Significant new inter-agency
exchanges or uses of PII; Alteration of a business process resulting in significant
new collection, use and/or disclosure of PII; Alteration of the character of PII due
to the addition of qualitatively new types of PII.
Associated law(s): FISMA
Return to top
• add
A strategy used when creating new software products and systems. Plan-driven
models focus on designing the entirety of the system and system functions before
actual creation of the system, as opposed to the Agile Development Model. An
example of a plan-driven model is the Spiral model.
Associated term(s): Agile Development Model, CONOPS
Return to top
• add
• add
A project with the goal of designing web protocols with user privacy in mind.
Several protocols have been developed out of this project including the most
successful, XACML.
Link to: Platform for Privacy Preferences Project
Acronym: P3P
Return to top
• add
Policy Framework
• add
Polygraph
• add
Polymorphic
The algorithm is mutated with each copy of the code, while the outcome of the
encryption remains the same for any given key.
Return to top
• add
POST Method
The GET and POST HTML method attributes specify how form data is sent to a
web page. The POST method is more secure than GET as the GET method
appends the form data to the URL allowing passwords and other sensitive
information collected in a form to be visible in the browser’s address bar.
Associated term(s): GET Method
Return to top
• add
Postal Marketing
Direct marketing (see Direct Marketing) to postal addresses.
Associated term(s): Direct Marketing
Return to top
• add
Direct marketing (see Direct Marketing) to postal addresses. Just as with other
forms of direct marketing, marketers must ensure they establish the lawful basis
for processing personal data when postal marketing to those in the EEA under the
General Data Protection Regulation.
Return to top
• add
Predictability
Characterizes reliable assumptions about a system particularly its data and the
processing of that data by all stakeholders.
Return to top
• add
Preemption
• add
Premium Advertising
The most expensive and most visible type of web advertising, typically on the
homepage of a website and priced so that only big name companies/products use
them.
Associated term(s): Behavioral Advertising, Contextual Advertising, Demographic
Advertising, Psychographic Advertising, Remnant Advertising
Return to top
• add
Prior Authorization
Under the General Data Protection Regulation, a processor (see Processor) may
not engage another processor without prior authorization of the data controller
(see Controller). This authorization may be general or specific. If it is general, the
processor is required to give the controller an opportunity to object to the
addition or replacement of other processors.
Associated term(s): Notification; Data Protection Authority
Return to top
• add
Privacy
• add
Among the exception to the Privacy Act of 1974 are: (1) Performance of regular
duties of an agency employee; (2) FOIA disclosures; (3) Routine uses as specified
in the applicable SORN; (4) Census Bureau census or survey functions; (5)
Statistical research if not individually identifiable; (6) Data held by the National
Archives; (7) Law enforcement activity; (8) Compelling health or safety
circumstances; (9) Congressional committee with appropriate jurisdiction; (10)
GAO duties; (11) Court order, and (12) Consumer reporting agencies.
Associated term(s): The Privacy Act of 1974
Return to top
• add
• add
Enacted in 1983, the Act sets out rules for how institutions of the federal
government must deal with personal information of individuals. It has been
revised by many minor amendments, but remains substantially unaltered.
Link to text of law: The Canadian Privacy Act
Return to top
• add
• add
Privacy Assessment
• add
• add
The guidelines for privacy breach responses were drafted in 2007 and consist of
four steps: (1) Containment of the breach and preliminary assessment; (2)
evaluating the associated risks; (3) notifying affected parties; (4) taking adequate
steps to prevent future breaches.
Associated term(s): Data Breach, Privacy Breach (Canadian)
Return to top
• add
Privacy by Design
• add
Privacy Champion
An executive who serves as the privacy program sponsor and acts as an advocate
to further foster privacy as a core organization concept.
Return to top
• add
The individual who is mandated by PIPEDA to enforce the act. The commissioner
has broad power to examine documents, but some documents may be shielded by
solicitor-client privilege. The commissioner conducts investigations under a cloak
of confidentiality, but public reports with non-binding recommendations are
ultimately issued. This individual is mandated by PIPEDA to enforce PIPEDA.
Aggrieved individuals also have a right to complain to the commissioner.
Link to: Privacy Commissioner of Canada
Associated law(s): PIPEDA
Return to top
• add
Privacy engineering
• add
• add
• add
Privacy Notice
• add
• add
A standard form label intended to make privacy policies easily and quickly
understandable. Privacy Nutrition Labels where developed by the Cylab Usable
Privacy and Security Laboratory (CUPS) at Carnegie Mellon University.
Link to: Cylab Usable Privacy and Security Laboratory
Associated term(s): Privacy Policy
Return to top
• add
• add
Privacy Officer
A general term in many organizations for the head of privacy compliance and
operations. In the United States federal government, however, it is a more
specific term for the official responsible for the coordination and implementation
of all privacy and confidentiality efforts within a department or component. This
official may be statutorily mandated as a political appointment, as in the
Department of Homeland Security, or a career professional.
Return to top
• add
• add
Privacy Patterns
• add
Privacy Policy
An internal statement that governs an organization or entity’s handling of
personal information. It is directed at those members of the organization who
might handle or make decisions regarding the personal information, instructing
them on the collection, use, storage and destruction of the data, as well as any
specific rights the data subjects may have. May also be referred to as a data
protection policy.
Return to top
• add
• add
• add
Privacy Review
An analysis of all new projects for their compliance with the privacy
standard and privacy policy of an organization. Reviews should be performed
multiple times beginning at the early stages of new project development to
minimize potential privacy risks.
Associated term(s): Privacy Standard, Privacy Policy, Privacy by Design, Privacy
Risk
Return to top
• add
Privacy Risk
A formula to calculate the impact of a new project on the privacy of the consumer
base that will use the new systems. To evaluate the risk, one must consider the
likelihood of the threat occurring, multiplied by the potential impact if the threat
occurs. It may be difficult to quantify, so a comparison between projects may be
the best way to understand privacy risks.
Associated term(s): Privacy Standard, Privacy Policy, Privacy by Design, Privacy
Review
Return to top
• add
Under HIPAA, this rule establishes U.S. national standards to protect individuals’
medical records and other personal health information and applies to health
plans, healthcare clearinghouses and those healthcare providers that conduct
certain healthcare transactions electronically. The rule requires appropriate
safeguards to protect the privacy of personal health information and sets limits
and conditions on the uses and disclosures that may be made of such information
without patient authorization. The rule also gives patients’ rights over their health
information, including rights to examine and obtain a copy of their health records
and to request corrections.
Link to text of rule: Privacy Rule
Associated law(s): HIPAA
Return to top
• add
Privacy Standard
The minimum level at which privacy should be protected in all new projects,
applications and services. This includes the expectations of privacy in the new
programs and guidelines for adherence to those standards. The standard is set
based on both internal organizational policy and external regulations etc.
Associated term(s): Privacy by Design, Privacy Review, Privacy Policy, Privacy
Risk
Return to top
• add
Privacy Technlologist
A term used to reference the many technology professionals that play a role in
protecting privacy in or with technology. Includes but is not limited to: audit, risk
and compliance managers; data professionals; data architects; data scientists,
system designers and developers; software engineers, privacy engineers.
Return to top
• add
• add
Privacy-Enhancing Technologies
• add
• add
• add
Profiling
Any form of automated processing of personal data consisting of the use of
personal data to evaluate certain personal aspects, in particular to analyze or
predict aspects concerning that person's performance at work, economic
situation, health, personal preferences, interests, reliability, behavior, location or
movements.
Return to top
• add
Programmatic Buying
• add
Proportionality
Proportionality, along with necessity (see Necessity), is one of two factors data
controllers should consider as they apply the principle of data minimization
(see Data Minimization), as required by the General Data Protection Regulation.
Proportionality considers the amount of data to be collected and whether it is
adequate and relevant in relation to the purposes for which it is being processed.
Is the processing suitable and reasonably likely to achieve the stated objectives?
Are any adverse consequences that the processing creates justified in view of the
importance of the objective pursued?
Associated law(s): EU Data Protection Directive
Return to top
• add
Protect
The second of four phases of the privacy operational life cycle. It provides the
data life cycle, information security practices and Privacy by Design principles to
“protect” personal information.
Associated term(s): Privacy Operational Life Cycle; Assess; Sustain; Respond
Return to top
• add
• add
• add
• add
Protective Order
With a protective order, a judge determines what information should not be made
public and what conditions apply to who may access the protected information.
Associated term(s): Redaction
Return to top
• add
Pseudonymisation
The processing of personal data in such a manner that the personal data can no
longer be attributed to a specific data subject without the use of additional
information, provided that such additional information is kept separately and is
subject to technical and organizational measures to ensure that the personal data
are not attributed to an identified or identifiable natural person.
Return to top
• add
Pseudonymous Data
Data points which are not directly associated with a specific individual. The
identity of the person is not known but multiple appearances of that person can
be linked together. Uses an ID rather than PII to identify data as coming from the
same source. IP address, GUID and ticket numbers are forms of pseudonymous
values.
Associated term(s): Identifiability, Identifiers, GUID, Authentication, De-
Identification, Re-Identification.
Return to top
• add
Psychographic Advertising
• add
Public Interest
One of the six legal bases for processing personal data outlined by the General
Data Protection Regulation is processing necessary for the performance of a task
carried out in the public interest or in the exercise of official authority vested in
the controller.
Return to top
• add
• add
Public Records
• add
• add
A U.S. common law tort that states: “One who gives publicity to a matter
concerning the private life of another is subject to liability to the other for
invasion of his privacy, if the matter publicized is of a kind that (a) would be
highly offensive to a reasonable person and (b) is not of legitimate concern to the
public.” (Restatement (Second) of Torts § 652D)
Link to text of: Restatement (Second) of Torts § 652D
Associated term(s): Common Law
Return to top
• add
• add
Purpose Limitation
A fair information practices principle, part of the original OECD Guidelines, and a
piece of many privacy and data protection regulations, this is the principle that
the purposes for which personal data are collected should be specified no later
than at the time of data collection and the subsequent use of that personal data is
limited to the fulfillment of those purposes or such others as are not incompatible
with those purposes and as are specified to the individual on each occasion of
change of purpose, or for which there is a further legal basis that would not
require notification.
Associated term(s): Principle of Finality
Associated law(s): EU Data Protection Directive
Return to top
• add
Purpose Specification
• add
• add
Quality Attributes
• add
Quantum encryption
• add
Radio-Frequency Identification
Technologies that use radio waves to identify people or objects carrying encoded
microchips.
Acronym(s): RFID
Return to top
• add
Random Testing
Substance testing sometimes required by law, prohibited in certain jurisdictions,
but acceptable where used on existing employees in specific, narrowly defined
jobs, such as those in highly regulated industries where the employee has a
severely diminished expectation of privacy or where testing is critical to public
safety or national security.
Associated term(s): Substance Testing
Return to top
• add
Re-identification
• add
REAL ID Act
• add
Reasonable Suspicion
• add
Record-Keeping Obligation
• add
Rectification
• add
• add
A regulation created by the Federal Trade Commission (FTC) under the authority
of the Fair and Accurate Credit Transactions Act of 2003. This regulation
requires financial institutions and creditors to implement measures to detect and
prevent identity theft. The original FTC rule was circumscribed by the Red Flag
Program Clarification Act of 2010, which limited the definition of “creditors” to
exclude any creditor “that advances funds on the behalf of a person for expenses
incidental to a service.” The act in effect allowed lawyers, some doctors and other
service type companies to avoid implementing Red Flag credit measures.
Link to text of law: Red Flag Program Clarification Act of 2010
Associated term(s): Federal Trade Commission
Associated law(s): Fair and Accurate Credit Transactions Act of 2003
Return to top
• add
Redaction
• add
Remarketing
• add
Chapter VII of the General Data Protection Regulation outlines the remedies
available to data subjects and their right to compensation, the liability for damage
caused by processing for both controllers and processors, and the penalties
available to supervisory authorities for infringement of the law.
Return to top
• add
Remnant Advertising
The most basic, stripped down form of web advertising that occurs when no data
about the user or webpage is available. Advertising of this sort has no
personalization.
Associated term(s): Behavioral Advertising, Contextual Advertising, Demographic
Advertising, Psychographic Advertising, Premium Advertising
Return to top
• add
Repurposing
Taking information collected for one purpose and using it for another purpose
later on.
Associated term(s): Active Collection, First-party Collection, Passive
Collection, Surveillance Collection, Third-party Collection
Return to top
• add
Resilience
The ability to withstand and recover from threats. The General Data Protection
Regulation requires that controllers and processors, in proportion to risk, be able
to ensure the resilience of processing systems and services.
Return to top
• add
Respond
The fourth of four phases of the privacy operational life cycle. It includes the
respond principles of information requests, legal compliance, incident-response
planning and incident handling. The “respond” phase aims to reduce
organizational risk and bolster compliance to regulations.
Associated term(s): Privacy Operational Life Cycle; Assess; Protect; Sustain
Return to top
• add
Retargeting
A type of online advertising where visitors to a website are targeted with ads
related to that website as they browse elsewhere. The most common form of
retargeting is a digital advertising network, which leverages retargeting to display
advertisements to a user related to a website previously visited by the user across
all third-party websites in a network.
Return to top
• add
Retention
Within the information life cycle, the concept that organizations should retain
personal information only as long as necessary to fulfill the stated purpose.
Return to top
• add
Within the information life cycle the concept that organizations should retain
personal information only as long as necessary to fulfill the stated purpose. Under
the General Data Protection Regulation, the "right to be forgotten" exists where
the personal data is no longer necessary in relation to the purposes for which it
was collected or otherwise processed, where a data subject has withdrawn their
consent or objects to the processing of personal data concerning them, or where
the processing of their personal data does not otherwise comply with the GDPR,
unless there are other legal obligations or reasons of the public interest to retain
their personal data.
Return to top
• add
Return on Investment
• add
• add
Right of Access
An individual’s right to request and receive their personal data from a business or
other organization.
Return to top
• add
Right To Be Forgotten
• add
Right To Correct
The right for individuals to correct or amend information about themselves that
is inaccurate.
Return to top
• add
Right to Deletion
• add
• add
Right to No Sale
• add
Right to Object
• add
• add
• add
Right to Restriction
• add
• add
Access policies that espouse the view that no employee should have greater
information access than is necessary to capably perform his or her job function.
Return to top
• add
RSA Encryption
Monitoring and analyzing usage and data collected from a running system.
Return to top
• add
Safe Harbor
• add
Sarbanes-Oxley Act
A United States law, passed in 2002, regulating the transparency of publicly held
companies. In particular, public companies must establish a way for the company
to confidentially receive and deal with complaints about actual or potential fraud
from misappropriation of assets and/or material misstatements in financial
reporting from so-called "whistle-blowers."
Link to text of law: Sarbanes-Oxley Act
Acronym(s): SOX
Related term(s): Whistle-Blowing
Return to top
• add
A United States law, passed in 2002, regulating the transparency of publicly held
companies. In particular, public companies must establish a way for the company
to confidentially receive and deal with complaints about actual or potential fraud
from misappropriation of assets and/or material misstatements in financial
reporting from so-called "whistle-blowers." U.S. companies with EU subsidiaries
or affiliates are bound by both SOX and EU data protection law, thus potentially
leading to conflicting obligations, specifically in regards to protecting the identity
of the whistle-blower (SOX) vs. protecting the personal data of the employee
accused of wrongdoing (EU data protection law).
Return to top
• add
Schrems I
Colloquial term for Schrems v. Data Protection Commission (Ireland). See "Max
Schrems." After revelations by Edward Snowden of NSA surveillance in the U.S.
allegedly involving Facebook’s cooperation, Schrems complained to the Irish DPC
that Facebook Ireland, the company’s European subsidiary, was improperly
transferring his data to the U.S. where it could be accessed by the NSA. The data
transfers from Facebook Ireland to the U.S. were allowed under the Safe Harbor
adequacy decision. However, because Safe Harbor did not limit such U.S.
government access for national security purposes, the CJEU (see "CJEU") struck
down the Safe Harbor agreement as inconsistent with the European right to
privacy. As a result, adequacy is based on the concept of essential equivalence:
There must be an adequate level of protection of personal data essentially
equivalent to the protection of personal data in the EU.
Return to top
• add
• add
Seal Programs
• add
Secondary use
Using an individual's information without consent for purposes unrelated to the
original reasons for which it was collected.
Return to top
• add
Secret Key
• add
Section 208 requires agency website privacy policies to include the following
information: what information is to be collected through use of the website; why
the information is being collected; the intended use by the agency of the
information; with whom the information will be shared; what notices or
opportunities for consent will be provided; how the information will be secured;
the rights of individuals under the Privacy Act and other privacy laws.
Link to text of law: Section 208 of the E-Government Act
Link to text of law: E-Government Act
Associated term(s): E-Government Act
Return to top
• add
Sectoral Laws/Model
Laws that exist only in areas where the legislative body has found a particular
need.
Related term(s) Comprehensive Laws, Co-regulatory Model, Self-regulatory
Model, Technology Based Model
Return to top
• add
Sectorial Laws
Used to distinguish from omnibus laws (see Omnibus Laws), to mean laws that
cover a a specific market sector or population, rather than a broad portion of the
market or citizenry.
Return to top
• add
• add
Security Policy
• add
Security Safeguards
A fair information practices principle, it is the principle that personal data should
be protected by reasonable security safeguards against such risks as loss or
unauthorized access, destruction, use, modification or disclosure of data.
Return to top
• add
Sedona Conference
An important source of standards and best practices for managing electronic
discovery compliance through data retention policies. Regarding email retention,
the Sedona Conference offers four key guidelines:
• add
• add
Semayne’s Case
• add
Senate (Canadian)
One of two chambers of the Canadian Parliament, along with the House of
Commons. Unlike the House of Commons, whose members are elected, the
Senate is appointed by the governor in council based upon the recommendations
of the prime minister.
Associated term(s): Canadian Parliament, House of Commons
Return to top
• add
Under OMB Memorandum M-05-08, each executive agency should identify the
senior official who has agency-wide responsibility for information privacy. The
agency’s chief information officer (CIO) may perform this role, or it may be
performed by another senior official at the assistant secretary or equivalent level.
Agencies are also advised that the official given this role should have the authority
to address information privacy policy issues at a national and agency-wide level.
The official has overall responsibility and accountability for ensuring the agency’s
implementation of information privacy protections, including full compliance
with federal laws, regulations and policies relating to information security, such
as the Privacy Act.
Link to text of: Memorandum M-05-08
Acronym(s): SAOP
Return to top
• add
• add
Separate
Separating personal data during processing to prevent correlating information
that may lead to the identification of the individual. This is done via processing
data in physically separate locations (distribute) or isolating the data by
processing personal data that is used for different purposes in separate databases.
Return to top
• add
Single-Factor Authentication
The standard authentication mechanism that requires a user name and password
for access.
Associated term(s): Multi-factor authentication, Authentication, Authorization
Return to top
• add
Single-Sign-On (SSO)
An authentication process that allows the user to enter a single set of credentials
to access multiple applications.
Return to top
• add
• add
Smart Grid
Social Engineering
A general term for how attackers can try to persuade a user to provide
information or create some other sort of security vulnerability.
Associated term(s): Phishing
Return to top
• add
• add
SPAM
• add
Spear Phishing
• add
• add
Speech recognition
Voice command technology that allows users to interact with and control
technologies by speaking to them.
Return to top
• add
SQL Injection
• add
Stakeholders
• add
Standardized Icons
• add
Storage Encryption
The use of encryption to protect stored or backed-up data both in transit and in
the storage medium to provide an additional layer of security.
Return to top
• add
Storage Limitation
The principle that personal data must be kept in a form that permits
identification of data subjects for no longer than is necessary for the purposes for
which the personal data is processed. Personal data may be stored for longer
periods if it will be processed solely for archiving purposes in the public interest,
scientific or historical research purposes or statistical purposes, subject to
implementation of the appropriate technical and organizational measures
required to safeguard the rights and freedoms of the data subject.
Return to top
• add
Strategic Management
Return to top
• add
• add
Subjective Harm
• add
Subpoena
Substance Testing
• add
Substitute Notice
• add
Super Cookie
A tracking mechanism that persists even after all cookies have been deleted,
usually using several varying types of storage to remain within a device.
Associated term(s): Cookie
Return to top
• add
Supervisory Authority
• add
Surveillance
• add
Surveillance Collection
• add
Sustain
The third of four phases of the privacy operational life cycle. It provides privacy
management through the monitoring, auditing, and communication aspects of
the management framework.
Associated term(s): Privacy Operational Life Cycle; Assess; Protect; Respond
Return to top
• add
• add
Syndicated Content
Content that is not actually created by the host site, but is developed, purchased
or licensed from a third party. A concern associated with this content is that it can
contain malicious code that is then unwittingly incorporated into the
organization’s own website source code. For example, cross-site scripting (XSS)
attacks attempt to take advantage of the trust that users have for a given site.
Associated term(s): XSS
Return to top
• add
• add
• add
t-closeness
Extends l-diversity by reducing the granularity of data in a data set.
Return to top
• add
Technology-Based Model
• add
The first enactment of laws limiting unsolicited and automated telemarketing for
both telephone and fax communications. Most notably the act creates a private
right of action for those receiving unsolicited faxes, carrying a $500 fine per
violation and any damages sustained because of the fax. The Telephone
Consumer Protection Act also gives rule-making authority to the Federal
Communications Commission, allowing it to make further regulations in this
area. Among other provisions, the act prevents faxing without consent from the
recipient (this requirement was amended by the Junk Fax Prevention Act of
2005 to not include customers with an existing business relationship) and
requires companies to create and honor internal do-not-call registries (in 2003
the National Registry was created by the Federal Trade Commission).
Link to text of law: Telephone Consumer Protection Act
Acronym: TCPA
Associated term(s): Junk Fax Prevention Act of 2005, Federal Communications
Commission, Federal Trade Commission
Return to top
• add
Terms of Service
The set of rules which govern the use of a service and must be agreed to, either
implicitly through the use of that service or explicitly, in order to make use of that
service.
Associated term(s): EULA
Return to top
• add
Territorial Privacy
One of the four classes of privacy, along with information privacy, bodily
privacy and communications privacy. It is concerned with placing limitations on
the ability of one to intrude into another individual’s environment. Environment
is not limited to the home; it may be defined as the workplace or public space and
environmental considerations can be extended to an international level. Invasion
into an individual’s territorial privacy typically comes in the form of video
surveillance, ID checks and use of similar technology and procedures.
Associated term(s): Home Privacy
Return to top
• add
Territorial Scope
"The jurisdictional reach of a law or regulation. In the case of the General Data
Protection Regulation, it applies to organizations
established in the EU and to their third-party processors of personal data,
wherever they happen to be located, and to those organizations that offer goods
or services to, or monitor, individuals in the EU."
Return to top
• add
Third-Party Collection
Data acquired from a source other than directly from the subject of the data.
Associated term(s): Active Collection, First-party Collection, Passive
Collection, Repurposing, Surveillance Collection
Return to top
• add
Tokenization
• add
Traffic Data
This refers to any data processed for the purpose of the conveyance of a
communication on an Electronic Communications Network or for the billing
thereof. Traffic data includes information about the type, format, time, duration,
origin, destination, routing, protocol used and the originating and terminating
network of a communication. For example, in relation to a telephone call, traffic
data includes, among other information, the phone numbers of the caller and call
recipient; in relation to an e-mail, the e-mail addresses of the sender and
recipient’ and the size of any attachments.
Return to top
• add
Transfer
• add
Transient Storage
Short lifespan data storage such as a session cookie stored on a browser that is
purged from the system when the browser is closed.
Associated term(s): Persistent Storage, Cookies
Return to top
• add
Transit
• add
• add
Transparency
• add
Treaty of Lisbon
Signed in 2007, and effective in 2009, its main aim was to strengthen and
improve the core structures of the European Union to enable it to function more
efficiently. The Lisbon Treaty amends the EU’s two core treaties, the Treaty on
European Union and the Treaty Establishing the European Community. The
treaty ensures that all institutions of the European Union must protect
individuals when processing personal data. It also established a European Data
Protection Supervisor whose role is to regulate compliance with data protection
law within the institutions of the European Union, but its references to
”authorities”’ implies that the national data protection authorities may also have
jurisdiction in such matters.
Link to: Treaty of Lisbon
Link to: Treaty on European Union
Link to: Treaty Establishing the European Community
Associated term(s): Lisbon, EDPS
Return to top
• add
Trojan Horse
• add
A U.S. federal agency that oversees “the welfare of the job seekers, wage earners
and retirees of the United States by improving their working conditions,
advancing their opportunities for profitable employment, protecting their
retirement and healthcare benefits, helping employers find workers,
strengthening free collective bargaining and tracking changes in employment,
prices and other national economic measurements.” To achieve this mission, the
department administers a variety of federal laws including, but not limited to, the
Fair Labor Standards Act (FLSA), the Occupational Safety and Health Act
(OSHA) and the Employee Retirement Income Security Act (ERISA).
Link to: U.S. Department of Labor
Link to text of act: Fair Labor Standards Act
Link to text of act: Occupational Safety and Health Act
Link to text of act: Employee Retirement Income Security Act
Acronym(s): DOL
Associated law(s): FLSA; ERISA, OSHA
Return to top
• add
Ubiquitous computing
• add
Unambiguous Consent
• add
• add
• add
• add
Link to text of: United States Department of Health, Education and Welfare Fair
Information Practice Principles (1973)
Associated term(s): HEW Principles; HEW Report, The
Return to top
• add
Also called the Human Rights Declaration, the declaration recognized the
universal values and traditions of inherent dignity, freedom, justice and peace. It
was adopted by the General Assembly of the United Nations on 10 December
1948. In December 1948, the General Assembly of the United Nations adopted
and proclaimed the Universal Declaration of Human Rights. This declaration
formally announced that “[n]o one shall be subjected to arbitrary interference
with his privacy, family, home or correspondence [.]” The statement was intended
to encompass a wide range of conduct, as evidenced by Article 12 of the
Declaration, which describes both the territorial and the communications notions
of privacy.
Link to text of: Universal Declaration of Human Rights
Associated term(s): Declaration of Human Rights
Return to top
• add
Urgency Procedure
• add
US-CERT
A partnership between the Department of Homeland Security and the public and
private sectors intended to coordinate the response to security threats from the
Internet. As such, it releases information about current security issues,
vulnerabilities and exploits via the National Cyber Alert System and works with
software vendors to create patches for security vulnerabilities.
Link to: National Cyber Alert System
Link to: U.S. Computer Emergency Readiness Team
Acronym(s): US-CERT
Return to top
• add
• add
• add
Use Limitation
• add
User Stories
• add
Rely on the identity of the user to determine whether to grant or deny access to a
desired resource.
Return to top
• add
Value-Added Services
• add
Value-Sensitive Design
A design approach that accounts for moral and ethical values. Values
include privacy, trust, fairness, informed consent, courtesy or freedom from bias.
Assess the values in relation to specific technologies and stakeholders.
Return to top
• add
Vendor Management
• add
Verification
Refer to definition for Authorization.
Return to top
• add
Video Surveillance
• add
• add
• add
Vital Interests
• add
A technology that allows telephone calls to be made over a LAN or the Internet
itself. Skype is a well-known example. VoIP poses the same risk as network-
connected PBX systems but also poses the additional risk of data interception
when such data travel over an unsecured connection. VoIP functionality should
be encrypted where possible and equipment monitored with intrusion-detection
systems.
Acronym(s): VoIP
Return to top
• add
Vulnerability management
Assessing and developing plans for the capability and probability that a threat
actor's acts will succeed.
Return to top
• add
Web Beacon
Also known as a web bug, pixel tag or clear GIF, a web beacon is a clear graphic
image (typically one pixel in size) that is delivered through a web browser
or HTML e-mail. The web beacon operates as a tag that records an end user’s visit
to a particular web page or viewing of a particular e-mail. It is also often used in
conjunction with a web cookie and provided as part of a third-party tracking
service. Web beacons provide an ability to produce specific profiles of user
behavior in combination with web server logs. Common usage scenarios for web
beacons include online ad impression counting, file download monitoring, and ad
campaign performance management. Web beacons also can report to the sender
about which e-mails are read by recipients. Privacy considerations for web
beacons are similar to those for cookies. Some sort of notice is important because
the clear pixel of a web beacon is quite literally invisible to the end user.
Associated term(s): Web Bug, Pixel Tag, Tracking Bug, Clear GIF
Return to top
• add
WebTrust
• add
Whaling
• add
Whistleblowing
• add
• add
Work Product Information
• add
Works Councils
Works councils, primarily in the European Union, are bodies that represent
employees and have certain rights under local law that affect the use of employee
data by employers. Works councils can have a role in deciding whether
employees’ personal data can be processed because they typically have an
obligation to safeguard employee rights, which include data protection and
privacy rights. They are most likely to be encountered in a data protection setting
in Germany.
Associated term(s): Labor Unions; Unions; Labour Unions
Return to top
• add
Worm
• add
Acronym(s): WORM
Return to top