Data Protection Glossary
A comprehensive reference for data protection, privacy compliance, and information security terminology. From DPDPA to GDPR, understand every concept.
A
Access Control
TechnologyAccess control restricts who can view, modify, or delete data based on identity, role, and authorization policies, ensuring only authorized personnel access personal data.
Accountability Principle
ComplianceThe accountability principle requires organizations to demonstrate their compliance with data protection principles through proper documentation, policies, procedures, and technical measures.
Adequacy Decision
RegulationsAn adequacy decision is a determination by the European Commission that a third country or international organization provides an adequate level of data protection, allowing free transfer of personal data from the EU without additional safeguards.
API Security
TechnologyAPI security encompasses practices and technologies that protect application programming interfaces from unauthorized access and data exposure.
APPI (Act on the Protection of Personal Information)
RegulationsThe APPI is Japan's primary data protection law that regulates the handling of personal information by business operators, with 2022 amendments strengthening individual rights and cross-border transfer rules.
Automated Decision-Making
ComplianceAutomated decision-making refers to decisions made by technological means without human involvement, which under the GDPR is restricted when it produces legal or similarly significant effects on individuals.
B
Binding Corporate Rules (BCR)
ComplianceBinding Corporate Rules are internal codes of conduct approved by data protection authorities that permit multinational organizations to transfer personal data within their corporate group across international borders.
Binding Corporate Rules (BCRs)
RegulationsBinding Corporate Rules are internal data protection policies approved by EU supervisory authorities that allow multinational organizations to transfer personal data within their corporate group to countries without adequate data protection.
C
CCPA/CPRA (California Consumer Privacy Act / California Privacy Rights Act)
RegulationsThe CCPA, as amended by the CPRA, is California's comprehensive consumer privacy law granting residents the right to know, delete, and opt out of the sale or sharing of their personal information, enforced by the California Privacy Protection Agency.
Cloud Data Protection
TechnologyCloud data protection encompasses the policies, technologies, and controls used to protect personal data stored and processed in cloud computing environments.
Code of Conduct
ComplianceA code of conduct in data protection is a set of rules developed by an industry association or group of organizations that specifies how data protection regulations apply to specific processing activities within their sector.
Compliance Audit
ComplianceA compliance audit is a systematic review of an organization's adherence to data protection laws, regulations, policies, and standards, identifying gaps and areas for improvement.
Consent Management
ComplianceConsent management is the systematic process of obtaining, recording, tracking, and managing individuals' consent for the collection and processing of their personal data in compliance with privacy regulations.
Cookie Consent
ComplianceCookie consent is the requirement under privacy laws for websites to obtain user permission before placing non-essential cookies or similar tracking technologies on a user's device.
COPPA (Children's Online Privacy Protection Act)
RegulationsCOPPA is a US federal law that requires websites and online services directed at children under 13 to obtain verifiable parental consent before collecting personal information from children.
Cross-Border Data Transfer
ComplianceCross-border data transfer refers to the movement of personal data from one country or jurisdiction to another, which is regulated by data protection laws that impose specific requirements to ensure adequate protection.
D
Dark Data
TechnologyDark data is information collected and stored by an organization but never analyzed, used, or leveraged, often containing personal data that creates unmanaged privacy risk.
Data Anonymization
TechnologyAnonymization irreversibly transforms personal data so that individuals can no longer be identified, even by the data controller, removing the data from privacy regulation scope.
Data Breach Notification
ComplianceData breach notification is the legal requirement for organizations to inform supervisory authorities and affected individuals when a security incident results in unauthorized access to, or loss of, personal data.
Data Catalog
TechnologyA data catalog is a centralized inventory of data assets across an organization, providing metadata, classification, lineage, and search capabilities for data governance.
Data Classification
TechnologyData classification is the process of categorizing data by sensitivity level, type, and regulatory applicability to determine appropriate protection measures and handling procedures.
Data Discovery
TechnologyData discovery is the automated process of identifying and cataloging personal data across an organization technology landscape, including databases, file systems, cloud storage, and SaaS applications.
Data Encryption
TechnologyEncryption transforms readable data into an unreadable format using cryptographic algorithms, protecting confidentiality by ensuring only authorized parties with the correct key can access the data.
Data Fiduciary
ComplianceA Data Fiduciary under India's DPDPA is any person or entity that alone or in conjunction with others determines the purpose and means of processing digital personal data, analogous to a data controller under the GDPR.
Data Governance
ComplianceData governance is the overall management of data availability, usability, integrity, and security within an organization, establishing policies, procedures, and accountability for data management.
Data Inventory
ComplianceA data inventory is a comprehensive catalog of all personal data an organization collects, stores, and processes, including details about data types, locations, purposes, and retention periods.
Data Lineage
TechnologyData lineage tracks the origin, movement, and transformation of data through systems, providing visibility into how personal data flows across the organization.
Data Loss Prevention (DLP)
TechnologyDLP is a set of tools and processes that detect and prevent unauthorized transmission, sharing, or exfiltration of sensitive personal data outside the organization.
Data Mapping
ComplianceData mapping is the process of identifying and documenting how personal data flows through an organization, including where it is collected, stored, processed, shared, and eventually deleted.
Data Mapping
TechnologyData mapping documents where personal data exists, how it flows between systems, who has access, and what processing activities are performed.
Data Masking
TechnologyData masking replaces sensitive data with realistic but fictitious values, protecting privacy while maintaining data utility for testing, development, and analytics.
Data Minimization
ComplianceData minimization is a core data protection principle requiring organizations to collect and process only the personal data that is strictly necessary for the specified purpose, and no more.
Data Principal / Data Subject
ComplianceA Data Principal (under India's DPDPA) or Data Subject (under the GDPR) is the individual whose personal data is being collected, processed, or stored by an organization.
Data Processing Agreement
ComplianceA Data Processing Agreement is a legally binding contract between a data controller and a data processor that governs how personal data will be processed, ensuring compliance with data protection regulations.
Data Protection Board
ComplianceA Data Protection Board is a regulatory body established to oversee and enforce data protection laws, such as the Data Protection Board of India under the DPDPA or the European Data Protection Board under the GDPR.
Data Protection Certification
ComplianceData protection certification is a formal attestation by an accredited body that an organization's data processing operations comply with specific data protection standards or regulatory requirements.
Data Protection Impact Assessment (DPIA)
ComplianceA Data Protection Impact Assessment is a systematic process for evaluating the potential impact of a data processing activity on individuals' privacy, required under the GDPR for processing likely to result in high risk to data subjects.
Data Pseudonymization
TechnologyPseudonymization replaces direct identifiers with artificial identifiers, reducing privacy risk while maintaining data utility, but the data remains personal data under GDPR.
Data Retention
TechnologyData retention refers to policies and practices governing how long personal data is stored before being deleted or anonymized, aligned with regulatory storage limitation requirements.
Data Stewardship
ComplianceData stewardship is the management and oversight of an organization's data assets by designated individuals who ensure data quality, compliance, and proper handling throughout the data lifecycle.
Data Subject
ComplianceA data subject is an identified or identifiable natural person whose personal data is being collected, held, or processed by an organization.
Data Subject Access Request (DSAR)
ComplianceA Data Subject Access Request is a formal request made by an individual to an organization to obtain confirmation of whether their personal data is being processed and, if so, to receive a copy of that data along with details about how it is used.
Data Subject Rights (DSR)
ComplianceData Subject Rights are the legal rights granted to individuals under data protection laws, enabling them to control how their personal data is collected, used, stored, and shared by organizations.
Data Tokenization
TechnologyTokenization replaces sensitive data with non-sensitive tokens that can be mapped back to the original data through a secure token vault, protecting data while preserving processability.
Differential Privacy
TechnologyDifferential privacy is a mathematical framework that adds calibrated noise to data or query results, enabling statistical analysis while providing provable privacy guarantees for individuals.
DPA 2018 (UK Data Protection Act)
RegulationsThe UK Data Protection Act 2018 is the United Kingdom's implementation of the GDPR into domestic law, supplementing the UK GDPR with provisions for law enforcement processing, intelligence services, and specific UK exemptions.
DPDPA (Digital Personal Data Protection Act)
RegulationsThe Digital Personal Data Protection Act is India's comprehensive data privacy law enacted in 2023, governing the processing of digital personal data with an emphasis on consent, data fiduciary obligations, and the rights of data principals.
DPDPA Chapter III (Rights of Data Principal)
RegulationsChapter III of India's DPDPA establishes the rights of Data Principals including the right to information, correction, erasure, grievance redressal, and nomination, forming the core of individual data protection under Indian law.
E
Encryption at Rest
TechnologyEncryption at rest protects stored data by encrypting it on disk, in databases, or in storage systems, ensuring data confidentiality even if storage media is physically compromised.
Encryption in Transit
TechnologyEncryption in transit protects data as it moves between systems using protocols like TLS/SSL, preventing interception and eavesdropping during transmission.
Enforcement Action
ComplianceAn enforcement action is a measure taken by a supervisory authority or regulatory body against an organization for non-compliance with data protection laws, ranging from warnings to substantial fines.
ePrivacy Directive
RegulationsThe ePrivacy Directive is an EU directive that regulates the processing of personal data in electronic communications, including rules on cookies, direct marketing, and confidentiality of communications.
F
G
Gap Analysis
ComplianceA gap analysis is an assessment that compares an organization's current data protection practices against the requirements of applicable regulations or standards to identify areas of non-compliance.
GDPR (General Data Protection Regulation)
RegulationsThe General Data Protection Regulation is the European Union's comprehensive data protection law that sets strict rules for how organizations collect, store, and process personal data of EU residents, with fines up to 4% of annual global turnover.
GDPR Article 15 (Right of Access)
RegulationsGDPR Article 15 grants data subjects the right to obtain confirmation of whether their personal data is being processed and, if so, access to that data along with specific information about the processing.
GDPR Article 17 (Right to Erasure)
RegulationsGDPR Article 17 establishes the right to erasure, also known as the right to be forgotten, allowing data subjects to request the deletion of their personal data under specific circumstances.
H
I
Identity and Access Management (IAM)
TechnologyIAM is a framework of policies, processes, and technologies that manages digital identities and controls user access to systems and data.
Information Governance
ComplianceInformation governance is the overarching strategy for managing all types of information within an organization, encompassing data governance, records management, compliance, and risk management.
ISO 27701
RegulationsISO 27701 is an international standard that extends ISO 27001 and ISO 27002 to include privacy-specific requirements for establishing, implementing, maintaining, and improving a Privacy Information Management System (PIMS).
L
Lawful Basis for Processing
ComplianceA lawful basis for processing is a legal ground under data protection law that justifies an organization's collection and use of personal data, such as consent, contractual necessity, or legitimate interest.
Legitimate Interest
ComplianceLegitimate interest is a lawful basis under the GDPR that allows organizations to process personal data when they have a genuine and justifiable reason, provided this does not override the fundamental rights and freedoms of the data subject.
LGPD (Lei Geral de Protecao de Dados)
RegulationsThe LGPD is Brazil's general data protection law that regulates the processing of personal data by individuals and organizations, establishing ten legal bases for processing and a national data protection authority (ANPD).
M
N
O
P
PCI DSS (Payment Card Industry Data Security Standard)
RegulationsPCI DSS is a set of security standards established by major credit card companies to protect cardholder data, requiring organizations that handle payment card information to meet twelve security requirements.
PDPA (Personal Data Protection Act - Singapore)
RegulationsSingapore's PDPA is a comprehensive data protection law that governs the collection, use, disclosure, and care of personal data by organizations, enforced by the Personal Data Protection Commission.
PDPA (Personal Data Protection Act - Thailand)
RegulationsThailand's PDPA is a comprehensive data protection law modeled after the GDPR that regulates the collection, use, and disclosure of personal data, with full enforcement beginning in June 2022.
Personally Identifiable Information (PII)
TechnologyPII is any information that can be used to identify a specific individual, including names, addresses, email addresses, phone numbers, Social Security numbers, and biometric data.
PIPEDA (Personal Information Protection and Electronic Documents Act)
RegulationsPIPEDA is Canada's federal private-sector privacy law that governs how commercial organizations collect, use, and disclose personal information in the course of commercial activities.
PIPL (Personal Information Protection Law - China)
RegulationsThe PIPL is China's comprehensive personal information protection law that regulates the processing of personal information by organizations inside and outside China, with strict cross-border data transfer requirements.
POPIA (Protection of Personal Information Act)
RegulationsPOPIA is South Africa's comprehensive data protection law that promotes the protection of personal information processed by public and private bodies, enforced by the Information Regulator.
Privacy Act (Australia)
RegulationsAustralia's Privacy Act 1988 regulates the handling of personal information by Australian Government agencies and private sector organizations, built around thirteen Australian Privacy Principles.
Privacy by Default
CompliancePrivacy by Default means that the strictest privacy settings automatically apply when a customer acquires a new product or service, without requiring any manual input or configuration by the individual.
Privacy by Design
CompliancePrivacy by Design is a proactive approach that embeds data protection safeguards into the design and architecture of IT systems, business practices, and products from the earliest stages of development.
Privacy Framework
ComplianceA privacy framework is a structured set of guidelines, standards, and best practices that organizations use to develop and maintain their data protection and privacy compliance programs.
Privacy Impact Assessment (PIA)
ComplianceA Privacy Impact Assessment is a process used to identify and evaluate the privacy risks of a project, system, or initiative, helping organizations mitigate risks before they materialize.
Privacy Notice / Privacy Policy
ComplianceA privacy notice is a public-facing document that informs individuals about how an organization collects, uses, stores, shares, and protects their personal data, as required by data protection regulations.
Privacy Program
ComplianceA privacy program is a comprehensive organizational framework encompassing the policies, procedures, people, and technologies that manage an organization's data protection obligations and privacy risks.
Privacy Shield
RegulationsPrivacy Shield was a framework governing transatlantic data transfers between the EU and the US, invalidated by the EU Court of Justice in 2020 and subsequently replaced by the EU-US Data Privacy Framework in 2023.
Privacy-Enhancing Technologies (PETs)
TechnologyPETs are technologies designed to protect personal data privacy while enabling data processing, analysis, and sharing for legitimate purposes.
Profiling Under GDPR
ComplianceProfiling under the GDPR is any form of automated processing of personal data that evaluates personal aspects of a natural person, such as analyzing or predicting behavior, preferences, interests, or movements.
Protected Health Information (PHI)
TechnologyPHI is individually identifiable health information held or transmitted by a covered entity or its business associate, protected under HIPAA regulations.
Purpose Limitation
CompliancePurpose limitation is a data protection principle requiring that personal data be collected for specified, explicit, and legitimate purposes and not further processed in a manner incompatible with those purposes.
R
Records of Processing Activities (ROPA)
ComplianceRecords of Processing Activities is a mandatory documentation requirement under the GDPR that obliges organizations to maintain detailed records of all personal data processing activities they conduct.
Regulatory Compliance
ComplianceRegulatory compliance refers to an organization's adherence to laws, regulations, guidelines, and specifications relevant to its data processing and business operations.
Right of Access
ComplianceThe right of access grants individuals the ability to obtain from an organization confirmation of whether their personal data is being processed and to receive a copy of that data along with key details about the processing.
Right to Data Portability
ComplianceThe right to data portability allows individuals to receive their personal data in a structured, commonly used, and machine-readable format, and to transmit that data to another organization.
Right to Erasure (Right to Be Forgotten)
ComplianceThe right to erasure, also known as the right to be forgotten, allows individuals to request that organizations delete their personal data when it is no longer necessary, consent is withdrawn, or processing is unlawful.
Right to Object
ComplianceThe right to object allows individuals to oppose the processing of their personal data in certain circumstances, including processing based on legitimate interests, direct marketing, and research or statistical purposes.
Right to Rectification
ComplianceThe right to rectification allows individuals to request that an organization correct inaccurate personal data or complete incomplete personal data held about them.
Right to Restrict Processing
ComplianceThe right to restrict processing allows individuals to request that an organization limits its processing of their personal data in certain circumstances, such as while the accuracy of the data is being verified.
Role-Based Access Control (RBAC)
TechnologyRBAC restricts system access based on user roles within an organization, granting permissions to roles rather than individual users.
S
Secure Data Deletion
TechnologySecure data deletion ensures personal data is permanently and irreversibly removed from all storage systems, supporting the right to erasure and storage limitation.
Sensitive Personal Data
TechnologySensitive personal data includes special categories such as health information, biometric data, racial or ethnic origin, religious beliefs, and sexual orientation that require enhanced protection.
Shadow IT
TechnologyShadow IT refers to technology systems, applications, and cloud services used within an organization without formal IT department approval or oversight.
Significant Data Fiduciary
ComplianceA Significant Data Fiduciary is a designation under India's DPDPA for Data Fiduciaries that process large volumes of personal data, carrying additional obligations including appointing a DPO and conducting impact assessments.
SOC 2
RegulationsSOC 2 is a compliance framework developed by the AICPA that evaluates an organization's controls related to security, availability, processing integrity, confidentiality, and privacy of customer data.
SOX (Sarbanes-Oxley Act)
RegulationsThe Sarbanes-Oxley Act is a US federal law that establishes requirements for financial reporting, internal controls, and record retention for publicly traded companies to protect investors from fraudulent accounting.
Standard Contractual Clauses (SCC)
ComplianceStandard Contractual Clauses are pre-approved model contractual clauses adopted by the European Commission to facilitate lawful international transfers of personal data to countries outside the EEA.
Standard Contractual Clauses (SCCs)
RegulationsStandard Contractual Clauses are pre-approved contractual terms adopted by the European Commission that provide appropriate safeguards for transferring personal data from the EU to countries without an adequacy decision.
Storage Limitation
ComplianceStorage limitation is a data protection principle requiring organizations to retain personal data only for as long as necessary to fulfill the purposes for which it was collected, then securely delete or anonymize it.
Supervisory Authority
ComplianceA supervisory authority is an independent public body established by a country to monitor and enforce compliance with data protection laws, such as the ICO in the UK or the CNIL in France.
Synthetic Data
TechnologySynthetic data is artificially generated data that statistically resembles real data but contains no actual personal information, useful for testing, development, and analytics.