107+ Terms

Data Protection Glossary

A comprehensive reference for data protection, privacy compliance, and information security terminology. From DPDPA to GDPR, understand every concept.

Regulations (28)Compliance (49)Technology (30)

A

B

C

CCPA/CPRA (California Consumer Privacy Act / California Privacy Rights Act)

Regulations

The CCPA, as amended by the CPRA, is California's comprehensive consumer privacy law granting residents the right to know, delete, and opt out of the sale or sharing of their personal information, enforced by the California Privacy Protection Agency.

Cloud Data Protection

Technology

Cloud data protection encompasses the policies, technologies, and controls used to protect personal data stored and processed in cloud computing environments.

Code of Conduct

Compliance

A code of conduct in data protection is a set of rules developed by an industry association or group of organizations that specifies how data protection regulations apply to specific processing activities within their sector.

Compliance Audit

Compliance

A compliance audit is a systematic review of an organization's adherence to data protection laws, regulations, policies, and standards, identifying gaps and areas for improvement.

Consent Management

Compliance

Consent management is the systematic process of obtaining, recording, tracking, and managing individuals' consent for the collection and processing of their personal data in compliance with privacy regulations.

Cookie Consent

Compliance

Cookie consent is the requirement under privacy laws for websites to obtain user permission before placing non-essential cookies or similar tracking technologies on a user's device.

COPPA (Children's Online Privacy Protection Act)

Regulations

COPPA is a US federal law that requires websites and online services directed at children under 13 to obtain verifiable parental consent before collecting personal information from children.

Cross-Border Data Transfer

Compliance

Cross-border data transfer refers to the movement of personal data from one country or jurisdiction to another, which is regulated by data protection laws that impose specific requirements to ensure adequate protection.

D

Dark Data

Technology

Dark data is information collected and stored by an organization but never analyzed, used, or leveraged, often containing personal data that creates unmanaged privacy risk.

Data Anonymization

Technology

Anonymization irreversibly transforms personal data so that individuals can no longer be identified, even by the data controller, removing the data from privacy regulation scope.

Data Breach Notification

Compliance

Data breach notification is the legal requirement for organizations to inform supervisory authorities and affected individuals when a security incident results in unauthorized access to, or loss of, personal data.

Data Catalog

Technology

A data catalog is a centralized inventory of data assets across an organization, providing metadata, classification, lineage, and search capabilities for data governance.

Data Classification

Technology

Data classification is the process of categorizing data by sensitivity level, type, and regulatory applicability to determine appropriate protection measures and handling procedures.

Data Discovery

Technology

Data discovery is the automated process of identifying and cataloging personal data across an organization technology landscape, including databases, file systems, cloud storage, and SaaS applications.

Data Encryption

Technology

Encryption transforms readable data into an unreadable format using cryptographic algorithms, protecting confidentiality by ensuring only authorized parties with the correct key can access the data.

Data Fiduciary

Compliance

A Data Fiduciary under India's DPDPA is any person or entity that alone or in conjunction with others determines the purpose and means of processing digital personal data, analogous to a data controller under the GDPR.

Data Governance

Compliance

Data governance is the overall management of data availability, usability, integrity, and security within an organization, establishing policies, procedures, and accountability for data management.

Data Inventory

Compliance

A data inventory is a comprehensive catalog of all personal data an organization collects, stores, and processes, including details about data types, locations, purposes, and retention periods.

Data Lineage

Technology

Data lineage tracks the origin, movement, and transformation of data through systems, providing visibility into how personal data flows across the organization.

Data Loss Prevention (DLP)

Technology

DLP is a set of tools and processes that detect and prevent unauthorized transmission, sharing, or exfiltration of sensitive personal data outside the organization.

Data Mapping

Compliance

Data mapping is the process of identifying and documenting how personal data flows through an organization, including where it is collected, stored, processed, shared, and eventually deleted.

Data Mapping

Technology

Data mapping documents where personal data exists, how it flows between systems, who has access, and what processing activities are performed.

Data Masking

Technology

Data masking replaces sensitive data with realistic but fictitious values, protecting privacy while maintaining data utility for testing, development, and analytics.

Data Minimization

Compliance

Data minimization is a core data protection principle requiring organizations to collect and process only the personal data that is strictly necessary for the specified purpose, and no more.

Data Principal / Data Subject

Compliance

A Data Principal (under India's DPDPA) or Data Subject (under the GDPR) is the individual whose personal data is being collected, processed, or stored by an organization.

Data Processing Agreement

Compliance

A Data Processing Agreement is a legally binding contract between a data controller and a data processor that governs how personal data will be processed, ensuring compliance with data protection regulations.

Data Protection Board

Compliance

A Data Protection Board is a regulatory body established to oversee and enforce data protection laws, such as the Data Protection Board of India under the DPDPA or the European Data Protection Board under the GDPR.

Data Protection Certification

Compliance

Data protection certification is a formal attestation by an accredited body that an organization's data processing operations comply with specific data protection standards or regulatory requirements.

Data Protection Impact Assessment (DPIA)

Compliance

A Data Protection Impact Assessment is a systematic process for evaluating the potential impact of a data processing activity on individuals' privacy, required under the GDPR for processing likely to result in high risk to data subjects.

Data Pseudonymization

Technology

Pseudonymization replaces direct identifiers with artificial identifiers, reducing privacy risk while maintaining data utility, but the data remains personal data under GDPR.

Data Retention

Technology

Data retention refers to policies and practices governing how long personal data is stored before being deleted or anonymized, aligned with regulatory storage limitation requirements.

Data Stewardship

Compliance

Data stewardship is the management and oversight of an organization's data assets by designated individuals who ensure data quality, compliance, and proper handling throughout the data lifecycle.

Data Subject

Compliance

A data subject is an identified or identifiable natural person whose personal data is being collected, held, or processed by an organization.

Data Subject Access Request (DSAR)

Compliance

A Data Subject Access Request is a formal request made by an individual to an organization to obtain confirmation of whether their personal data is being processed and, if so, to receive a copy of that data along with details about how it is used.

Data Subject Rights (DSR)

Compliance

Data Subject Rights are the legal rights granted to individuals under data protection laws, enabling them to control how their personal data is collected, used, stored, and shared by organizations.

Data Tokenization

Technology

Tokenization replaces sensitive data with non-sensitive tokens that can be mapped back to the original data through a secure token vault, protecting data while preserving processability.

Differential Privacy

Technology

Differential privacy is a mathematical framework that adds calibrated noise to data or query results, enabling statistical analysis while providing provable privacy guarantees for individuals.

DPA 2018 (UK Data Protection Act)

Regulations

The UK Data Protection Act 2018 is the United Kingdom's implementation of the GDPR into domestic law, supplementing the UK GDPR with provisions for law enforcement processing, intelligence services, and specific UK exemptions.

DPDPA (Digital Personal Data Protection Act)

Regulations

The Digital Personal Data Protection Act is India's comprehensive data privacy law enacted in 2023, governing the processing of digital personal data with an emphasis on consent, data fiduciary obligations, and the rights of data principals.

DPDPA Chapter III (Rights of Data Principal)

Regulations

Chapter III of India's DPDPA establishes the rights of Data Principals including the right to information, correction, erasure, grievance redressal, and nomination, forming the core of individual data protection under Indian law.

E

F

G

H

I

L

M

N

O

P

PCI DSS (Payment Card Industry Data Security Standard)

Regulations

PCI DSS is a set of security standards established by major credit card companies to protect cardholder data, requiring organizations that handle payment card information to meet twelve security requirements.

PDPA (Personal Data Protection Act - Singapore)

Regulations

Singapore's PDPA is a comprehensive data protection law that governs the collection, use, disclosure, and care of personal data by organizations, enforced by the Personal Data Protection Commission.

PDPA (Personal Data Protection Act - Thailand)

Regulations

Thailand's PDPA is a comprehensive data protection law modeled after the GDPR that regulates the collection, use, and disclosure of personal data, with full enforcement beginning in June 2022.

Personally Identifiable Information (PII)

Technology

PII is any information that can be used to identify a specific individual, including names, addresses, email addresses, phone numbers, Social Security numbers, and biometric data.

PIPEDA (Personal Information Protection and Electronic Documents Act)

Regulations

PIPEDA is Canada's federal private-sector privacy law that governs how commercial organizations collect, use, and disclose personal information in the course of commercial activities.

PIPL (Personal Information Protection Law - China)

Regulations

The PIPL is China's comprehensive personal information protection law that regulates the processing of personal information by organizations inside and outside China, with strict cross-border data transfer requirements.

POPIA (Protection of Personal Information Act)

Regulations

POPIA is South Africa's comprehensive data protection law that promotes the protection of personal information processed by public and private bodies, enforced by the Information Regulator.

Privacy Act (Australia)

Regulations

Australia's Privacy Act 1988 regulates the handling of personal information by Australian Government agencies and private sector organizations, built around thirteen Australian Privacy Principles.

Privacy by Default

Compliance

Privacy by Default means that the strictest privacy settings automatically apply when a customer acquires a new product or service, without requiring any manual input or configuration by the individual.

Privacy by Design

Compliance

Privacy by Design is a proactive approach that embeds data protection safeguards into the design and architecture of IT systems, business practices, and products from the earliest stages of development.

Privacy Framework

Compliance

A privacy framework is a structured set of guidelines, standards, and best practices that organizations use to develop and maintain their data protection and privacy compliance programs.

Privacy Impact Assessment (PIA)

Compliance

A Privacy Impact Assessment is a process used to identify and evaluate the privacy risks of a project, system, or initiative, helping organizations mitigate risks before they materialize.

Privacy Notice / Privacy Policy

Compliance

A privacy notice is a public-facing document that informs individuals about how an organization collects, uses, stores, shares, and protects their personal data, as required by data protection regulations.

Privacy Program

Compliance

A privacy program is a comprehensive organizational framework encompassing the policies, procedures, people, and technologies that manage an organization's data protection obligations and privacy risks.

Privacy Shield

Regulations

Privacy Shield was a framework governing transatlantic data transfers between the EU and the US, invalidated by the EU Court of Justice in 2020 and subsequently replaced by the EU-US Data Privacy Framework in 2023.

Privacy-Enhancing Technologies (PETs)

Technology

PETs are technologies designed to protect personal data privacy while enabling data processing, analysis, and sharing for legitimate purposes.

Profiling Under GDPR

Compliance

Profiling under the GDPR is any form of automated processing of personal data that evaluates personal aspects of a natural person, such as analyzing or predicting behavior, preferences, interests, or movements.

Protected Health Information (PHI)

Technology

PHI is individually identifiable health information held or transmitted by a covered entity or its business associate, protected under HIPAA regulations.

Purpose Limitation

Compliance

Purpose limitation is a data protection principle requiring that personal data be collected for specified, explicit, and legitimate purposes and not further processed in a manner incompatible with those purposes.

R

Records of Processing Activities (ROPA)

Compliance

Records of Processing Activities is a mandatory documentation requirement under the GDPR that obliges organizations to maintain detailed records of all personal data processing activities they conduct.

Regulatory Compliance

Compliance

Regulatory compliance refers to an organization's adherence to laws, regulations, guidelines, and specifications relevant to its data processing and business operations.

Right of Access

Compliance

The right of access grants individuals the ability to obtain from an organization confirmation of whether their personal data is being processed and to receive a copy of that data along with key details about the processing.

Right to Data Portability

Compliance

The right to data portability allows individuals to receive their personal data in a structured, commonly used, and machine-readable format, and to transmit that data to another organization.

Right to Erasure (Right to Be Forgotten)

Compliance

The right to erasure, also known as the right to be forgotten, allows individuals to request that organizations delete their personal data when it is no longer necessary, consent is withdrawn, or processing is unlawful.

Right to Object

Compliance

The right to object allows individuals to oppose the processing of their personal data in certain circumstances, including processing based on legitimate interests, direct marketing, and research or statistical purposes.

Right to Rectification

Compliance

The right to rectification allows individuals to request that an organization correct inaccurate personal data or complete incomplete personal data held about them.

Right to Restrict Processing

Compliance

The right to restrict processing allows individuals to request that an organization limits its processing of their personal data in certain circumstances, such as while the accuracy of the data is being verified.

Role-Based Access Control (RBAC)

Technology

RBAC restricts system access based on user roles within an organization, granting permissions to roles rather than individual users.

S

Secure Data Deletion

Technology

Secure data deletion ensures personal data is permanently and irreversibly removed from all storage systems, supporting the right to erasure and storage limitation.

Sensitive Personal Data

Technology

Sensitive personal data includes special categories such as health information, biometric data, racial or ethnic origin, religious beliefs, and sexual orientation that require enhanced protection.

Shadow IT

Technology

Shadow IT refers to technology systems, applications, and cloud services used within an organization without formal IT department approval or oversight.

Significant Data Fiduciary

Compliance

A Significant Data Fiduciary is a designation under India's DPDPA for Data Fiduciaries that process large volumes of personal data, carrying additional obligations including appointing a DPO and conducting impact assessments.

SOC 2

Regulations

SOC 2 is a compliance framework developed by the AICPA that evaluates an organization's controls related to security, availability, processing integrity, confidentiality, and privacy of customer data.

SOX (Sarbanes-Oxley Act)

Regulations

The Sarbanes-Oxley Act is a US federal law that establishes requirements for financial reporting, internal controls, and record retention for publicly traded companies to protect investors from fraudulent accounting.

Standard Contractual Clauses (SCC)

Compliance

Standard Contractual Clauses are pre-approved model contractual clauses adopted by the European Commission to facilitate lawful international transfers of personal data to countries outside the EEA.

Standard Contractual Clauses (SCCs)

Regulations

Standard Contractual Clauses are pre-approved contractual terms adopted by the European Commission that provide appropriate safeguards for transferring personal data from the EU to countries without an adequacy decision.

Storage Limitation

Compliance

Storage limitation is a data protection principle requiring organizations to retain personal data only for as long as necessary to fulfill the purposes for which it was collected, then securely delete or anonymize it.

Supervisory Authority

Compliance

A supervisory authority is an independent public body established by a country to monitor and enforce compliance with data protection laws, such as the ICO in the UK or the CNIL in France.

Synthetic Data

Technology

Synthetic data is artificially generated data that statistically resembles real data but contains no actual personal information, useful for testing, development, and analytics.

Z