Term | Definition |
---|---|
Article 90: Obligations of secrecy |
|
Article 91: Existing data protection rules of churches and religious associations |
|
Article 92: Exercise of the delegation |
|
Article 93: Committee procedure |
|
Article 94: Repeal of Directive 95/46/EC |
|
Article 95: Relationship with Directive 2002/58/EC | This Regulation shall not impose additional obligations on natural or legal persons in relation to processing in connection with the provision of publicly available electronic communications services in public communication networks in the Union in relation to matters for which they are subject to specific obligations with the same objective set out in Directive 2002/58/EC. |
Article 96: Relationship with previously concluded Agreements | International agreements involving the transfer of personal data to third countries or international organisations which were concluded by Member States prior to 24 May 2016, and which comply with Union law as applicable prior to that date, shall remain in force until amended, replaced or revoked. |
Article 97: Commission reports |
|
Article 98: Review of other Union legal acts on data protection | 1The Commission shall, if appropriate, submit legislative proposals with a view to amending other Union legal acts on the protection of personal data, in order to ensure uniform and consistent protection of natural persons with regard to processing. 2This shall in particular concern the rules relating to the protection of natural persons with regard to processing by Union institutions, bodies, offices and agencies and on the free movement of such data.
|
Article 99: Entry into force and application |
|
authentication app | An authentication app is a software application that generates one-time passwords (OTPs) for two-factor authentication (2FA). Two-factor authentication is a security process that requires users to provide two forms of identification in order to access an account or a service. The authentication app is used as the second factor of authentication when using MFA (multi factor authentication), typically after the user provides their username and password. The app generates a unique OTP that can be used only once, and the user has to enter this OTP along with their username and password to access the account or service. Examples of popular authentication apps include Google Authenticator, Microsoft Authenticator, and Authy. These apps are commonly used for account logins, online banking, and other sensitive online transactions. Authentication apps offer an additional layer of security and help protect against identity theft, fraud, and other cyber threats. |
Automated Processing |
Processing which significantly affects a person and which is based solely on automated processing of personal data in order to evaluate this person.
|
Availability |
Data is "available" if it is accessible when needed by the organisation or data subject. The General Data Protection Regulation requires that a business be able to ensure the availability of personal data and have the ability to restore the availability and access to personal data in a timely manner in the event of a physical or technical incident.
|
Bias |
In artificial intelligence (AI), bias refers to systematic errors or unfair outcomes that occur in AI systems due to skewed data, flawed algorithms, or human prejudices embedded in the design and training processes. Bias AI can lead to unintended discrimination or inequality in decision-making systems, impacting areas like hiring, lending, healthcare and law enforcement
|
Biometric Data |
means personal data resulting from specific technical processing relating to the physical, physiological or behavioural characteristics of a natural person, which allow or confirm the unique identification of that natural person, such as facial images
|
biometrics | Biometrics are biological measurements, or physical characteristics, that can be used to identify individuals. |
brute force attack | A brute force attack uses trial-and-error to guess login info, encryption keys, or find a hidden web page. |
captcha | A computer program or system intended to distinguish human from machine input, typically as a way of thwarting spam and automated extraction of data from websites |
CCTV |
Closed circuit television usually recorded and stored for security or monitoring purposes.
|
Chatbot |
A Chatbot is a software program that interacts with humans through conversational-style text or voice, as if it were a real person.
|