Term | Definition |
---|---|
Cyber strategy |
A plan of high-level actions of how the organisation will use cyber security to support and enable organisational goals and objectives.
|
dark web | The part of the world wide web that is only accessible by means of special software, allowing users and website operators to remain anonymous or untraceable. |
Data Breach |
means a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, personal data transmitted, stored or otherwise processed
|
Data Controller |
A person, public authority, agency or other body which, alone or jointly with others, determines the purposes and means of the processing of personal data. Only controllers need to pay the data protection fee.
|
Data Minimisation Principle |
The principle of
|
Data Portability |
the right to have their personal data returned to them in an electronic format by the data controller. They may then pass this data onto another controller. This will enable individuals to move to alternative service providers more easily
|
Data Processor |
A person, public authority, agency or other body which processes personal data on behalf of the controller.
|
Data Protection Authority |
A term often used to refer to a supervisory authority, which is an independent public authority responsible for monitoring the application of the General Data Protection Regulation in order to protect the fundamental rights and freedoms of natural persons in relation to processing and to facilitate the free flow of personal data within the European Union.
|
Data Protection by Default |
The implementation of appropriate technical and organisational measures for ensuring that, by default, only personal data which are necessary for each specific purpose of the processing are processed. That obligation applies to the amount of personal data collected, the extent of their processing, the period of their storage and their accessibility. In particular, such measures shall ensure that by default personal data are not made accessible without the individual's intervention to an indefinite number of natural persons. Such organisational measures could consist, inter alia, of minimising the processing of personal data, pseudonymising personal data as soon as possible, transparency with regard to the functions and processing of personal data, and enabling the data subject to monitor the data processing.
|
Data Protection by Design |
data security and privacy compliance must be built into new organisational and technical systems during their development, not added in later. Only data that is determined as
|
Data Protection Impact Assessments |
The controller shall carry out an assessment of the impact of the envisaged processing operations on the protection of personal data when a type of processing is likely to result in a high risk to the rights and freedoms of natural persons.
This assessment has to be done prior to the processing and, in particular if using new technologies, has to take into account the nature, scope, context and purposes of the processing.
|
Data Protection Officer |
Under the GDPR, some organisations need to appoint a data protection officer who is responsible for informing them of and advising them about their data protection obligations and monitoring their compliance with them.
|
Data Protection Policy |
Data protection policies outline the basic contours of the measures an organization takes in the processing and handling of personal data. Key matters the policy should address include: Scope, which explains both to whom the internal policy applies and the type of processing activities it covers; Policy statement; Employee responsibilities; Management responsibilities; Reporting incidents; Policy compliance.
|
Data Protection Principles |
Article 5 of the General Data Protection Regulation lists the principles as such: Lawfulness, fairness and transparency; Purpose limitation; Data minimisation; Accuracy; Storage limitation; Integrity and confidentiality.
|
Data Recipient |
Any person to whom personal data are disclosed, including any person to whom they are disclosed in the course of processing the data for a Data Controller (for example, an employee of the data controller, a data processor or an employee of the data processor).
|
Data Subject |
The identified or identifiable living individual to whom personal data relates.
|
Deep Fake |
Audio visual content that has been altered or maniupulated using AI techniques. Deep fakes are often used to spread misinformation and disinformation.
|
Deep Learning |
A subfield of AI and machine learning that uses artficial neural networks. Deep learning is especially useful in fields where raw data needs to be processed, like image recognition, natural language processing and speech recognition.
|
denial-of-service | A denial-of-service attack (DoS attack) is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to a network. Denial of service is typically accomplished by flooding the targeted machine or resource with superfluous requests in an attempt to overload systems and prevent some or all legitimate requests from being fulfilled |
Direct Marketing |
The communication of advertising or marketing material directed to particular individuals.
|