Search for glossary terms (regular expression allowed)
Term Definition
encryption

Encryption is a way to conceal information by altering it so that it appears to be random data. Encryption is essential for security on the Internet.

-
Encryption
Is a means of preventing anyone other than those who have a key from accessing data, be it in an email, on a PC or on a storage device.
Endpoint
Any device (which includes a laptop, phone, tablet or server) connected to a secure organisation/business network.
Erasure
Article 17(1) of the GDPR establishes that data subjects have the right to erasure of their personal data if: the data is no longer needed for its original purpose and no new lawful purpose exists; the lawful basis for the processing is the data subject
Extractive AI
An AI tool that extracts data from the dataset it
has been trained on (but can't create data).
Fairness
Fairness means data subjects must be aware of the fact that their personal data will be processed, including how the data will be collected, kept and used, to allow them to make an informed decision about whether they agree with such processing and to enable them to exercise their data protection rights. Consent notices should not contain unfair terms and supervisory authority powers should similarly be exercised fairly.
FBI
Federal Bureau of Investigation
firewall

A firewall is a network security device that prevents unauthorised access to a network. It inspects incoming and outgoing traffic using a set of security rules to identify and block threats.

Freely Given
The General Data Protection Regulation requires that consent be a freely given, specific, informed and unambiguous indication of the data subject
General Data Protection Regulation
The General Data Protection Regulation (GDPR) replaced the Data Protection Directive in 2018. The aim of the GDPR is to provide one set of data protection rules for all EU member states and the European Economic Area (EEA). The document comprises 173 recitals and 99 articles.
Generative AI
An AI tool that generates new, realistic content
in the form of text, audio, computer code, data
or images etc.
Genetic Data
means personal data relating to the inherited or acquired genetic characteristics of a natural person which give unique information about the physiology or the health of that natural person and which result, in particular, from an analysis of a biological sample from the natural person in question
Guardrails
In AI, guardrails are mechanisms or guidelines designed to ensure that AI systems operate safely, ethically, and within predefined boundaries to prevent harmful or undesirable outcomes.
hacker

Someone with some computer skills who uses them to break into computers, systems and networks.

-
Halloucinations
Instances where generative AI model creates content that either contradicts the source or creates factually incorrect output under the appearance of fact.
ICO

Information Commissioner's Office, the UK data protection regulator.

https://ico.org.uk/

Identity fraud
Identity fraud occurs when someone uses another person's personal information (like their name, date of birth, address, or financial details) without their permission to commit a crime, often for financial gain. This can involve opening new credit accounts, making purchases, or obtaining benefits in the victim's name, leaving them with damaged credit or debt.
Immutable storage
Immutable storage is a data storage method that prevents data from being modified or deleted after it has been created. It uses the write-once-read-many (WORM) technology to ensure that data can only be read, but not overwritten.
impersonation
In cybersecurity, impersonation refers to a deceptive tactic where a malicious actor assumes the identity of a legitimate or trusted individual, organization, or system with the intent to deceive a target. The goal is to trick the victim into performing actions that benefit the attacker, such as divulging sensitive information (e.g., credentials, financial data), making fraudulent payments, or granting unauthorized access to systems or networks. Impersonation attacks often leverage social engineering techniques and can manifest through various channels, including email (e.g., Business Email Compromise - BEC, CEO fraud), phone calls (vishing), text messages (smishing), fake websites, or compromised social media accounts.
Synonyms - Impersonation
Information Security
The protection of information for the purposes of preventing loss, unauthorized access and/or misuse. It is also the process of assessing threats and risks to information and the procedures and controls to preserve confidentiality, integrity and availability of information.

Search