Data | Online Privacy |
Encryption | Cookies |
Cybersecurity | Anonymity |
Data Breach | Phishing |
An individual's entitlement to govern and safeguard their personal information as well as monitor their activities carried out on the internet. | Information, facts, or statistics that are gatherable, dissectible, and actionable for a multitude of reasons. |
Small text files are stored on a user's device, which are utilized for monitoring and storing information regarding their browsing activities. | The process of encoding information in a manner that permits access and comprehension solely by authorized parties. |
The condition of being anonymous is characterized by the absence or concealment of a person's identity or personal information. | Protecting computer systems, networks, and data from unauthorized access, attacks, and breaches is the practice of safeguarding digital assets. |
A deceitful online method that dupes individuals into divulging their personal or sensitive information is known as a fraudulent activity. | Unauthorized individuals gain access to and exploit sensitive or confidential data when they gain entry to information intended to be kept private or classified. |
Digital Footprint | Privacy Policy |
Data Privacy | Security Breach |
Identity Theft | Data Breaches |
Tracking | Consent |
A statement or document that illustrates the methods by which an organization gathers, utilizes, and safeguards the personal information of its users or customers. | The collection of data and information created from an individual's online activities and engagements that are left as evidence. |
An incident where unauthorized individuals gain access to confidential or sensitive data, potentially leading to privacy violations. | The protection of personal information and sensitive data from unauthorized access, use, or disclosure. |
Incidents where unauthorized individuals gain access to data, often resulting in potential harm or privacy violations. | The fraudulent acquisition and use of an individual's personal information, usually for financial gain, without their consent. |
The voluntary granting of permission by an individual for the collection, use, and sharing of their personal data. | The act of monitoring and recording the online activities, behaviors, and preferences of individuals without their explicit consent. |
Accuracy | Retention |
Data Protection Laws | Personal Data |
Data Subject | Data Controller |
Data Minimization | Anonymization |
the practice of keeping and storing data for a specific period of time, as legally required or for business purposes | the degree to which data correctly represents the real-world scenario or situation |
Any information that can identify an individual, such as their name, address, phone number, or social security number. | A set of regulations and guidelines that govern the handling and safeguarding of personal data to ensure the privacy and security of individuals. |
A person or organization that collects, determines the purposes of, and is responsible for the processing of personal data. | An individual who can be identified by their personal data and has certain rights over its processing and protection. |
The process of removing personally identifiable information from data, making it impossible to associate with a specific individual. | Reducing the amount of personal data collected and processed to only what is necessary for a specific purpose. |