Search for glossary terms (regular expression allowed)
Term Definition
Article 94: Repeal of Directive 95/46/EC
  1. Directive 95/46/EC is repealed with effect from 25 May 2018.
  2. 1References to the repealed Directive shall be construed as references to this Regulation. 2References to the Working Party on the Protection of Individuals with regard to the Processing of Personal Data established by Article 29 of Directive 95/46/EC shall be construed as references to the European Data Protection Board established by this Regulation.
Synonyms - Article 94
Article 95: Relationship with Directive 2002/58/EC

This Regulation shall not impose additional obligations on natural or legal persons in relation to processing in connection with the provision of publicly available electronic communications services in public communication networks in the Union in relation to matters for which they are subject to specific obligations with the same objective set out in Directive 2002/58/EC.

Synonyms - Article 95
Article 96: Relationship with previously concluded Agreements

International agreements involving the transfer of personal data to third countries or international organisations which were concluded by Member States prior to 24 May 2016, and which comply with Union law as applicable prior to that date, shall remain in force until amended, replaced or revoked.

Synonyms - Article 96
Article 97: Commission reports
  1. 1By 25 May 2020 and every four years thereafter, the Commission shall submit a report on the evaluation and review of this Regulation to the European Parliament and to the Council. 2The reports shall be made public.
  2. In the context of the evaluations and reviews referred to in paragraph 1, the Commission shall examine, in particular, the application and functioning of:
    a) Chapter V on the transfer of personal data to third countries or international organisations with particular regard to decisions adopted pursuant to Article 45(3) of this Regulation and decisions adopted on the basis of Article 25(6) of Directive 95/46/EC;
    b) Chapter VII on cooperation and consistency.
  3. For the purpose of paragraph 1, the Commission may request information from Member States and supervisory authorities.
  4. In carrying out the evaluations and reviews referred to in paragraphs 1 and 2, the Commission shall take into account the positions and findings of the European Parliament, of the Council, and of other relevant bodies or sources.
  5. The Commission shall, if necessary, submit appropriate proposals to amend this Regulation, in particular taking into account of developments in information technology and in the light of the state of progress in the information society.
Synonyms - Article 97
Article 98: Review of other Union legal acts on data protection

1The Commission shall, if appropriate, submit legislative proposals with a view to amending other Union legal acts on the protection of personal data, in order to ensure uniform and consistent protection of natural persons with regard to processing. 2This shall in particular concern the rules relating to the protection of natural persons with regard to processing by Union institutions, bodies, offices and agencies and on the free movement of such data.

 

Synonyms - Article 98
Article 99: Entry into force and application
  1. This Regulation shall enter into force on the twentieth day following that of its publication in the Official Journal of the European Union.
  2. It shall apply from 25 May 2018.
Synonyms - Article 99
authentication app

An authentication app is a software application that generates one-time passwords (OTPs) for two-factor authentication (2FA). Two-factor authentication is a security process that requires users to provide two forms of identification in order to access an account or a service.

The authentication app is used as the second factor of authentication when using MFA (multi factor authentication), typically after the user provides their username and password. The app generates a unique OTP that can be used only once, and the user has to enter this OTP along with their username and password to access the account or service.

Examples of popular authentication apps include Google Authenticator, Microsoft Authenticator, and Authy. These apps are commonly used for account logins, online banking, and other sensitive online transactions. Authentication apps offer an additional layer of security and help protect against identity theft, fraud, and other cyber threats.

Automated Processing
Processing which significantly affects a person and which is based solely on automated processing of personal data in order to evaluate this person.
Availability
Data is "available" if it is accessible when needed by the organisation or data subject. The General Data Protection Regulation requires that a business be able to ensure the availability of personal data and have the ability to restore the availability and access to personal data in a timely manner in the event of a physical or technical incident.
Biometric Data
means personal data resulting from specific technical processing relating to the physical, physiological or behavioural characteristics of a natural person, which allow or confirm the unique identification of that natural person, such as facial images
biometrics

Biometrics are biological measurements, or physical characteristics, that can be used to identify individuals.

-
brute force attack

A brute force attack uses trial-and-error to guess login info, encryption keys, or find a hidden web page.

-
captcha

A computer program or system intended to distinguish human from machine input, typically as a way of thwarting spam and automated extraction of data from websites

-
CCTV
Closed circuit television usually recorded and stored for security or monitoring purposes.
Children's Code

The Children’s code (or Age appropriate design code to give its formal title) is a data protection code of practice for online services, such as apps, online games, and web and social media sites, likely to be accessed by children.

Synonyms - Children's Code
CISA
Cybersecurity and Infrastructure Security Agency
cloud

Where shared computer and storage resources are accessed as a service (usually online), instead of hosted locally on physical services. Resources can include infrastructure, platform or software services.

-
Cloud Computing
Cloud computing is Internet-based computing, whereby shared resources, software and information are provided to computers and other devices on-demand and it typically involves the provision of dynamically scalable and often virtualised resources as a service over the Internet.
Codes of Conduct
Introduced by the General Data Protection Regulation, codes of conduct are a new valid adequacy mechanism for the transfer of personal data outside of the European Union in the absence of an adequacy decision and instead of other mechanisms such as binding corporate rules or contractual clauses. Codes of conduct must be developed by industry trade groups, associations or other bodies representing categories of controllers or processors. They must be approved by supervisory authorities or the European Data Protection Board, and have a methodology for auditing compliance.
Collection Limitation
A fair information practices principle, it is the principle stating there should be limits to the collection of personal data, that any such data should be obtained by lawful and fair means and, where appropriate, with the knowledge or consent of the data subject.

Search