Term | Definition |
---|---|
Article 94: Repeal of Directive 95/46/EC |
|
Article 95: Relationship with Directive 2002/58/EC | This Regulation shall not impose additional obligations on natural or legal persons in relation to processing in connection with the provision of publicly available electronic communications services in public communication networks in the Union in relation to matters for which they are subject to specific obligations with the same objective set out in Directive 2002/58/EC. |
Article 96: Relationship with previously concluded Agreements | International agreements involving the transfer of personal data to third countries or international organisations which were concluded by Member States prior to 24 May 2016, and which comply with Union law as applicable prior to that date, shall remain in force until amended, replaced or revoked. |
Article 97: Commission reports |
|
Article 98: Review of other Union legal acts on data protection | 1The Commission shall, if appropriate, submit legislative proposals with a view to amending other Union legal acts on the protection of personal data, in order to ensure uniform and consistent protection of natural persons with regard to processing. 2This shall in particular concern the rules relating to the protection of natural persons with regard to processing by Union institutions, bodies, offices and agencies and on the free movement of such data.
|
Article 99: Entry into force and application |
|
authentication app | An authentication app is a software application that generates one-time passwords (OTPs) for two-factor authentication (2FA). Two-factor authentication is a security process that requires users to provide two forms of identification in order to access an account or a service. The authentication app is used as the second factor of authentication when using MFA (multi factor authentication), typically after the user provides their username and password. The app generates a unique OTP that can be used only once, and the user has to enter this OTP along with their username and password to access the account or service. Examples of popular authentication apps include Google Authenticator, Microsoft Authenticator, and Authy. These apps are commonly used for account logins, online banking, and other sensitive online transactions. Authentication apps offer an additional layer of security and help protect against identity theft, fraud, and other cyber threats. |
Automated Processing |
Processing which significantly affects a person and which is based solely on automated processing of personal data in order to evaluate this person.
|
Availability |
Data is "available" if it is accessible when needed by the organisation or data subject. The General Data Protection Regulation requires that a business be able to ensure the availability of personal data and have the ability to restore the availability and access to personal data in a timely manner in the event of a physical or technical incident.
|
Biometric Data |
means personal data resulting from specific technical processing relating to the physical, physiological or behavioural characteristics of a natural person, which allow or confirm the unique identification of that natural person, such as facial images
|
biometrics | Biometrics are biological measurements, or physical characteristics, that can be used to identify individuals. |
brute force attack | A brute force attack uses trial-and-error to guess login info, encryption keys, or find a hidden web page. |
captcha | A computer program or system intended to distinguish human from machine input, typically as a way of thwarting spam and automated extraction of data from websites |
CCTV |
Closed circuit television usually recorded and stored for security or monitoring purposes.
|
Children's Code | The Children’s code (or Age appropriate design code to give its formal title) is a data protection code of practice for online services, such as apps, online games, and web and social media sites, likely to be accessed by children. |
CISA |
Cybersecurity and Infrastructure Security Agency
|
cloud | Where shared computer and storage resources are accessed as a service (usually online), instead of hosted locally on physical services. Resources can include infrastructure, platform or software services. |
Cloud Computing |
Cloud computing is Internet-based computing, whereby shared resources, software and information are provided to computers and other devices on-demand and it typically involves the provision of dynamically scalable and often virtualised resources as a service over the Internet.
|
Codes of Conduct |
Introduced by the General Data Protection Regulation, codes of conduct are a new valid adequacy mechanism for the transfer of personal data outside of the European Union in the absence of an adequacy decision and instead of other mechanisms such as binding corporate rules or contractual clauses. Codes of conduct must be developed by industry trade groups, associations or other bodies representing categories of controllers or processors. They must be approved by supervisory authorities or the European Data Protection Board, and have a methodology for auditing compliance.
|
Collection Limitation |
A fair information practices principle, it is the principle stating there should be limits to the collection of personal data, that any such data should be obtained by lawful and fair means and, where appropriate, with the knowledge or consent of the data subject.
|