Data Privacy Glossary
From A to Z: All important terms around data privacy, GDPR, and IT security clearly explained.
D
Data Breach
What is a data breach? Learn how data protection violations occur, which notification obligations apply under GDPR, and how businesses can prevent data breaches.
Data Minimization
What is data minimization? Learn why this GDPR principle is critical for data protection, how businesses can implement it, and what privacy by design means.
Data Processing Agreement (DPA)
What is a Data Processing Agreement? Learn about DPA requirements under GDPR, what must be included, and why it is essential for secure file transfers.
Data Protection Impact Assessment (DPIA)
What is a Data Protection Impact Assessment? Learn when a DPIA is required under GDPR, how to conduct one, and what it must contain for compliance.
Data Protection Officer (DPO)
What is a Data Protection Officer? Learn when a DPO must be appointed, what their responsibilities are, and how they ensure data protection within organizations.
Data Subject Rights
What are data subject rights? Learn which rights the GDPR grants to individuals, how businesses must implement them, and what happens if they are not respected.
Deletion Concept
What is a deletion concept? Learn why businesses need a structured data deletion framework and what GDPR requirements apply.
E
Encryption
What is encryption? Learn how encryption methods protect data, which techniques exist, and why encryption is essential for secure file transfers and GDPR compliance.
End-to-End Encryption (E2EE)
What is end-to-end encryption? Learn how E2EE works, why it is essential for secure file transfers, and how it protects your data from unauthorized access.
P
Personal Data
What is personal data? Learn which information the GDPR protects, what categories exist, and why protecting personal data is critical for every business.
Pseudonymization
What is pseudonymization? Learn how this technique protects personal data, how it differs from anonymization, and what the GDPR requires for implementation.
T
Technical and Organizational Measures (TOMs)
What are Technical and Organizational Measures? Learn which security measures the GDPR requires and how businesses implement them for secure file transfers.
Two-Factor Authentication (2FA)
What is two-factor authentication? Learn how 2FA works, why it provides better account protection, and how it is used in enterprise environments.