iapp.org

Website:http://www.iapp.org
Upvotes received13
Downvotes received11
Karma:1 (upvotes-downvotes)



0 earned Badges

No badges were found



Definitions (506)

1

4 Thumbs up   3 Thumbs down

customer access


A customer’s ability to access the personal information collected on them as well as review, correct or delete any incorrect information. Reference(s) in IAPP Certification Textbooks: F122-123; US58; [..]
Source: iapp.org

2

4 Thumbs up   3 Thumbs down

encryption


The process of obscuring information, often through the use of a cryptographic scheme in order to make the information unreadable without special knowledge; i.e., the use of code keys. Reference(s) in [..]
Source: iapp.org

3

2 Thumbs up   1 Thumbs down

cookie


A small text file stored on a client machine that may later be retrieved by a web server from the machine. Cookies allow web servers to keep track of the end user’s browser activities, and connect ind [..]
Source: iapp.org

4

1 Thumbs up   0 Thumbs down

business case


The starting point for assessing the needs of the privacy organization, it defines the individual program needs and the ways to meet specific business goals, such as compliance with privacy laws or re [..]
Source: iapp.org

5

1 Thumbs up   1 Thumbs down

negligence


An organization will be liable for damages if it breaches a legal duty to protect personal information and an individual is harmed by that breach. Reference(s) in IAPP Certification Textbooks: F25; US [..]
Source: iapp.org

6

1 Thumbs up   1 Thumbs down

sql injection


Taking advantage of SQL forms by inserting commands in information entry boxes. SQL is transferred in such a way that commands placed in forms can be seen as valid commands and affect the system in wh [..]
Source: iapp.org

7

0 Thumbs up   0 Thumbs down

access control entry


An element in an access control list (ACL). Each ACE controls, monitors, or records access to an object by a specified user. Reference(s) in IAPP Certification Textbooks: T40 Acronym(s): ACE Associate [..]
Source: iapp.org

8

0 Thumbs up   0 Thumbs down

access control list


A list of access control entries (ACE) that apply to an object. Each ACE controls or monitors access to an object by a specified user. In a discretionary access control list (DACL), the ACL controls a [..]
Source: iapp.org

9

0 Thumbs up   0 Thumbs down

accountability


A fair information practices principle, it is the idea that when personal information is to be transferred to another person or organization, the personal information controller should obtain the cons [..]
Source: iapp.org

10

0 Thumbs up   0 Thumbs down

act respecting the protection of personal information in the private sector


A Québéquois privacy law that, other than different terminology, is similar to PIPEDA, though at a province level. It came into force in 1994 and espouses three principles: (1) Every person who establ [..]
Source: iapp.org


To view all 506 definitions, please sign in.