|
1 | Anonymity | characteristic of information that does not permit personally identifiable information principal to be identified directly or indirectly.
|
2 | Anonymization | The process by which personally identifiable information (PII) is irreversibly altered in such a way that a PII principal can no longer be identified directly or indirectly, either by the PII controller alone or in collaboration with any other party.
|
3 | Anonymized Data | Data that has been produced as the output of a personally identifiable information anonymization process
|
4 | Consent | Personally, identifiable information (PII) principal’s freely given, specific and informed agreement to the processing of their PII
|
5 | Identifiability | A condition which results in personally identifiable information (PII) principal being identified, directly or indirectly, based on a given set of PII
|
6 | Identify | Establish the link between a personally identifiable information (PII) principal and PII or a set of PII
|
7 | Identity | Set to attributes which make it possible to identify the personally identifiable information principal
|
8 | Opt-in | Process or type of policy whereby the personally identifiable information (PII) principal is required to take any action to express explicit prior consent for their PII to be processed for a particular
|
9 | Personally, identifiable information (PII) | Any information that; Can be used to identify the PII principal to whom such information related and is or might be directly or indirectly linked to a PII principal
|
10 | PII controller | Privacy stakeholder(s) that determines the purposes and means for processing personally
|
11 | PII principal (Data subject) | The natural person to whom the personally identifiable information (PII) related
|
12 | PII processor | Privacy stakeholder that processes personally identifiable information (PII) on behalf of and under the instructions of a PII controller
|
13 | Privacy breach | The situation where personally identifiable information isprocessed in violation of one or more relevant privacy safeguarding requirements. Examples of Privacy information protection tools include, but are not limited to, anonymization and pseudonymization tools that eliminate, reduce, mask, or de-identify PII or that prevent unnecessary, unauthorized and/or undesirable processing of PII
|
14 | Privacy controls | Measures that treat privacy risks by reducing their likelihood or their consequences
|
15 | Privacy- enhancing technology (PET) | Privacy control, consisting of information and communication technology (ICT) measures, products, or services that protect privacy by eliminating or reducing personally identifiable information (PII) or by preventing unnecessary and/or undesired processing of PII, all without losing the functionality of the ICT system
|
16 | Privacy policy | Overall intention and direction, rules and commitment, as formally expressed by the personally identifiable information (PII) controller related to the processing of PII in a particular setting
|
17 | Privacy preferences | Specific choices made by personally identifiable information (PII) principal about how their PII should be processed for a particular purpose
|
18 | Privacy principles | Set of shared values governing the privacy protection of personally identifiable information (PII) when processing in information and communication technology systems
|
19 | Privacy risk | Effect of uncertainty on privacy
|
20 | Privacy risk assessment /Privacy impact assessment | The overall process of risk identification, risk analysis and risk evaluation concerning the processing of personally identifiable information (PII)
|
21 | Privacy safeguarding requirements | Set of requirements an organization has to take into account when processing personally identifiable information (PII) concerning the privacy protection of PII
|
22 | Privacy stakeholder | Natural or legal person, public authority, agency or any other body that can affect, be affected by or perceive themselves to be affected by a decision or activity related to personally identifiable information (PII) processing
|
23 | Processing of PII | Operation or set of operations performed upon personally identifiable information (PII). Examples of processing operations of PII include, but are not limited to, the collection, storage, alteration, retrieval, consultation, disclosure, anonymization, pseudonymization, dissemination or otherwise making available, deletion or destruction of PII.
|
24 | Pseudonymization | The process applied to personally identifiable information (PII) which replaces identifying information with an alias
|
25 | Secondary use | Processing of personally identifiable information (PII) in conditions which differ from the initial ones. Examples: a new purpose for processing PII, a new recipient of the PII, etc.
|
26 | Sensitive PII | Category of personally identifiable information (PII), either whose nature is sensitive, such as those that relate to the PII principal’s most intimate sphere, or that might have a significant impact on the PII principal
|
27 | Third-party | Privacy stakeholder other than the personally identifiable information (PII) principal, the PII controller and the PII processor, and the natural persons who are authorized to process the data under the direct authority of the PII controller or the PII processor
|
28 | Business purposes | The purposes for which personal data may be used: Personnel, administrative, financial, regulatory, and business development purposes. Business purposes include the following: Compliance with legal, regulatory and corporate governance obligations and good practice. Gatheringinformation as part of investigations by regulatory bodies or in connection with legal proceedings or requests. Ensuring business policies are adhered to (such as policies covering email and internet use) Operational reasons, such as recording transactions, training, and quality control, ensuring the confidentiality of commercially sensitive information, security vetting, credit scoring, and checking. Investigating complaints. Checking references, ensuring safe working practices, monitoring and managing staff access to systems and facilities and staff absences, administration, and assessments. Monitoring staff conduct, disciplinary matters. Marketing our business Improving services.
|
29 | Personal data | Information relating to identifiable individuals, such as job applicants, current and former employees, agency, contract, and other staff, clients, suppliers, and marketing contacts. Personal data we gather may include individuals’ contact details, educational background, financial and pay details, details of certificates and diplomas, education and skills, marital status, nationality, job title, and CV.
|
30 | Sensitive personal data | Personal data about an individual’s racial or ethnic origin, political opinions, religious or similar beliefs, trade union membership (or non- membership), physical or mental health or condition, criminal or related proceedings—any use of sensitive personal data should be strictly controlled under this policy.
|
|