Recently Added

Whaling

Phishing targeted at a specific individual or individuals known to be wealthy. Reference(s) in IAPP Certification Textbooks: T150; TSup7 Associated term(s): Spear Phishing, Phishing, Pharming... Read More

User Stories

Requirements of new software systems or products as they are implemented in an Agile Development Model. Usually they consist of a few sentences that describe how a consumer would interact with the system or product and what the ideal functionality would look like. These are used to inform the developers of how a system or product should work while they are designing a given portion of the system. Reference(s) in IAPP Certification Textbooks: T150; TSup24, 42 Associated term(s): Agile Developmen... Read More

Unified Modeling Language

A notation language that is used to describe system design elements in software development. Reference(s) in IAPP Certification Textbooks: TSup58 Acronyms: UML Associated term(s): Plan-driven Design Model, Agile Design Model... Read More

Transient Storage

Short lifespan data storage such as a session cookie stored on a browser that is purged from the system when the browser is closed. Reference(s) in IAPP Certification Textbooks:  T74 Associated term(s): Persistent Storage, Cookies... Read More

Third-Party Collection

Transferring data collected to another collector for their use and repurposing. Reference(s) in IAPP Certification Textbooks: TSup12 Associated term(s): Active Collection, First-party Collection, Passive Collection, Repurposing, Surveillance Collection... Read More

Terms of Service

The set of rules which govern the use of a service and must be agreed to, either implicitly through the use of that service or explicitly, in order to make use of that service. Reference(s) in IAPP Certification Textbooks: Associated term(s): EULA ... Read More

Systems Development Life Cycle (SDLC)

A conceptual model used to describe the stages in an information system development project. Reference(s) in IAPP Certification Textbooks: T46 Associated term(s): Privacy by Design, Privacy Standard, Privacy Review... Read More

Symmetric Key Encryption

Also known as Secret Key Encryption is a form of encryption using a single secret key to both encrypt and decrypt data. Reference(s) in IAPP Certification Textbooks: T105; TSup105 Associated term(s): Asymmetric Key Encryption, Encryption... Read More

Surveillance Collection

Collection by way of observing the data stream produced by a given data subject without interference in the data subject’s activity. Reference(s) in IAPP Certification Textbooks: TSup12 Associated term(s): Active Collection, First-Party Collection, Passive Collection, Repurposing, Third-party Collection... Read More

Super Cookie

A tracking mechanism that persists even after all cookies have been deleted, usually using several varying types of storage to remain within a device. Reference(s) in IAPP Certification Textbooks: T164 Associated term(s): Cookie... Read More