Skip to content

Data Security and Privacy Glossary

13 essential terms — because precise language is the foundation of clear thinking in Data Security and Privacy.

Showing 13 of 13 terms

A symmetric encryption algorithm adopted as a standard by NIST. Uses 128, 192, or 256-bit keys and is the most widely used symmetric cipher for data encryption.

California law granting residents the right to know, delete, and opt out of the sale of their personal information, applying to businesses meeting certain revenue or data volume thresholds.

The process of categorizing data by sensitivity level (public, internal, confidential, restricted) to determine appropriate security controls, access permissions, and handling procedures.

Technologies and strategies that detect and prevent unauthorized transmission of sensitive data outside the organization by monitoring data in motion, at rest, and in use.

A mathematical framework providing provable privacy guarantees by adding calibrated noise to data analysis results, making it impossible to determine whether any individual's data was included.

Protecting stored data by encrypting it on disk, in databases, or in storage systems, ensuring that data is unreadable without the decryption key even if the storage media is physically accessed.

EU regulation governing the collection, processing, and storage of personal data of EU residents. Enforces principles like consent, data minimization, and breach notification with fines up to 4% of global revenue.

A tamper-resistant hardware device that securely generates, stores, and manages cryptographic keys and performs cryptographic operations within a protected boundary.

A system for managing the lifecycle of cryptographic keys, including generation, distribution, storage, rotation, revocation, and destruction, often using HSMs for secure key storage.

Any information that can be used to identify a specific individual, including direct identifiers (name, SSN) and quasi-identifiers (ZIP code + birth date) that identify when combined.

Replacing direct identifiers with artificial pseudonyms while maintaining a separate mapping that can re-identify individuals. Data remains personal data under GDPR.

An asymmetric encryption algorithm based on the mathematical difficulty of factoring large prime numbers. Used for encryption, digital signatures, and key exchange.

A cryptographic hash function from the SHA-2 family that produces a 256-bit digest. Used for data integrity verification, digital signatures, and password hashing.

Data Security and Privacy Glossary - Key Terms & Definitions | PiqCue