Data which is being recorded over the
Internet through channels like email, social media, Web browsing and online
transactions, and indirectly via point-of-sale terminals, and mobile GPS. It is created when an individual sends an
email, updates a social media profile, swipes a credit card, uses an ATM, etc.
A scheme that provides the basis for managing access to, and protection of, data assets.
The process of de-identifying; anonymizing, or otherwise obscuring data so that the structure remains the same, but the content is no longer sensitive, in order to generate a data set that does not allow to the viewer to see the ‘masked’ confidential ...
The different types of personal information processed by data processors. Typical data elements include name, date of birth and numerical identifiers. Organizational data elements tied to both individuals as well as organizations include business ...
The unauthorized viewing, unauthorized acquisition, accidental publication, or loss of personally information data that compromises its security, confidentiality, or integrity, and which may lead to the accidental or unlawful use, destruction, loss, ...
Identifies personal information as it moves across various systems and thus how data is shared and organized, and its location. The data can be categorized by subject area, which identifies inconsistent data versions, enabling identification and ...