Glossary for Identity Management, Data Privacy and GDPR-compliance
When it comes to terminology about identity and access management as well as the legal compliance to be considered in the European Union, it is often easy to lose track. Our detailed explanations of technical and legal terms used help you better familiarize with the matter.
-
A
-
Adequacy Decision
An adequacy decision confirms that a third country has a level of data protection comparable to that of the EU. -
Administrative Fines
Infringement of applicable data protection rules and regulations does not only result in liability to any person having suffered damages but may also cause the imposition of penalties and administrative fees by the supervisory authorities. -
Advanced Encryption Standard AES256
Advanced Encryption Standard (AES256) is a way of encrypting data so that unauthorized people cannot read it. -
Argon2
Engity stores passwords (and other secrets) using this award-winning hashing algorithm, which is currently one of the securest known algorithms for that purpose. -
Authentication
Authentication is the process of verifying the identity of a user, system, or entity seeking access to a digital platform, network, or sensitive information.
-
-
B
-
Brute Force Attack
-
Business Processes
Businesses rely on their processes to deliver services or products to their customers and, in fact, to do anything at all.
-
-
C
-
Cookie-Consent
The Cookie Consent informs users of a website or service about how cookies are used on the site and asks for informed consent.
-
-
D
-
Dark Patterns
Dark patterns are user interface (UI) practices that nudge users to do what’s best for the provider, not necessarily the user themselves. -
Data Processing Agreement (DPA)
Most organizations, be it businesses, associations, corporations, or institutions, cannot handle all their processing of personal data fully in-house. -
Data Protection
Data Protection is the idea of preventing the misuse of personal data. -
Data Protection Audit
The idea of a Data Protection Audit is to make sure that an organization is in compliance with the applicable privacy regulation and the data protection policies and procedures work as planned. -
Data Protection Officer (DPO)
The job of a Data Protection Officer (short: DPO) is to make sure that a business or organization processes personal data only according to the applicable data protection rules and regulations. -
Data Transfer
A Data Transfer is a transfer of personal data from one person or organization to another.
-
-
E
-
Elliptic Curves Digital Signature
When Engity signs issued tokens (for JWT, HTTPS, …), we use either the Elliptic Curve Digital Signature Algorithm (ECDSA, with SHA-512) or Edwards-curve Digital Signature Algorithm (EdDSA with Ed25519; depending on support by devices). -
European Court of Justice
The European Court of Justice - ECJ (very technically part of the "Court of Justice of the European Union") is the supreme court of the European Union, whose task is to interpret EU law and ensure its uniform application across the Union and its member states.
-
-
G
-
GDPR
The General Data Protection Regulation, short GDPR, is the EU's data privacy and security law.
-
-
I
-
Identity
In Identity and Access Management (IAM), an identity is a representation of a user with certain access right to resources. -
Identity & Access Management (IAM)
Organizations need to know who their (internal and external) users are, which resources they can access, and what rights they have. -
Identity Provider
An Identity Provider (IdP) provides authentication and authorization services for users.
-
-
L
-
Liability
The GDPR aims to be not just a set of rules on paper. -
Location
The location of computers, servers, and data centers is a central topic when thinking about the compliance of personal data processing. -
Lock-out Functionality
-
-
P
-
Password
A password is a key in the form of "something the user knows" that gives access to digital accounts, devices, or information. -
Password Reset
-
Password Strength Checker
-
Privacy Shield I/II
The Privacy Shield is a legal framework addressing transfers of personal data between the EU and the US.
-
-
S
-
Safe Harbour
Safe Harbor was an inadequate tool for transferring personal data from the EU to the US. -
Schrems Ruling I/II
Schrems I and II are two judgements by the European Court of Justice (ECJ) that invalidated the transfer tools Safe Harbor and Privacy Shield. -
Server
Server, Data Center, Cloud Computer: the oil wells of the 21st century. -
Single Sign-on (SSO)
Single sign-on (or "SSO" in short) is a centralized authentication method that lets users access multiple applications or systems using a single set of login credentials. -
Standard Contractual Clauses
Standard Contractual Clauses (SCCs) are a contractual tool enabling data transfers between the EU and third countries.
-
-
T
-
Technical and Organizational Measures (TOMs)
TOMs are technical and organizational measures to protect personal data and make data processing compliant to the GDPR. -
Transatlantic Data Privacy Framework - (TADPF)
The Transatlantic Data Privacy Framework (TADPF) is a mechanism to align differences in EU-US data protection standards that allows data transfers to the US. -
Transfer Impact Assessment
A Transfer Impact Assessment (TIA) is a risk assessment regarding data transfers to third countries, in particular when SCC are being used as a transfer tool. -
Transport Layer Security (TLS) 1.2+
Transport Layer Security (TLS) is today the most commonly used security protocol for secure communication over the Internet.
-
-
U
-
US Cloud Act
The US Cloud Act is a law that gives American intelligence and law enforcement authorities wide-ranging access to personal data, including data of European citizens.
-