Glossary for Identity Management, Data Privacy and GDPR-compliance
When it comes to terminology about identity and access management as well as the legal compliance to be considered in the European Union, it is often easy to lose track. Our detailed explanations of technical and legal terms used help you better familiarize with the matter.
-
A
-
Adequacy Decision
An adequacy decision confirms that a third country has a level of data protection comparable to that of the EU. -
Administrative Fines
Infringement of applicable data protection rules and regulations does not only result in liability to any person having suffered damages but may also cause the imposition of penalties and administrative fees by the supervisory authorities. -
Advanced Encryption Standard AES256
Advanced Encryption Standard (AES256) is a way of encrypting data so that unauthorized people cannot read it. -
Argon2
Engity stores passwords (and other secrets) using this award-winning hashing algorithm, which is currently one of the securest known algorithms for that purpose.
-
-
B
-
Business Processes
Businesses rely on their processes to deliver services or products to their customers and, in fact, to do anything at all.
-
-
C
-
Cookie-Consent
The Cookie Consent informs users of a website or service about how cookies are used on the site and asks for informed consent.
-
-
D
-
Data Processing Agreement (DPA)
Most organizations, be it businesses, associations, corporations, or institutions, cannot handle all their processing of personal data fully in-house. -
Data Protection
Data Protection is the idea of preventing the misuse of personal data. -
Data Protection Audit
The idea of a Data Protection Audit is to make sure that an organization is in compliance with the applicable privacy regulation and the data protection policies and procedures work as planned. -
Data Protection Officer (DPO)
The job of a Data Protection Officer (short: DPO) is to make sure that a business or organization processes personal data only according to the applicable data protection rules and regulations. -
Data Transfer
A Data Transfer is a transfer of personal data from one person or organization to another.
-
-
E
-
Elliptic Curves Digital Signature
When Engity signs issued tokens (for JWT, HTTPS, …), we use either the Elliptic Curve Digital Signature Algorithm (ECDSA, with SHA-512) or Edwards-curve Digital Signature Algorithm (EdDSA with Ed25519; depending on support by devices). -
European Court of Justice
-
-
G
-
GDPR
The General Data Protection Regulation, short GDPR, is the EU's data privacy and security law.
-
-
I
-
Identity
In Identity and Access Management (IAM), an identity is a representation of a user with certain access right to resources. -
Identity & Access Management (IAM)
Organizations need to know who their (internal and external) users are, which resources they can access, and what rights they have. -
Identity Provider
An Identity Provider (IdP) provides authentication and authorization services for users.
-
-
L
-
P
-
Privacy Shield I/II
The Privacy Shield is a legal framework addressing transfers of personal data between the EU and the US.
-
-
S
-
Safe Harbour
Safe Harbor was an inadequate tool for transferring personal data from the EU to the US. -
Schrems Ruling I/II
Schrems I and II are two judgements by the European Court of Justice (ECJ) that invalidated the transfer tools Safe Harbor and Privacy Shield. -
Server
Server, Data Center, Cloud Computer: the oil wells of the 21st century. -
Standard Contractual Clauses
Standard Contractual Clauses (SCCs) are a contractual tool enabling data transfers between the EU and third countries.
-
-
T
-
Transfer Impact Assessment
A Transfer Impact Assessment (TIA) is a risk assessment regarding data transfers to third countries, in particular when SCC are being used as a transfer tool. -
Transport Layer Security (TLS) 1.2+
Transport Layer Security (TLS) is today the most commonly used security protocol for secure communication over the Internet.
-
-
U
-
US Cloud Act
The US Cloud Act is a law that gives American intelligence and law enforcement authorities wide-ranging access to personal data, including data of European citizens.
-