Home Privacy and compliance terms

65 terms

Privacy and compliance terms

Privacy and compliance terms explain how organizations handle personal data lawfully and securely — from consent and retention to audits and breach reporting. Using the same language across teams helps you implement policies, meet obligations, and prove accountability.

GDPR: The definitive guide

The General Data Protection Regulation (GDPR) is a set of rules that govern personal data collection and processing in the European Union (EU) and the European Economic Area (EEA).

Sensitive personal information

Sensitive personal information is a legal term for data that requires special handling by organizations — otherwise, accessing or misusing these details could lead to significant personal harm.

Nonpublic personal information

Nonpublic personal information is any customer data that is not publicly available and could be used to identify or contact an individual.

Certified Secure Software Lifecycle Professional

The Certified Secure Software Lifecycle Professional (CSSLP) is a globally recognized certification for professionals who design, develop, and maintain secure software.

B1 security

B1 security is a level of computer security defined by the U.S. government to keep sensitive information protected.

Payment Card Industry Data Security Standard

The Payment Card Industry Data Security Standard (PCI DSS) is a set of rules created by major credit card companies like Visa and MasterCard to keep credit card information safe.

Protected health information

Protected health information (PHI) refers to information in a medical record that can be used to identify an individual.

The importance of privacy and compliance terminology

Shared terminology keeps legal, security, and product teams aligned on what data is collected, why it’s processed, and how proof of compliance is maintained.

Protect personal data correctly

Distinguishing personal data, sensitive data, and pseudonymized data clarifies which safeguards apply, how long to keep records, and when to minimize or delete information.

Meet legal obligations on time

Understanding lawful basis, consent management, records of processing, and data protection impact assessments helps you respond to data subject requests and audits without delays.

Build trust and accountability

Knowing privacy by design, data retention schedule, processor vs. controller, and breach notification supports transparent practices and clear ownership.

Two women learning cybersecurity terminology.

Online security starts with a click.

Stay safe with the world’s leading VPN

Can’t find an answer to your question?

Ask the questions that matter to you — and get answers from our cybersecurity experts.