Data Protection and Privacy Laws

Expert-defined terms from the Advanced Certification in Regulatory Compliance Training and Development in the Oil and Gas Sector course at London School of Business and Administration. Free to read, free to share, paired with a globally recognised certification pathway.

Data Protection and Privacy Laws

Data Protection and Privacy Laws Glossary #

Data Protection and Privacy Laws Glossary

1. Data Protection #

Data protection refers to the practice of safeguarding data from unauthorized ac… #

It involves implementing measures to ensure the confidentiality, integrity, and availability of data.

2. Privacy Laws #

3. Personal Data #

Personal data refers to any information that relates to an identified or identif… #

This can include names, addresses, phone numbers, email addresses, social security numbers, and other identifying information.

4. GDPR (General Data Protection Regulation) #

The General Data Protection Regulation is a comprehensive data protection law th… #

It aims to strengthen individuals' rights and unify data protection regulations across the EU.

5. CCPA (California Consumer Privacy Act) #

The California Consumer Privacy Act is a state #

level privacy law in California that grants consumers more control over their personal information held by businesses. It requires businesses to disclose data collection and sharing practices.

6. PII (Personally Identifiable Information) #

Personally Identifiable Information is any data that can be used to identify a s… #

This can include names, social security numbers, addresses, phone numbers, and email addresses.

7. Data Breach #

A data breach occurs when sensitive, confidential, or protected data is accessed… #

Data breaches can result in unauthorized access to personal information and can have severe consequences for individuals and organizations.

9. Data Controller #

A data controller is an entity that determines the purposes, conditions, and mea… #

Data controllers are responsible for ensuring compliance with data protection laws and protecting individuals' rights.

10. Data Processor #

A data processor is an entity that processes personal data on behalf of a data c… #

Data processors must adhere to data protection regulations and act only on the instructions of the data controller.

11. Data Subject #

A data subject is an identified or identifiable individual whose personal data i… #

Data subjects have rights under data protection laws, including the right to access, rectify, and erase their personal data.

12. Data Minimization #

Data minimization is the practice of limiting the collection and storage of pers… #

It helps reduce the risk of data breaches and protects individuals' privacy rights.

13. Data Portability #

Data portability is the ability for individuals to obtain and reuse their person… #

It allows individuals to transfer their data from one service provider to another easily.

14. Data Protection Impact Assessment (DPIA) #

A Data Protection Impact Assessment is a process to assess the potential risks a… #

DPIAs help organizations identify and mitigate privacy risks.

15. Privacy by Design #

Privacy by Design is an approach to data protection that involves considering pr… #

It aims to embed privacy into the design and architecture of systems.

16. Privacy Shield #

Privacy Shield was a data transfer mechanism between the EU and the United State… #

However, the European Court of Justice invalidated Privacy Shield in 2020.

17. Right to be Forgotten #

The Right to be Forgotten is a data protection principle that allows individuals… #

It is enshrined in the GDPR and other privacy laws.

18. Breach Notification #

Breach Notification is the requirement for organizations to notify individuals a… #

Prompt notification allows affected individuals to take necessary actions to protect themselves.

19. Cross #

Border Data Transfers:

Cross #

Border Data Transfers involve the transfer of personal data across international borders. Organizations must ensure that data transfers comply with data protection laws in both the originating and receiving countries.

20. Data Protection Officer (DPO) #

A Data Protection Officer is a designated individual within an organization resp… #

The DPO's role includes advising on data protection obligations and monitoring compliance.

21. Encryption #

Encryption is the process of converting data into a code to prevent unauthorized… #

Encrypted data can only be accessed by authorized parties with the decryption key, enhancing data security and privacy.

22. Data Retention #

Data Retention refers to the practice of storing data for a specific period base… #

Organizations must establish data retention policies to manage data effectively and comply with data protection laws.

23. Privacy Policy #

A Privacy Policy is a statement or document that explains how an organization co… #

Privacy policies inform individuals about their privacy rights and how their data is handled.

24. Data Processing Agreement #

A Data Processing Agreement is a contract between a data controller and a data p… #

DPAs specify the responsibilities of each party and ensure compliance with data protection laws.

25. Data Audit #

A Data Audit is a systematic review of an organization's data processing activit… #

Data audits help organizations evaluate data protection measures and improve data management practices.

26. Data Subject Access Request (DSAR) #

A Data Subject Access Request is a request made by an individual to access their… #

Organizations must respond to DSARs promptly and provide individuals with a copy of their data.

27. Biometric Data #

Biometric Data refers to unique physical or behavioral characteristics used to i… #

Biometric data is considered sensitive personal information and is subject to data protection regulations.

28. Data Localization #

Data Localization is the practice of storing and processing data within a specif… #

Some countries require organizations to keep data within their borders to protect individuals' privacy and ensure data security.

29. Data Sovereignty #

Data Sovereignty refers to the concept that data is subject to the laws and regu… #

Organizations must comply with data sovereignty requirements when storing or processing data in different jurisdictions.

30. Data Ethics #

Data Ethics involves considering the moral and ethical implications of data coll… #

It encompasses principles of transparency, fairness, accountability, and respect for individuals' privacy rights in data practices.

31. E #

Privacy Directive:

The E #

Privacy Directive is a European Union directive that governs the processing of personal data in electronic communications. It complements the GDPR and sets out specific rules for electronic communication services and data protection.

32. Health Information Privacy #

Health Information Privacy refers to the protection of individuals' medical and… #

Health information is considered sensitive data and is subject to specific privacy laws and regulations to safeguard individuals' health data.

33. Employee Data Protection #

Employee Data Protection refers to the measures taken by organizations to protec… #

Employers must comply with data protection laws when collecting, processing, and storing employee data to ensure privacy and confidentiality.

35. Data Security #

Data Security involves implementing measures to protect data from unauthorized a… #

It includes physical, technical, and organizational controls to safeguard data and prevent security breaches.

36. Data Privacy Impact Assessment (DPIA) #

A Data Privacy Impact Assessment is a process to evaluate the impact of data pro… #

DPIAs help organizations identify and mitigate privacy risks and ensure compliance with data protection laws.

37. Privacy Compliance #

Privacy Compliance refers to the adherence to data protection laws, regulations,… #

Organizations must establish privacy compliance programs to ensure data processing activities meet legal requirements.

39. Privacy Training #

Privacy Training is education and awareness programs that provide employees with… #

Training helps employees understand their responsibilities in protecting personal data.

40. Privacy Impact Assessment (PIA) #

A Privacy Impact Assessment is a process to assess the privacy risks and impacts… #

PIAs help organizations identify privacy risks and implement privacy-enhancing measures.

41. Data Governance #

Data Governance is the framework of policies, procedures, and controls that gove… #

It includes data quality, data security, data privacy, and data management practices to ensure data integrity and compliance.

42. Security Incident Response #

Security Incident Response is the process of detecting, responding to, and recov… #

Organizations must have a plan in place to address security incidents promptly and minimize damage.

43. Personally Identifiable Information (PII) Inventory #

A Personally Identifiable Information Inventory is a record of the types of pers… #

PII inventories help organizations identify and manage personal data to comply with data protection laws.

44. Data Classification #

Data Classification is the categorization of data based on its sensitivity, crit… #

Organizations classify data to determine appropriate security controls, access restrictions, and data protection measures based on data value and risk.

45. Data Masking #

Data Masking is the process of replacing sensitive data with fictional or masked… #

It helps organizations anonymize data for testing, development, or sharing while preserving data integrity and privacy.

46. Data Anonymization #

Data Anonymization is the process of removing or altering personal identifiers f… #

Anonymized data can be used for research, analysis, and sharing without compromising individuals' privacy.

47. Data Breach Response Plan #

A Data Breach Response Plan is a documented strategy outlining the steps to take… #

It includes incident detection, response procedures, communication protocols, and recovery measures to minimize the impact of a breach.

48. Safe Harbor Principles #

The Safe Harbor Principles were a data transfer framework between the EU and the… #

The Safe Harbor framework was replaced by Privacy Shield.

49. Data Subject Rights #

Data Subject Rights are the rights granted to individuals under data protection… #

Data subjects can exercise these rights to protect their privacy.

50. Privacy by Default #

Privacy by Default is a principle that requires organizations to implement priva… #

It ensures that personal data is only processed for specified purposes and with the least amount of data necessary.

51. Third #

Party Data Sharing:

Third #

Party Data Sharing involves sharing personal data with external parties, such as vendors, service providers, or partners. Organizations must assess third-party data sharing risks, implement data protection measures, and ensure compliance with data protection laws.

53. Data Breach Notification Procedure #

A Data Breach Notification Procedure is a documented process outlining how organ… #

It includes incident detection, assessment, notification of affected individuals, authorities, and communication with stakeholders to address the breach effectively.

54. Data Protection Regulations #

55. Data Mapping #

Data Mapping is the process of identifying, documenting, and visualizing the flo… #

Data maps help organizations understand data processing activities, assess privacy risks, and ensure compliance with data protection laws.

56. Data Subject Rights Requests #

Data Subject Rights Requests are requests made by individuals to exercise their… #

Organizations must respond to DSARs promptly, provide individuals with access to their data, and address requests to rectify, erase, or restrict processing of personal data.

57. Data Privacy Officer (DPO) #

A Data Privacy Officer is a designated individual responsible for overseeing dat… #

The DPO's role includes advising on privacy obligations, monitoring compliance, and acting as a point of contact for data protection authorities.

58. Data Processing Agreements #

Data Processing Agreements are contracts between a data controller and a data pr… #

DPAs specify data protection obligations, responsibilities, and safeguards to ensure compliance with data protection laws.

59. Data Breach Response Team #

A Data Breach Response Team is a group of individuals responsible for managing a… #

The response team coordinates incident response, communication, recovery efforts, and compliance with data breach notification requirements.

60. Data Protection Policy #

A Data Protection Policy is a document that outlines an organization's commitmen… #

The policy establishes data protection principles, responsibilities, procedures, and safeguards to ensure privacy and security of personal data.

62. Data Breach Investigation #

A Data Breach Investigation is a process to assess the scope, impact, and causes… #

Investigations help organizations identify security vulnerabilities, improve incident response, and prevent future breaches to protect personal data.

63. Data Protection Training #

Data Protection Training is educational programs that provide employees with kno… #

Training helps employees understand their roles in safeguarding personal data and complying with data protection laws.

64. Data Processing Controls #

Data Processing Controls are security measures implemented to protect personal d… #

Controls include access restrictions, encryption, data masking, monitoring, and auditing to ensure data integrity, confidentiality, and compliance with data protection laws.

65. Data Breach Notification Requirements #

66. Data Privacy Compliance Program #

A Data Privacy Compliance Program is a structured framework that ensures organiz… #

The program includes policies, procedures, training, audits, and controls to protect personal data, maintain privacy, and meet legal requirements.

68. Data Breach Notification Protocol #

A Data Breach Notification Protocol is a documented procedure outlining the step… #

The protocol includes incident detection, assessment, notification of affected individuals, authorities, and stakeholders, as well as communication strategies to address the breach effectively.

69. Data Protection Impact Assessment (DPIA) Template #

A Data Protection Impact Assessment Template is a structured document used to co… #

DPIA templates help organizations assess privacy risks, document findings, and implement privacy-enhancing measures to comply with data protection laws.

70. Data Privacy Regulation Compliance #

Data Privacy Regulation Compliance refers to the adherence to data protection la… #

Organizations must establish data privacy compliance programs, policies, and controls to ensure data processing activities meet legal requirements and safeguard personal data.

71. Data Subject Rights Management #

Data Subject Rights Management involves managing individuals' privacy rights und… #

Organizations must establish processes to handle data subject rights requests and protect individuals' privacy.

72. Data Breach Response Plan Template #

A Data Breach Response Plan Template is a structured document outlining the step… #

The template includes incident response procedures, communication protocols, notification requirements, and recovery measures to minimize the impact of a breach and protect personal data.

73. Data Protection Officer (DPO) Responsibilities #

Data Protection Officer Responsibilities include overseeing data protection and… #

DPO responsibilities include advising on data protection obligations, monitoring compliance, handling data subject rights requests, and acting as a point of contact for data protection authorities.

74. Data Processing Agreement Template #

A Data Processing Agreement Template is a contract template between a data contr… #

DPAs specify data protection obligations, responsibilities, safeguards, and legal requirements to ensure compliance with data protection laws.

75. Data Breach Response Team Roles #

Data Breach Response Team Roles are responsibilities assigned to team members re… #

Team roles include incident response coordination, communication with stakeholders, compliance with breach notification requirements, and recovery efforts to

May 2026 intake · open enrolment
from £90 GBP
Enrol