- Data Normalization A systematic approach of decomposing tables to eliminate data redundancy and undesirable characteristics like insertion, update, and deletion anomalies. The goal of this technique is to reduce and even eliminate data redundancy, an issue that can lead to data anomalies and inconsistencies within databases or data storage systems.
- Data Origin Authentication A process or protocol ensuring that the content of an electronic message or document is provided by the claimed sender (the origin) and has not been altered in transit. It's crucial for secure communications in networks, verifying that the data received has not been tampered with and actually comes from the purported source. This is typically achieved through cryptographic methods, such as digital signatures or message authentication codes (MACs).
- Data Owner An individual or a functional unit, usually within an organization, which is legally responsible for the data they create, capture, maintain, or use. They are responsible for classifying the data according to its sensitivity and for ensuring it is handled, stored, and accessed in compliance with relevant laws, policies, and guidelines.
- Data Packet A unit of data made into a single package that travels along a given network path. Packets are used to transport user data and control information in systems based on packet switching, such as the Internet. Each packet contains the source and destination addresses along with payload data. Packets are routed through networks to their destination, where they are reassembled into the original message.
- Data Portability The ability to move data from one system, controller, or environment to another in a safe and secure manner without affecting its usability. Often a topic in discussions about personal data rights, it allows users to take their data from a service and transfer or 'port' it elsewhere, offering greater control over their own data.
- Data Processors Entities that process personal data on behalf of data controllers. Under GDPR and similar regulations, processors are responsible for handling data as instructed by the controller and must adhere to strict standards of security and confidentiality. They play a key role in IT and data services, especially within cloud computing, data analytics, and outsourced service providers.
- Data Protection Act Legislation designed to protect personal data stored on computers or in an organized paper filing system. It requires respecting the privacy rights of individuals and ensuring their personal data is processed lawfully and transparently, used for specified purposes, is accurate, and is kept secure. Different countries may have their own versions of the Data Protection Act, such as the UK's Data Protection Act of 2018, which aligns with the EU's General Data Protection Regulation (GDPR).
- Data Recovery Tools Software tools designed to recover or restore data that has been lost, deleted, corrupted, or made inaccessible. These tools can work on various storage media, such as hard drives, SSDs, memory cards, or even specific files or databases, and are often used after incidents like accidental deletion, hardware failures, or cyber-attacks.
- Data remanence The residual representation of data that remains even after attempts have been made to remove or erase it. It's a significant concern because it can potentially allow unauthorized access and recovery of sensitive data and is especially relevant when disposing of recycling, or repurposing old hardware.
- Data Retention The practice of storing data for a predetermined period of time for compliance, regulatory, or business reasons. The period of time that data should be kept varies depending on the type of data, the industry, and the regulatory environment. After this period, the data is usually securely destroyed.
Share our FREE glossary with your friends and study buddies.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions, if you find errors please contact us.