- Data retention monitoring The process of regularly reviewing and managing stored data to ensure that it is being retained in accordance with relevant policies and regulations. The process involves managing the data lifecycle, ensuring data protection and privacy, verifying data accuracy and availability, and detecting potential unauthorized activities.
- Data Roles The responsibilities assigned to individuals or entities in relation to data. Key roles often include data owners, who have control over and responsibility for data assets; data stewards, who oversee data quality and lifecycle; and data users, who access and use data in their roles.
- Data Security The practice of protecting digital data from unauthorized access, corruption, or theft throughout its entire lifecycle. It includes a set of standards and technologies that protect data from intentional or accidental destruction, modification, or disclosure. Data security involves a range of tactics, such as encryption, tokenization, and key management practices that protect data across all applications and platforms. It also involves physical and administrative strategies to control access to hard-copy and electronically stored data. Data security is crucial for maintaining the integrity and privacy of information in both business and personal contexts.
- Data Security Lifecycle (CSUSAD) An acronym representing the stages through which data goes to maintain security from creation to destruction. Create, Store, Use, Share, Archive, and Destroy. The lifecycle ensures that data is protected at all times. Create - Data is produced or captured in various forms. Store - Data is saved in a secure location and protected from unauthorized access. Use - Data is accessed and utilized by authorized individuals for intended purposes. Share - Data is exchanged between users, systems, or organizations with appropriate security measures. Archive - Data that is no longer actively used is securely stored for long-term retention. Destroy - Data is securely and irreversibly destroyed when it is no longer needed or required to be retained by law. This lifecycle approach helps organizations implement comprehensive data protection strategies and manage risks associated with data handling.
- Data Seizure in Virtualization The process of capturing or taking control of data within a virtualized environment, often for forensic analysis or legal purposes. Data seizure in virtualization can be complex due to the dynamic and distributed nature of virtual machines (VMs) and their storage. Authorities or forensic experts must ensure the integrity and admissibility of the data by following established protocols and using specialized tools. This includes dealing with challenges such as capturing data without disrupting services, ensuring the consistency of snapshots, and maintaining the chain of custody for the data. Proper techniques ensure that the data seized can provide reliable evidence or insight into the state of the virtualized systems at the time of the seizure.
- Data Structure A specialized format for organizing and storing data in a computer so that it can be accessed and modified efficiently. Different kinds of data structures are suited to different kinds of applications, and some are highly specialized for specific tasks. Data structures can include arrays, linked lists, stacks, queues, trees, graphs, and various types of tables and databases, each with its own strengths and use cases in the realm of computer science and data processing.
- Data subjects Individuals or entities whose data is collected, processed, and stored by an organization. Used in data privacy regulations to ensure the protection of personal information. For example, a healthcare provider may collect data on patients for medical treatment but must ensure their personal information is kept confidential.
- Data Tampering The unauthorized, deliberate alteration of data within a database, system, or network. This can involve modifying, deleting, creating, or damaging data to corrupt information, mislead decisions, or gain unauthorized benefits. Data tampering is a security threat that undermines the integrity and trustworthiness of data, and it can have legal, financial, and reputational consequences. Safeguards against tampering include access controls, encryption, hashing, and audit logs.
- Data Terminal Equipment (DTE) A device at the user end of a communication link that serves as a data source, destination, or both. This can include devices like computers, printers, and terminals. DTEs communicate with data circuit-terminating equipment to establish, maintain, and terminate communication sessions and to manage the data exchange between them.
- Data Users Individuals or entities that access, analyze, or utilize data as part of their business processes, research activities, or decision-making tasks. Data users can range from business analysts and data scientists to end-users inputting and retrieving data from an application. They are typically subject to data governance policies and responsible for adhering to data protection laws and best practices.
Share our FREE glossary with your friends and study buddies.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions, if you find errors please contact us.