A-Z of data protection: terms you need to know
ransomware
• a type of malware that blocks access to your data, such as by encryption, or threatens to publish personal data unless a demand for ransom is met
Record of Processing Activities (ROPA)
• a written record of all data processing activities done by a controller or processor, which typically contains a description of personal information in the system, the purpose, scope and method for processing, the recipients to whom they may be disclosed, data transfer details, the retention period for the data, and security measures in place
• The required content for the ROPA may vary slightly per jurisdiction; check with the local jurisdiction to ensure full compliance
residual risk
• the level of risk remaining after actions and controls are in put in place
retention limitation
• an organisation must not retain or keep any personal data it no longer needs to fulfil any business purpose
• one of the 11 data protection obligations under Singapore's Personal Data Protection Act (PDPA)
retention policy
• a set of guidelines that dictate how data is stored and retained in the organisation. It includes guidelines regarding how to safeguard that data, how long it should be stored, when it should be disposed and how to dispose data when it is no longer needed
risk
• the potential for loss, damage or harm on assets or data
risk assessment
• the process of identifying what risks an organisation is exposed to, analysing the nature, impact, and likelihood of the risk, and evaluating which risks are of greater priority
risk management
• the process of identifying, analysing, and implementing controls to mitigate the risks. Risk management aims to reduce the amount of risk an organisation is exposed to
risk treatment
• the process of selecting and implementing controls to reduce the likelihood and impact of a risk
rootkit
• a type of malware which gives hackers remote admin access to your computer, allowing them to steal files, install malware or manipulate your computer. Rootkits are very difficult to detect, since they are designed to protect malware
Get access to news, enforcement cases, events, and actionable tips and guides
Get regular email updates and offers
Job opportunities, mentorship and career guidance
Exclusive access to Data Protection community - ask questions, network and share knowledge with peers and experts via WhatsApp and Linkedin
DPEX Network is a Community Initiative of Straits Interactive.
Copyright © Straits Interactive Pte Ltd. All Rights Reserved.
All intellectual property rights to logos and brands featured on this website remain the property of their respective owners.