A-Z of data protection: terms you need to know
T
territorial privacy
• a type of privacy which prevents someone from intruding into the environment of another individual, such as the home or workplace. Video surveillance and ID checks are some examples of means to compromise territorial privacy
third party collection
• a type of data collection where data is obtained from sources other than the individual or data subject
third party cookies
• cookies generated by websites other than the page the user is visiting
threat
• something that has the potential of inflicting harm, damage, or destruction (e.g. malware, phishing)
threat agent
• an entity that takes advantage of a vulnerability. Some examples of threat agents include insiders, intruders, industrial spies, or foreign governments
transfer limitation
• an organisation must ensure that the cross-border transfer of personal data is done securely and responsibly, according to the guidelines specified by regulating bodies
• one of the 11 data protection obligations under Singapore's Personal Data Protection Act (PDPA)
transparency
• being clear, open, and honest with data subjects or individuals about the purpose of collection and processing of personal data.
trojan horse / trojan
• malicious programs that disguise themselves as legitimate software or files, that carry out malicious activities without the user’s knowledge
two-factor authentication / multi-factor authentication
• an authentication procedure which requires more than one verification method to authenticate a user, usually combining something you know (e.g. password), with something you have (e.g. a token or cryptographic identification device). Sometimes, it is also combined with something you are (e.g. biometrics)