A-Z of data protection: terms you need to know
V
vendor management / third-party management
• the process of assessing and monitoring the privacy policies and practices of your vendors, to ensure that they comply with the appropriate standards and regulations regarding personal data
virtual private network (VPN)
• a secure channel that encrypts your Internet traffic and hides your IP address so that your Internet service provider, other third parties, and malicious actors cannot see your online activity or steal your data
vishing
• a type of phishing done through voice message, phone call or video call
vital interests
• refers to situations of life and death, and is considered a legal basis or legitimate purpose for processing personal data in certain jurisdictions (e.g. Europe, Philippines)
vulnerability
• a weakness, gap or shortcoming in the organisation’s system or procedures that can be exploited by a threat
vulnerability management
• refers to the process of identifying, evaluating and treating, and reporting vulnerabilities, as well as developing plans in case of a successful cyber attack