A-Z of data protection: terms you need to know
vendor management / third-party management
• the process of assessing and monitoring the privacy policies and practices of your vendors, to ensure that they comply with the appropriate standards and regulations regarding personal data
virtual private network (VPN)
• a secure channel that encrypts your Internet traffic and hides your IP address so that your Internet service provider, other third parties, and malicious actors cannot see your online activity or steal your data
vishing
• a type of phishing done through voice message, phone call or video call
vital interests
• refers to situations of life and death, and is considered a legal basis or legitimate purpose for processing personal data in certain jurisdictions (e.g. Europe, Philippines)
vulnerability
• a weakness, gap or shortcoming in the organisation’s system or procedures that can be exploited by a threat
vulnerability management
• refers to the process of identifying, evaluating and treating, and reporting vulnerabilities, as well as developing plans in case of a successful cyber attack
Get access to news, enforcement cases, events, and actionable tips and guides
Get regular email updates and offers
Job opportunities, mentorship and career guidance
Exclusive access to Data Protection community - ask questions, network and share knowledge with peers and experts via WhatsApp and Linkedin
DPEX Network is a Community Initiative of Straits Interactive.
Copyright © Straits Interactive Pte Ltd. All Rights Reserved.
All intellectual property rights to logos and brands featured on this website remain the property of their respective owners.