← Všechny kategorie   
Vybraná kategorie: Fundamental Concepts and Foundations
Terminology

process by which personal information (PI) is irreversibly altered in such a way that an Individual or a legal entity can no longer be identified directly or indirectly either by the controller alone or in collaboration with any other party

process by which personal information (PI) is irreversibly altered in such a way that an Individual or a legal entity can no longer be identified directly or indirectly either by the controller alone or in collaboration with any other party

Application Area: ITS Architecture
Associated Standards: CEN TR 16742
Terminology

personal information that has been subject to a process of anonymisation and that by any means can no longer be used to identify an Individual or legal entity

personal information that has been subject to a process of anonymisation and that by any means can no longer be used to identify an Individual or legal entity

Application Area: ITS Architecture
Terminology

process of verifying that a claim applies to an entity

process of verifying that a claim applies to an entity

Application Area: ITS Architecture
Terminology

individual's or legal entity's (data subject) explicitly or implicitly freely given agreement to the processing of its PI in the course of which the data subject has been in advance completely informed about the purpose, the legal basis and the third parties, receiving data subject’s PI, and all these in a comprehensible form

individual's or legal entity's (data subject) explicitly or implicitly freely given agreement to the processing of its PI in the course of which the data subject has been in advance completely informed about the purpose, the legal basis and the third parties, receiving data subject’s PI, and all these in a comprehensible form

Application Area: ITS Architecture
Terminology

prevention of misuse of computer data: legal safeguards to prevent misuse of information stored on computers, particularly information about individual people

prevention of misuse of computer data: legal safeguards to prevent misuse of information stored on computers, particularly information about individual people

Application Area: ITS Architecture
Associated Standards: ISO 12859
Terminology

acceptable standard of accuracy of personal data

acceptable standard of accuracy of personal data

Application Area: ITS Architecture
Associated Standards: ISO 12859
Terminology

conditions which result in a data subject being identified, directly or indirectly, on the basis of a given set of PI

conditions which result in a data subject being identified, directly or indirectly, on the basis of a given set of PI

Application Area: ITS Architecture
Associated Standards: CEN TR 16742
Terminology

rights of an invididual to have access to personal data held about the individual and ability to challenge and correct such data

rights of an invididual to have access to personal data held about the individual and ability to challenge and correct such data

Application Area: ITS Architecture
Associated Standards: ISO 12859
Terminology

policy of openness about developments, practices and policies with respect to personal data

policy of openness about developments, practices and policies with respect to personal data

Application Area: ITS Architecture
Associated Standards: ISO 12859
Terminology

any data or information related to an individual or legal entity or an association of person or individuals by which the individual or legal entity or association of persons could be identified
NOTE 1 to entry: The EU-Dir 95/48/EC names in its Art 2 lit. (a) the personal information as “personal data” and defines it as: “any information relating to an identified or identifiable natural person…

any data or information related to an individual or legal entity or an association of person or individuals by which the individual or legal entity or association of persons could be identified
NOTE 1 to entry: The EU-Dir 95/48/EC names in its Art 2 lit. (a) the personal information as “personal data” and defines it as: “any information relating to an identified or identifiable natural person (‘data subject’); an identifiable person is one who can be identified, directly or indirectly, in particular by reference to an identification number or to one or more factors specific to his physical, physiological, mental, economic, cultural or social identity”.

Application Area: ITS Architecture
Terminology

purposes for which personal data are collected

purposes for which personal data are collected

Application Area: ITS Architecture
Associated Standards: ISO 12859
Terminology

statement of user need, typically expressed in a single-sentence form to assist with later verification of compliance

statement of user need, typically expressed in a single-sentence form to assist with later verification of compliance

Application Area: ITS Architecture
Associated Standards: EN ISO TS 17263, ISO TR 24529
Terminology

safeguards against such risks as loss or unauthorised access, destruction, use, modification or disclosure of data

safeguards against such risks as loss or unauthorised access, destruction, use, modification or disclosure of data

Application Area: ITS Architecture
Associated Standards: ISO 12859
Terminology

Security Token Service

Application Area: ITS Architecture
Terminology

any personal information related to a natural person revealing racial or ethnic origin, political opinions, religious or philosophical beliefs, trade union membership, health data or sex life; its processing is prohibited except for closing circumstances

any personal information related to a natural person revealing racial or ethnic origin, political opinions, religious or philosophical beliefs, trade union membership, health data or sex life; its processing is prohibited except for closing circumstances

Application Area: ITS Architecture
Associated Standards: CEN TR 16742
Terminology

collection of (one or more) claims

collection of (one or more) claims

Application Area: ITS Architecture
Terminology

description of a token requirement
NOTE 1 to entry: Token assertions defined within a security binding are used to satisfy protection requirements.

description of a token requirement
NOTE 1 to entry: Token assertions defined within a security binding are used to satisfy protection requirements.

Application Area: ITS Architecture
Terminology

limits to the purposes which personal data can be used

limits to the purposes which personal data can be used

Application Area: ITS Architecture
Associated Standards: ISO 12859
Terminology

web services security policy

Application Area: ITS Architecture

Filtering by Type

Filtering by Application Area