A-Z of data protection - R is for ...

2022-05-19
banner

A-Z of data protection: terms you need to know

R

ransomware
a type of malware that blocks access to your data, such as by encryption, or threatens to publish personal data unless a demand for ransom is met

Record of Processing Activities (ROPA)
a written record of all data processing activities done by a controller or processor, which typically contains a description of personal information in the system, the purpose, scope and method for processing, the recipients to whom they may be disclosed, data transfer details, the retention period for the data, and security measures in place
The required content for the ROPA may vary slightly per jurisdiction; check with the local jurisdiction to ensure full compliance

residual risk
the level of risk remaining after actions and controls are in put in place

retention limitation
an organisation must not retain or keep any personal data it no longer needs to fulfil any business purpose
one of the 11 data protection obligations under Singapore's Personal Data Protection Act (PDPA)

retention policy
a set of guidelines that dictate how data is stored and retained in the organisation. It includes guidelines regarding how to safeguard that data, how long it should be stored, when it should be disposed and how to dispose data when it is no longer needed

risk
the potential for loss, damage or harm on assets or data

risk assessment
the process of identifying what risks an organisation is exposed to, analysing the nature, impact, and likelihood of the risk, and evaluating which risks are of greater priority

risk management
the process of identifying, analysing, and implementing controls to mitigate the risks. Risk management aims to reduce the amount of risk an organisation is exposed to

risk treatment
the process of selecting and implementing controls to reduce the likelihood and impact of a risk

rootkit
a type of malware which gives hackers remote admin access to your computer, allowing them to steal files, install malware or manipulate your computer. Rootkits are very difficult to detect, since they are designed to protect malware



Just one more step! We've sent an email to .
Please check your inbox or spam and open it to activate your account.

Topics
Related Articles