{"id":107476,"date":"2023-01-24T11:59:00","date_gmt":"2023-01-24T11:59:00","guid":{"rendered":"https:\/\/interac1.wpengine.com\/?post_type=content&#038;p=107476"},"modified":"2025-05-30T19:03:45","modified_gmt":"2025-05-30T23:03:45","slug":"the-data-privacy-dictionary","status":"publish","type":"content","link":"https:\/\/www.interac.ca\/en\/content\/life\/the-data-privacy-dictionary\/","title":{"rendered":"The Data Privacy Dictionary"},"content":{"rendered":"\n<p>Everyone wants to keep their personal data safe, but the world of online privacy is complex and can be confusing.&nbsp;&nbsp;<\/p>\n\n\n\n<p>The Data Privacy Dictionary can help you understand the wide world of data privacy \u2013 including common terms like consent management, data encryption and verification \u2013 to help protect yourself and your information online.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-a-k\">A-K<\/h2>\n\n\n\n<section id=\"accordion-block_ad5140922d5c4ef3e19b10cf8927cce5\" class=\"accordion-content-block\" style=\"margin-top: 0px; margin-bottom: 0px;\">\n    <div class=\"grid-container\">\n        <div class=\"grid-x grid-margin-x align-center\">\n            <div class=\"cell small-12\">\n                            <ul class=\"accordion\" data-accordion data-deep-link=\"false\" data-update-history=\"false\" data-deep-link-smudge=\"false\" data-deep-link-smudge-delay=\"500\" id=\"deeplinked-accordion\" data-allow-all-closed=\"true\">\n                                <li class=\"accordion-item\" data-accordion-item><a href=\"#\" class=\"accordion-title\"><h6>Authentication<\/h6><\/a> <div id=\"\" class=\"accordion-content\" data-tab-content><p><span class=\"NormalTextRun SCXW122108528 BCX0\">A process in which a system, service, or website determines that the rightful account holder is <\/span><span class=\"NormalTextRun SCXW122108528 BCX0\">the one <\/span><span class=\"NormalTextRun SCXW122108528 BCX0\">accessing it. Digital authentication can come in many forms and combinations including passwords, biometric data, and more.<\/span><\/p>\n<ol>\n<li><b><span data-contrast=\"none\">Bank-grade Authentication <\/span><\/b><span data-contrast=\"none\">\u2013 The standards and methods of authentication primarily used by financial institutions, which typically involves username, passwords, biometrics, multi-factor authentication and checking multiple fraud signals,\u00a0 to authenticate the user&#8217;s identity and ensure that the banking experience is a secure and safe one.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li><strong><span class=\"TextRun MacChromeBold SCXW131227294 BCX0\" lang=\"EN-CA\" xml:lang=\"EN-CA\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW131227294 BCX0\">Biometric <\/span><span class=\"NormalTextRun SCXW131227294 BCX0\">Authentication<\/span><\/span><\/strong><span class=\"TextRun SCXW131227294 BCX0\" lang=\"EN-CA\" xml:lang=\"EN-CA\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW131227294 BCX0\"> \u2013 <\/span><span class=\"NormalTextRun SCXW131227294 BCX0\">A method of c<\/span><span class=\"NormalTextRun SCXW131227294 BCX0\">onfirming a person\u2019s identity using <\/span><span class=\"NormalTextRun SCXW131227294 BCX0\">their <\/span><span class=\"NormalTextRun SCXW131227294 BCX0\">biological traits, such as scanning their fingerprint, <\/span><span class=\"NormalTextRun SCXW131227294 BCX0\">face, <\/span><span class=\"NormalTextRun SCXW131227294 BCX0\">retina, or voice.<\/span><\/span><span class=\"EOP SCXW131227294 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li><strong><span class=\"TextRun MacChromeBold SCXW66168878 BCX0\" lang=\"EN-CA\" xml:lang=\"EN-CA\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW66168878 BCX0\">Multi-factor <\/span><span class=\"NormalTextRun SCXW66168878 BCX0\">A<\/span><span class=\"NormalTextRun SCXW66168878 BCX0\">uthentication<\/span><\/span><\/strong><span class=\"TextRun SCXW66168878 BCX0\" lang=\"EN-CA\" xml:lang=\"EN-CA\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW66168878 BCX0\"> \u2013 When two or more methods are used to <\/span><span class=\"NormalTextRun SCXW66168878 BCX0\">authenticate <\/span><span class=\"NormalTextRun SCXW66168878 BCX0\">a person <\/span><span class=\"NormalTextRun AdvancedProofingIssueV2Themed SCXW66168878 BCX0\">in order for<\/span><span class=\"NormalTextRun SCXW66168878 BCX0\"> them to <\/span><span class=\"NormalTextRun SCXW66168878 BCX0\">access a website or service.<\/span><\/span><span class=\"EOP SCXW66168878 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li><strong><span class=\"TextRun MacChromeBold SCXW189008450 BCX0\" lang=\"EN-CA\" xml:lang=\"EN-CA\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW189008450 BCX0\">Password <\/span><span class=\"NormalTextRun SCXW189008450 BCX0\">Authentication<\/span><\/span><\/strong><span class=\"TextRun SCXW189008450 BCX0\" lang=\"EN-CA\" xml:lang=\"EN-CA\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW189008450 BCX0\"> \u2013 A combination of letters, numbers, and special characters that <\/span><span class=\"NormalTextRun SCXW189008450 BCX0\">are used to confirm a <\/span><span class=\"NormalTextRun SCXW189008450 BCX0\">person\u2019s <\/span><span class=\"NormalTextRun SCXW189008450 BCX0\">identi<\/span><span class=\"NormalTextRun SCXW189008450 BCX0\">t<\/span><span class=\"NormalTextRun SCXW189008450 BCX0\">y <\/span><span class=\"NormalTextRun AdvancedProofingIssueV2Themed SCXW189008450 BCX0\">in order for<\/span><span class=\"NormalTextRun SCXW189008450 BCX0\"> them to <\/span><span class=\"NormalTextRun SCXW189008450 BCX0\">access a<\/span> <span class=\"NormalTextRun SCXW189008450 BCX0\">web<\/span><span class=\"NormalTextRun SCXW189008450 BCX0\">site or service.<\/span><\/span><span class=\"EOP SCXW189008450 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<\/ol>\n<\/div><\/li><li class=\"accordion-item\" data-accordion-item><a href=\"#\" class=\"accordion-title\"><h6>Biometric Data<\/h6><\/a> <div id=\"\" class=\"accordion-content\" data-tab-content><p><span class=\"TextRun SCXW211233942 BCX0\" lang=\"EN-CA\" xml:lang=\"EN-CA\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW211233942 BCX0\">Data obtained through the unique patterns in a person\u2019s eyes, voice, or fingerprint.<\/span><\/span><\/p>\n<\/div><\/li><li class=\"accordion-item\" data-accordion-item><a href=\"#\" class=\"accordion-title\"><h6>Consent Management <\/h6><\/a> <div id=\"\" class=\"accordion-content\" data-tab-content><p><span class=\"NormalTextRun SCXW253107209 BCX0\">The <\/span><span class=\"NormalTextRun SCXW253107209 BCX0\">process by which<\/span><span class=\"NormalTextRun SCXW253107209 BCX0\"> a business\/<\/span><span class=\"NormalTextRun SCXW253107209 BCX0\">web<\/span><span class=\"NormalTextRun SCXW253107209 BCX0\">site <\/span><span class=\"NormalTextRun SCXW253107209 BCX0\">obtains consent from <\/span><span class=\"NormalTextRun SCXW253107209 BCX0\">users <\/span><span class=\"NormalTextRun SCXW253107209 BCX0\">to the<\/span><span class=\"NormalTextRun SCXW253107209 BCX0\"> collect<\/span><span class=\"NormalTextRun SCXW253107209 BCX0\">ion, use, <\/span><span class=\"NormalTextRun SCXW253107209 BCX0\">disclosure<\/span> <span class=\"NormalTextRun SCXW253107209 BCX0\">and process<\/span><span class=\"NormalTextRun SCXW253107209 BCX0\">ing of personal information.<\/span><\/p>\n<\/div><\/li><li class=\"accordion-item\" data-accordion-item><a href=\"#\" class=\"accordion-title\"><h6>Cookie Banner <\/h6><\/a> <div id=\"\" class=\"accordion-content\" data-tab-content><p><span class=\"TextRun SCXW181782185 BCX0\" lang=\"EN-CA\" xml:lang=\"EN-CA\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW181782185 BCX0\">A pop-up on websites to inform a user that the <\/span><span class=\"NormalTextRun SCXW181782185 BCX0\">web<\/span><span class=\"NormalTextRun SCXW181782185 BCX0\">site uses cookies and\/or asks for permission to use them.<\/span><\/span><span class=\"EOP SCXW181782185 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<\/div><\/li><li class=\"accordion-item\" data-accordion-item><a href=\"#\" class=\"accordion-title\"><h6>Cookies <\/h6><\/a> <div id=\"\" class=\"accordion-content\" data-tab-content><p><span class=\"NormalTextRun SCXW23744734 BCX0\">Small text files stored in the browser by the website<\/span><span class=\"NormalTextRun SCXW23744734 BCX0\">, containing unique identifiers<\/span><span class=\"NormalTextRun SCXW23744734 BCX0\"> such as login information, what was in a shopping cart, when a user last visited, etc.<\/span><\/p>\n<ol>\n<li><strong><span class=\"TextRun MacChromeBold SCXW247119159 BCX0\" lang=\"EN-CA\" xml:lang=\"EN-CA\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW247119159 BCX0\">First-party cookies<\/span><\/span><\/strong><span class=\"TextRun SCXW247119159 BCX0\" lang=\"EN-CA\" xml:lang=\"EN-CA\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW247119159 BCX0\"> \u2013 Cookies set by the website the visitor is on.<\/span><\/span><span class=\"EOP SCXW247119159 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li><strong><span class=\"TextRun MacChromeBold SCXW201138397 BCX0\" lang=\"EN-CA\" xml:lang=\"EN-CA\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW201138397 BCX0\">Third-party cookies<\/span><\/span><\/strong><span class=\"TextRun SCXW201138397 BCX0\" lang=\"EN-CA\" xml:lang=\"EN-CA\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW201138397 BCX0\"> \u2013 Cookies set by companies other than the website the visitor is on. These are normally applied to track user behaviour across multiple web<\/span><span class=\"NormalTextRun SCXW201138397 BCX0\">sites to build a robust user profile for targeted advertising.<\/span><\/span><\/li>\n<\/ol>\n<\/div><\/li><li class=\"accordion-item\" data-accordion-item><a href=\"#\" class=\"accordion-title\"><h6>Data Encryption<\/h6><\/a> <div id=\"\" class=\"accordion-content\" data-tab-content><p><span class=\"NormalTextRun SCXW47821830 BCX0\">Taking readable data and changing it so it appears to be written with random text<\/span><span class=\"NormalTextRun SCXW47821830 BCX0\"> in order<\/span><span class=\"NormalTextRun SCXW47821830 BCX0\"> to prevent <\/span><span class=\"NormalTextRun SCXW47821830 BCX0\">it<\/span><span class=\"NormalTextRun SCXW47821830 BCX0\"> from being viewed or altered.<\/span><span class=\"NormalTextRun SCXW47821830 BCX0\"> Encrypted data<\/span><span class=\"NormalTextRun SCXW47821830 BCX0\"> can only be decrypted by people with access to a special key (a \u201cdecryption key\u201d).<\/span><\/p>\n<\/div><\/li><li class=\"accordion-item\" data-accordion-item><a href=\"#\" class=\"accordion-title\"><h6>Data Liability Coverage<\/h6><\/a> <div id=\"\" class=\"accordion-content\" data-tab-content><p><span data-contrast=\"none\">A service that provides protection against the loss of electronic data. This can be provided by some private insurance companies and FinTechs.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<\/div><\/li><li class=\"accordion-item\" data-accordion-item><a href=\"#\" class=\"accordion-title\"><h6>Data Minimization<\/h6><\/a> <div id=\"\" class=\"accordion-content\" data-tab-content><p><span class=\"NormalTextRun SCXW42900399 BCX0\">Limiting the c<\/span><span class=\"NormalTextRun SCXW42900399 BCX0\">ollecti<\/span><span class=\"NormalTextRun SCXW42900399 BCX0\">on<\/span><span class=\"NormalTextRun SCXW42900399 BCX0\"> and storage of personal information to<\/span><span class=\"NormalTextRun SCXW42900399 BCX0\"> only the relevant information <\/span><span class=\"NormalTextRun SCXW42900399 BCX0\">needed to fulfi<\/span><span class=\"NormalTextRun SCXW42900399 BCX0\">l<\/span><span class=\"NormalTextRun SCXW42900399 BCX0\">l <\/span><span class=\"NormalTextRun SCXW42900399 BCX0\">the<\/span><span class=\"NormalTextRun SCXW42900399 BCX0\"> purpose of collection.<\/span><\/p>\n<\/div><\/li><li class=\"accordion-item\" data-accordion-item><a href=\"#\" class=\"accordion-title\"><h6>Data Privacy<\/h6><\/a> <div id=\"\" class=\"accordion-content\" data-tab-content><p><span class=\"NormalTextRun SCXW45913786 BCX0\">The<\/span><span class=\"NormalTextRun SCXW45913786 BCX0\"> idea that an individual should have control of their personal data and how it is collected or shared.<\/span><\/p>\n<\/div><\/li><li class=\"accordion-item\" data-accordion-item><a href=\"#\" class=\"accordion-title\"><h6>Data Types <\/h6><\/a> <div id=\"\" class=\"accordion-content\" data-tab-content><ol>\n<li><span class=\"TextRun MacChromeBold SCXW89007671 BCX0\" lang=\"EN-CA\" xml:lang=\"EN-CA\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW89007671 BCX0\"><strong>First-party data<\/strong> <span class=\"TextRun SCXW116046768 BCX0\" lang=\"EN-CA\" xml:lang=\"EN-CA\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW116046768 BCX0\">\u2013 Information a company collects directly from the users.<\/span><\/span><\/span><\/span><\/li>\n<li><strong><span class=\"NormalTextRun SCXW8259531 BCX0\">Second<\/span><span class=\"NormalTextRun SCXW8259531 BCX0\">&#8211;<\/span><\/strong><span class=\"NormalTextRun SCXW8259531 BCX0\"><strong>party data<\/strong> \u2013 Information shared or sold by one company or website that collected that information to another for the second party\u2019s use (i.e., the data is being used second hand).<\/span><\/li>\n<li><span class=\"TextRun MacChromeBold SCXW225287627 BCX0\" lang=\"EN-CA\" xml:lang=\"EN-CA\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW225287627 BCX0\"><strong>Third-party data<\/strong> <span class=\"TextRun MacChromeBold SCXW89007671 BCX0\" lang=\"EN-CA\" xml:lang=\"EN-CA\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW89007671 BCX0\"><span class=\"TextRun SCXW116046768 BCX0\" lang=\"EN-CA\" xml:lang=\"EN-CA\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW116046768 BCX0\">\u2013<\/span><\/span><\/span><\/span> Information obtained from companies that don\u2019t have a direct <span class=\"NormalTextRun SCXW157518721 BCX0\">relationship with the <\/span><span class=\"NormalTextRun SCXW157518721 BCX0\">subject and<\/span> <span class=\"NormalTextRun SCXW157518721 BCX0\">is <\/span><span class=\"NormalTextRun SCXW157518721 BCX0\">usually bought through a marketplace or resource<\/span><span class=\"NormalTextRun SCXW157518721 BCX0\"> that did not itself collect that information from the subject<\/span><span class=\"NormalTextRun SCXW157518721 BCX0\">.<\/span><\/span><\/span><\/li>\n<li><span class=\"TextRun MacChromeBold SCXW264758079 BCX0\" lang=\"EN-CA\" xml:lang=\"EN-CA\" data-contrast=\"none\"><strong><span class=\"NormalTextRun SCXW264758079 BCX0\">Z<\/span><\/strong><span class=\"NormalTextRun SCXW264758079 BCX0\"><strong>ero-party data<\/strong> <span class=\"TextRun MacChromeBold SCXW89007671 BCX0\" lang=\"EN-CA\" xml:lang=\"EN-CA\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW89007671 BCX0\"><span class=\"TextRun SCXW116046768 BCX0\" lang=\"EN-CA\" xml:lang=\"EN-CA\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW116046768 BCX0\">\u2013<\/span><\/span><\/span><\/span><span class=\"NormalTextRun SCXW36796085 BCX0\">\u00a0Personal information <\/span><span class=\"NormalTextRun SCXW36796085 BCX0\">voluntarily <\/span><span class=\"NormalTextRun SCXW36796085 BCX0\">provided by the user themselves (personal preferences, shipping info, account information<\/span><span class=\"NormalTextRun SCXW36796085 BCX0\"> etc.).<\/span><\/span><\/span><\/li>\n<\/ol>\n<\/div><\/li><li class=\"accordion-item\" data-accordion-item><a href=\"#\" class=\"accordion-title\"><h6>Digital Access<\/h6><\/a> <div id=\"\" class=\"accordion-content\" data-tab-content><p><span class=\"TextRun SCXW114562386 BCX0\" lang=\"EN-CA\" xml:lang=\"EN-CA\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW114562386 BCX0\">Access to a computing device and\/or the internet.<\/span><\/span><\/p>\n<\/div><\/li><li class=\"accordion-item\" data-accordion-item><a href=\"#\" class=\"accordion-title\"><h6>Digital Identity\/Digital ID<\/h6><\/a> <div id=\"\" class=\"accordion-content\" data-tab-content><p><span class=\"TextRun SCXW13660743 BCX0\" lang=\"EN-CA\" xml:lang=\"EN-CA\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW13660743 BCX0\">A<\/span><span class=\"NormalTextRun SCXW13660743 BCX0\">ny piece of personal <\/span><\/span><a class=\"Hyperlink SCXW13660743 BCX0\" href=\"https:\/\/www.interac.ca\/en\/content\/business\/what-interac-verification-solutions-means-for-digital-access-in-canada\/\" target=\"_blank\" rel=\"noreferrer noopener\"><span class=\"TextRun Underlined SCXW13660743 BCX0\" lang=\"EN-CA\" xml:lang=\"EN-CA\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW13660743 BCX0\" data-ccp-charstyle=\"Hyperlink\">data that exists online<\/span><\/span><\/a><span class=\"TextRun SCXW13660743 BCX0\" lang=\"EN-CA\" xml:lang=\"EN-CA\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW13660743 BCX0\"> and can be traced back to an individual.<\/span><\/span><\/p>\n<\/div><\/li><li class=\"accordion-item\" data-accordion-item><a href=\"#\" class=\"accordion-title\"><h6>Digital Security <\/h6><\/a> <div id=\"\" class=\"accordion-content\" data-tab-content><p><span class=\"NormalTextRun SCXW111244321 BCX0\">Protecting data in a computer, mobile device, and other Internet-connected devices from <\/span><span class=\"NormalTextRun SCXW111244321 BCX0\">unauthorized access, corruption, or theft<\/span><span class=\"NormalTextRun SCXW111244321 BCX0\">.<\/span><\/p>\n<\/div><\/li><li class=\"accordion-item\" data-accordion-item><a href=\"#\" class=\"accordion-title\"><h6>Digital Transformation<\/h6><\/a> <div id=\"\" class=\"accordion-content\" data-tab-content><p><span class=\"TextRun SCXW249462164 BCX0\" lang=\"EN-CA\" xml:lang=\"EN-CA\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW249462164 BCX0\">The integration of digital technology in business to become more efficient, competitive, and able to meet the demands of clients and the business itself.<\/span><\/span><\/p>\n<\/div><\/li><li class=\"accordion-item\" data-accordion-item><a href=\"#\" class=\"accordion-title\"><h6>Identity Theft<\/h6><\/a> <div id=\"\" class=\"accordion-content\" data-tab-content><p><span class=\"NormalTextRun SCXW203794114 BCX0\">W<\/span><span class=\"NormalTextRun SCXW203794114 BCX0\">here <\/span><span class=\"NormalTextRun SCXW203794114 BCX0\">a third-party<\/span><span class=\"NormalTextRun SCXW203794114 BCX0\"> who <\/span><span class=\"NormalTextRun SCXW203794114 BCX0\">has<\/span><span class=\"NormalTextRun SCXW203794114 BCX0\"> stolen <\/span><span class=\"NormalTextRun SCXW203794114 BCX0\">or fraudulently obtained <\/span><span class=\"NormalTextRun SCXW203794114 BCX0\">an individual\u2019s personal information use<\/span><span class=\"NormalTextRun SCXW203794114 BCX0\">s<\/span><span class=\"NormalTextRun SCXW203794114 BCX0\"> it to pose <\/span><span class=\"NormalTextRun SCXW203794114 BCX0\">for a fraudulent purpose, such as posing <\/span><span class=\"NormalTextRun SCXW203794114 BCX0\">as the user and steal<\/span><span class=\"NormalTextRun SCXW203794114 BCX0\">ing<\/span><span class=\"NormalTextRun SCXW203794114 BCX0\"> their money or tak<\/span><span class=\"NormalTextRun SCXW203794114 BCX0\">ing<\/span><span class=\"NormalTextRun SCXW203794114 BCX0\"> out a loan in their name.<\/span><\/p>\n<\/div><\/li><li class=\"accordion-item\" data-accordion-item><a href=\"#\" class=\"accordion-title\"><h6>Interoperability<\/h6><\/a> <div id=\"\" class=\"accordion-content\" data-tab-content><p><span class=\"TextRun SCXW40185366 BCX0\" lang=\"EN-CA\" xml:lang=\"EN-CA\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW40185366 BCX0\">The ability of different systems, devices, or services to communicate and connect to one another in a coordinated way.<\/span><\/span><\/p>\n<\/div><\/li>                <\/ul>\n            <\/div>\n        <\/div>\n    <\/div>\n<\/section>\n\n\n<h2 class=\"wp-block-heading\" id=\"h-l-z\">L-Z<\/h2>\n\n\n\n<section id=\"accordion-block_444947649d4653e243e0d7ac1fa1f89f\" class=\"accordion-content-block\" style=\"margin-top: 0px; margin-bottom: 0px;\">\n    <div class=\"grid-container\">\n        <div class=\"grid-x grid-margin-x align-center\">\n            <div class=\"cell small-12\">\n                            <ul class=\"accordion\" data-accordion data-deep-link=\"false\" data-update-history=\"false\" data-deep-link-smudge=\"false\" data-deep-link-smudge-delay=\"500\" id=\"deeplinked-accordion\" data-allow-all-closed=\"true\">\n                                <li class=\"accordion-item\" data-accordion-item><a href=\"#\" class=\"accordion-title\"><h6>Malware <\/h6><\/a> <div id=\"\" class=\"accordion-content\" data-tab-content><p><span class=\"NormalTextRun SCXW53396322 BCX0\">\u201cMalicious Software\u201d, a blanket term for any kind of software with malicious intent<\/span><span class=\"NormalTextRun SCXW53396322 BCX0\"> (<\/span><span class=\"NormalTextRun SCXW53396322 BCX0\">i.e.,<\/span><span class=\"NormalTextRun SCXW53396322 BCX0\"> to disrupt, damage or gain unauthorized access)<\/span><span class=\"NormalTextRun SCXW53396322 BCX0\">.<\/span><\/p>\n<ol>\n<li><strong><span class=\"TextRun MacChromeBold SCXW42971835 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW42971835 BCX0\">Keylogge<\/span><\/span><\/strong><span class=\"TextRun SCXW42971835 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW42971835 BCX0\"><strong>r<\/strong> \u2013 Also known as a keystroke logger, this is a type of malware that monitors the keyboard inputs a user makes. This can then be used to <\/span><span class=\"NormalTextRun SCXW42971835 BCX0\">obtain unauthorized access to <\/span><span class=\"NormalTextRun SCXW42971835 BCX0\">passwords <\/span><span class=\"NormalTextRun SCXW42971835 BCX0\">and other sensitive or confidential <\/span><span class=\"NormalTextRun SCXW42971835 BCX0\">details<\/span> <span class=\"NormalTextRun SCXW42971835 BCX0\">(<\/span><span class=\"NormalTextRun SCXW42971835 BCX0\">i.e.,<\/span> <span class=\"NormalTextRun SCXW42971835 BCX0\">financial details<\/span><span class=\"NormalTextRun SCXW42971835 BCX0\">)<\/span><span class=\"NormalTextRun SCXW42971835 BCX0\">.<\/span><\/span><span class=\"EOP SCXW42971835 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li><strong><span class=\"TextRun MacChromeBold SCXW76262617 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW76262617 BCX0\">Spyware<\/span><\/span><\/strong><span class=\"TextRun SCXW76262617 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW76262617 BCX0\"> \u2013 A type of malware that hides on the user\u2019s computer and<\/span><span class=\"NormalTextRun SCXW76262617 BCX0\"> can transmit<\/span><span class=\"NormalTextRun SCXW76262617 BCX0\"> their <\/span><span class=\"NormalTextRun SCXW76262617 BCX0\">activity, passwords<\/span><span class=\"NormalTextRun SCXW76262617 BCX0\"> and<\/span><span class=\"NormalTextRun SCXW76262617 BCX0\"> other sensitive or confidential details (<\/span><span class=\"NormalTextRun SCXW76262617 BCX0\">i.e.,<\/span><span class=\"NormalTextRun SCXW76262617 BCX0\"> financial details<\/span><span class=\"NormalTextRun SCXW76262617 BCX0\">)<\/span><span class=\"NormalTextRun SCXW76262617 BCX0\">.<\/span><\/span><span class=\"EOP SCXW76262617 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li><strong><span class=\"TextRun MacChromeBold SCXW159473625 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW159473625 BCX0\">Trojan Horse Viru<\/span><span class=\"NormalTextRun SCXW159473625 BCX0\">s<\/span><\/span><\/strong><span class=\"TextRun SCXW159473625 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW159473625 BCX0\"> \u2013 A type of malware disguised as a regular program. There are many types of Trojan <\/span><span class=\"NormalTextRun SCXW159473625 BCX0\">horse <\/span><span class=\"NormalTextRun SCXW159473625 BCX0\">viruses that do anything from taking down a network via <\/span><span class=\"NormalTextRun SCXW159473625 BCX0\">a user\u2019s<\/span><span class=\"NormalTextRun SCXW159473625 BCX0\"> computer by flooding it with traffic to impairing <\/span><span class=\"NormalTextRun SCXW159473625 BCX0\">the<\/span><span class=\"NormalTextRun SCXW159473625 BCX0\"> computer\u2019s performance to get a ransom.<\/span><\/span><span class=\"EOP SCXW159473625 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<\/ol>\n<\/div><\/li><li class=\"accordion-item\" data-accordion-item><a href=\"#\" class=\"accordion-title\"><h6>Personal Information<\/h6><\/a> <div id=\"\" class=\"accordion-content\" data-tab-content><p><span class=\"NormalTextRun SCXW232620584 BCX0\">A<\/span><span class=\"NormalTextRun SCXW232620584 BCX0\">lso known as \u201cPersonally Identifiable Information\u201d \u2013 <\/span><span class=\"NormalTextRun SCXW232620584 BCX0\">information in any format (paper or digital) <\/span><span class=\"NormalTextRun SCXW232620584 BCX0\">that can be used to directly or indirectly<\/span> <span class=\"NormalTextRun SCXW232620584 BCX0\">identify an<\/span><span class=\"NormalTextRun SCXW232620584 BCX0\"> individual. This can include <\/span><span class=\"NormalTextRun SCXW232620584 BCX0\">name, date of birth, contact information, <\/span><span class=\"NormalTextRun SCXW232620584 BCX0\">ID cards, health information, and <\/span><span class=\"NormalTextRun SCXW232620584 BCX0\">certain employment information<\/span><span class=\"NormalTextRun SCXW232620584 BCX0\">.<\/span><\/p>\n<ol>\n<li><strong><span class=\"TextRun MacChromeBold SCXW162194764 BCX0\" lang=\"EN-CA\" xml:lang=\"EN-CA\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW162194764 BCX0\">Publicly <\/span><span class=\"NormalTextRun SCXW162194764 BCX0\">A<\/span><span class=\"NormalTextRun SCXW162194764 BCX0\">vailable<\/span><span class=\"NormalTextRun SCXW162194764 BCX0\"> Information<\/span><\/span><\/strong><span class=\"TextRun SCXW162194764 BCX0\" lang=\"EN-CA\" xml:lang=\"EN-CA\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW162194764 BCX0\"> \u2013 Information <\/span><span class=\"NormalTextRun SCXW162194764 BCX0\">that is<\/span><span class=\"NormalTextRun SCXW162194764 BCX0\"> readily<\/span><span class=\"NormalTextRun SCXW162194764 BCX0\"> available to the public<\/span><span class=\"NormalTextRun SCXW162194764 BCX0\"> (<\/span><span class=\"NormalTextRun SCXW162194764 BCX0\">i.e.,<\/span><span class=\"NormalTextRun SCXW162194764 BCX0\"> work phone number or email address, address which can be found in a public directory, etc.)<\/span><span class=\"NormalTextRun SCXW162194764 BCX0\">.<\/span><\/span><span class=\"EOP SCXW162194764 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li><strong><span class=\"TextRun MacChromeBold SCXW15409532 BCX0\" lang=\"EN-CA\" xml:lang=\"EN-CA\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW15409532 BCX0\">Sensitive <\/span><span class=\"NormalTextRun SCXW15409532 BCX0\">Information <\/span><\/span><\/strong><span class=\"TextRun SCXW15409532 BCX0\" lang=\"EN-CA\" xml:lang=\"EN-CA\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW15409532 BCX0\">\u2013 Information that one would expect to have a <\/span><span class=\"NormalTextRun SCXW15409532 BCX0\">higher <\/span><span class=\"NormalTextRun SCXW15409532 BCX0\">level of privacy, such as health or financial information.<\/span><\/span><span class=\"EOP SCXW15409532 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<\/ol>\n<\/div><\/li><li class=\"accordion-item\" data-accordion-item><a href=\"#\" class=\"accordion-title\"><h6>PIPEDA (Personal Information Protection and Electronic Documents Act)<\/h6><\/a> <div id=\"\" class=\"accordion-content\" data-tab-content><p><span class=\"NormalTextRun SCXW216685831 BCX0\">The law that governs how Canadian <\/span><span class=\"NormalTextRun SCXW216685831 BCX0\">private sector organizations<\/span><span class=\"NormalTextRun SCXW216685831 BCX0\"> collect, use, and disclose personal information<\/span> <span class=\"NormalTextRun AdvancedProofingIssueV2Themed SCXW216685831 BCX0\">in the course of<\/span><span class=\"NormalTextRun SCXW216685831 BCX0\"> for-profit activities<\/span><span class=\"NormalTextRun SCXW216685831 BCX0\">. Alberta, B<\/span><span class=\"NormalTextRun SCXW216685831 BCX0\">ritish <\/span><span class=\"NormalTextRun SCXW216685831 BCX0\">C<\/span><span class=\"NormalTextRun SCXW216685831 BCX0\">olumbia<\/span><span class=\"NormalTextRun SCXW216685831 BCX0\">, and Quebec al<\/span><span class=\"NormalTextRun SCXW216685831 BCX0\">l<\/span><span class=\"NormalTextRun SCXW216685831 BCX0\"> have<\/span><span class=\"NormalTextRun SCXW216685831 BCX0\"> comprehensive private sector<\/span><span class=\"NormalTextRun SCXW216685831 BCX0\"> privacy laws <\/span><span class=\"NormalTextRun SCXW216685831 BCX0\">to the collection, use, and disclosure of personal information in<\/span> <span class=\"NormalTextRun SCXW216685831 BCX0\">their jurisdiction<\/span><span class=\"NormalTextRun SCXW216685831 BCX0\">.<\/span><\/p>\n<\/div><\/li><li class=\"accordion-item\" data-accordion-item><a href=\"#\" class=\"accordion-title\"><h6>Privacy Policy <\/h6><\/a> <div id=\"\" class=\"accordion-content\" data-tab-content><p><span class=\"NormalTextRun SCXW123781542 BCX0\">The policy a business has in place stating <\/span><span class=\"NormalTextRun SCXW123781542 BCX0\">their personal <\/span><span class=\"NormalTextRun SCXW123781542 BCX0\">information handling practices and what <\/span><span class=\"NormalTextRun SCXW123781542 BCX0\">they will be doing with your information.<\/span><\/p>\n<\/div><\/li><li class=\"accordion-item\" data-accordion-item><a href=\"#\" class=\"accordion-title\"><h6>Profiling <\/h6><\/a> <div id=\"\" class=\"accordion-content\" data-tab-content><p><span class=\"NormalTextRun SCXW248284892 BCX0\">The automated processing of personal <\/span><span class=\"NormalTextRun SCXW248284892 BCX0\">information<\/span><span class=\"NormalTextRun SCXW248284892 BCX0\"> to <\/span><span class=\"NormalTextRun SCXW248284892 BCX0\">gain insight<\/span><span class=\"NormalTextRun SCXW248284892 BCX0\">s about <\/span><span class=\"NormalTextRun SCXW248284892 BCX0\">a user<\/span><span class=\"NormalTextRun SCXW248284892 BCX0\">. <\/span><span class=\"NormalTextRun SCXW248284892 BCX0\">Profil<\/span><span class=\"NormalTextRun SCXW248284892 BCX0\">ing can be used for things such as suggesting<\/span><span class=\"NormalTextRun SCXW248284892 BCX0\"> music o<\/span><span class=\"NormalTextRun SCXW248284892 BCX0\">r<\/span><span class=\"NormalTextRun SCXW248284892 BCX0\"> video<\/span><span class=\"NormalTextRun SCXW248284892 BCX0\">s<\/span><span class=\"NormalTextRun SCXW248284892 BCX0\"> based on previous history (\u201cBased on your listening history, we suggest these albums\u201d).<\/span><\/p>\n<\/div><\/li><li class=\"accordion-item\" data-accordion-item><a href=\"#\" class=\"accordion-title\"><h6>Pseudonymization <\/h6><\/a> <div id=\"\" class=\"accordion-content\" data-tab-content><p><span class=\"NormalTextRun SCXW210884775 BCX0\">The process in which p<\/span><span class=\"NormalTextRun SCXW210884775 BCX0\">ersonal <\/span><span class=\"NormalTextRun SCXW210884775 BCX0\">information<\/span> <span class=\"NormalTextRun SCXW210884775 BCX0\">is<\/span><span class=\"NormalTextRun SCXW210884775 BCX0\"> de-identified <\/span><span class=\"NormalTextRun SCXW210884775 BCX0\">and renamed <\/span><span class=\"NormalTextRun SCXW210884775 BCX0\">so it cannot be associated with an individual.\u00a0<\/span><\/p>\n<\/div><\/li><li class=\"accordion-item\" data-accordion-item><a href=\"#\" class=\"accordion-title\"><h6>Scam <\/h6><\/a> <div id=\"\" class=\"accordion-content\" data-tab-content><p><span class=\"NormalTextRun SCXW58137529 BCX0\">A fraudulent or deceptive act where a scammer <\/span><span class=\"NormalTextRun SCXW58137529 BCX0\">tries to obtain financial<\/span><span class=\"NormalTextRun SCXW58137529 BCX0\">, sensitive<\/span><span class=\"NormalTextRun SCXW58137529 BCX0\"> or personal information. Some examples are a<\/span><span class=\"NormalTextRun SCXW58137529 BCX0\"> fake text message, email, or phone call in which a scammer claims to be <\/span><span class=\"NormalTextRun SCXW58137529 BCX0\">someone<\/span><span class=\"NormalTextRun SCXW58137529 BCX0\"> else, such as <\/span><span class=\"NormalTextRun SCXW58137529 BCX0\">a prospective romantic partner or a representative from an official service such as the CRA<\/span><span class=\"NormalTextRun SCXW58137529 BCX0\">.<\/span><span class=\"NormalTextRun SCXW58137529 BCX0\">\u00a0<\/span><\/p>\n<ol>\n<li><strong><span class=\"TextRun MacChromeBold SCXW248821921 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW248821921 BCX0\">Fake Online Shopping Websites<\/span><\/span><\/strong><span class=\"TextRun SCXW248821921 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW248821921 BCX0\"> \u2013 The process in which fraudsters set up fake online shopping portals with the intention of being paid and not delivering the product at all.<\/span><\/span><span class=\"EOP SCXW248821921 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li><span class=\"TextRun MacChromeBold SCXW211405509 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW211405509 BCX0\"><strong>Phishing<\/strong> <span class=\"TextRun SCXW248821921 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW248821921 BCX0\">\u2013<\/span><\/span> <span class=\"NormalTextRun SCXW155242044 BCX0\">The process in which a scammer sends fraudulent messages, usually by email, to trick a person into clicking a link <\/span><span class=\"NormalTextRun SCXW155242044 BCX0\">in order to<\/span><span class=\"NormalTextRun SCXW155242044 BCX0\"> download malware or reveal their financial information<\/span><span class=\"NormalTextRun SCXW155242044 BCX0\">, passwords or other sensitive information<\/span><span class=\"NormalTextRun SCXW155242044 BCX0\">.<\/span><\/span><\/span><\/li>\n<li><strong><span class=\"TextRun MacChromeBold SCXW68960219 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW68960219 BCX0\">Smishing<\/span><\/span><\/strong><span class=\"TextRun SCXW68960219 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW68960219 BCX0\"> \u2013 Similar to phishing but the scammer specifically sends a fraudulent text message<\/span><span class=\"NormalTextRun SCXW68960219 BCX0\"> via SMS.<\/span><\/span><\/li>\n<\/ol>\n<\/div><\/li><li class=\"accordion-item\" data-accordion-item><a href=\"#\" class=\"accordion-title\"><h6>Tokenization <\/h6><\/a> <div id=\"\" class=\"accordion-content\" data-tab-content><p><span class=\"NormalTextRun SCXW261757601 BCX0\">A similar process to pseudonymization but includes a level of encryption to personal data to en<\/span><span class=\"NormalTextRun SCXW261757601 BCX0\">s<\/span><span class=\"NormalTextRun SCXW261757601 BCX0\">ure the pseudonym is an unrecognizable token.<\/span><\/p>\n<\/div><\/li><li class=\"accordion-item\" data-accordion-item><a href=\"#\" class=\"accordion-title\"><h6>TripleBlind <\/h6><\/a> <div id=\"\" class=\"accordion-content\" data-tab-content><p><span class=\"TextRun SCXW80484107 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW80484107 BCX0\">A security enhancement technology that hides the source and destination in order to increase privacy and security<\/span><span class=\"NormalTextRun SCXW80484107 BCX0\"> of an end user<\/span><span class=\"NormalTextRun SCXW80484107 BCX0\">. When using the<\/span><\/span><em><span class=\"TextRun SCXW80484107 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW80484107 BCX0\">Interac<\/span><\/span><\/em><span class=\"TextRun SCXW80484107 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW80484107 BCX0\"> sign-in service, for example, no financial institution, government service or network operators knows from where or to where you are signing in.<\/span><\/span><\/p>\n<\/div><\/li><li class=\"accordion-item\" data-accordion-item><a href=\"#\" class=\"accordion-title\"><h6>Verification<\/h6><\/a> <div id=\"\" class=\"accordion-content\" data-tab-content><p><span class=\"NormalTextRun SCXW110764346 BCX0\">A process in which a system or service needs to confirm that the user is an actual person that <\/span><span class=\"NormalTextRun SCXW110764346 BCX0\">exists<\/span><span class=\"NormalTextRun SCXW110764346 BCX0\"> and that the user is who they say they are<\/span><span class=\"NormalTextRun SCXW110764346 BCX0\">. This is usually done with physical identification documents such as ID cards, passports, or bank information.<\/span><\/p>\n<\/div><\/li>                <\/ul>\n            <\/div>\n        <\/div>\n    <\/div>\n<\/section>","protected":false},"excerpt":{"rendered":"<p>Everyone wants to keep their personal data safe, but the world of online privacy is complex and can be confusing.&nbsp;&nbsp; The Data Privacy Dictionary can help you understand the wide world of data privacy \u2013 including common terms like consent management, data encryption and verification \u2013 to help protect yourself and your information online.&nbsp; A-K&hellip;<\/p>\n","protected":false},"author":28,"featured_media":107492,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"content-tags":[945,788],"content-category":[192],"spokespeople":[],"in_the_know_post_format":[169],"class_list":["post-107476","content","type-content","status-publish","format-standard","has-post-thumbnail","hentry","content-tags-fraud-security","content-tags-interac-verified","content-category-life","in_the_know_post_format-article"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Delving Into the Data Privacy Dictionary<\/title>\n<meta name=\"description\" content=\"Learn what\u2019s what in the wide world of digital security with our Data Privacy Dictionary so you can help protect yourself and your information online.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.interac.ca\/en\/content\/life\/the-data-privacy-dictionary\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Data Privacy Dictionary\" \/>\n<meta property=\"og:description\" content=\"Everyone wants to keep their personal data safe, but the world of online privacy is complex and can be confusing.&nbsp;&nbsp; The Data Privacy Dictionary\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.interac.ca\/en\/content\/life\/the-data-privacy-dictionary\/\" \/>\n<meta property=\"og:site_name\" content=\"Interac\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/interac\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-30T23:03:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.interac.ca\/wp-content\/uploads\/2023\/01\/data-privacy-dictionary-header-1024x566.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"566\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@interac\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.interac.ca\/en\/content\/life\/the-data-privacy-dictionary\/\",\"url\":\"https:\/\/www.interac.ca\/en\/content\/life\/the-data-privacy-dictionary\/\",\"name\":\"Delving Into the Data Privacy Dictionary\",\"isPartOf\":{\"@id\":\"https:\/\/www.interac.ca\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.interac.ca\/en\/content\/life\/the-data-privacy-dictionary\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.interac.ca\/en\/content\/life\/the-data-privacy-dictionary\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.interac.ca\/wp-content\/uploads\/2023\/01\/data-privacy-dictionary-header.png\",\"datePublished\":\"2023-01-24T11:59:00+00:00\",\"dateModified\":\"2025-05-30T23:03:45+00:00\",\"description\":\"Learn what\u2019s what in the wide world of digital security with our Data Privacy Dictionary so you can help protect yourself and your information online.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.interac.ca\/en\/content\/life\/the-data-privacy-dictionary\/#breadcrumb\"},\"inLanguage\":\"en-CA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.interac.ca\/en\/content\/life\/the-data-privacy-dictionary\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-CA\",\"@id\":\"https:\/\/www.interac.ca\/en\/content\/life\/the-data-privacy-dictionary\/#primaryimage\",\"url\":\"https:\/\/www.interac.ca\/wp-content\/uploads\/2023\/01\/data-privacy-dictionary-header.png\",\"contentUrl\":\"https:\/\/www.interac.ca\/wp-content\/uploads\/2023\/01\/data-privacy-dictionary-header.png\",\"width\":2400,\"height\":1326,\"caption\":\"Man beside his car looking at his phone\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.interac.ca\/en\/content\/life\/the-data-privacy-dictionary\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.interac.ca\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Data Privacy Dictionary\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.interac.ca\/en\/#website\",\"url\":\"https:\/\/www.interac.ca\/en\/\",\"name\":\"Interac\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.interac.ca\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.interac.ca\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-CA\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.interac.ca\/en\/#organization\",\"name\":\"Interac Corp.\",\"url\":\"https:\/\/www.interac.ca\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-CA\",\"@id\":\"https:\/\/www.interac.ca\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.interac.ca\/wp-content\/uploads\/2022\/03\/Interac_Two-Colour_RGB.png\",\"contentUrl\":\"https:\/\/www.interac.ca\/wp-content\/uploads\/2022\/03\/Interac_Two-Colour_RGB.png\",\"width\":2210,\"height\":2210,\"caption\":\"Interac Corp.\"},\"image\":{\"@id\":\"https:\/\/www.interac.ca\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/interac\",\"https:\/\/x.com\/interac\",\"https:\/\/www.instagram.com\/interac\/\",\"https:\/\/www.linkedin.com\/company\/interac-corp\/\",\"https:\/\/www.youtube.com\/user\/InteracBrand\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Delving Into the Data Privacy Dictionary","description":"Learn what\u2019s what in the wide world of digital security with our Data Privacy Dictionary so you can help protect yourself and your information online.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.interac.ca\/en\/content\/life\/the-data-privacy-dictionary\/","og_locale":"en_US","og_type":"article","og_title":"The Data Privacy Dictionary","og_description":"Everyone wants to keep their personal data safe, but the world of online privacy is complex and can be confusing.&nbsp;&nbsp; The Data Privacy Dictionary","og_url":"https:\/\/www.interac.ca\/en\/content\/life\/the-data-privacy-dictionary\/","og_site_name":"Interac","article_publisher":"https:\/\/www.facebook.com\/interac","article_modified_time":"2025-05-30T23:03:45+00:00","og_image":[{"width":1024,"height":566,"url":"https:\/\/www.interac.ca\/wp-content\/uploads\/2023\/01\/data-privacy-dictionary-header-1024x566.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@interac","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.interac.ca\/en\/content\/life\/the-data-privacy-dictionary\/","url":"https:\/\/www.interac.ca\/en\/content\/life\/the-data-privacy-dictionary\/","name":"Delving Into the Data Privacy Dictionary","isPartOf":{"@id":"https:\/\/www.interac.ca\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.interac.ca\/en\/content\/life\/the-data-privacy-dictionary\/#primaryimage"},"image":{"@id":"https:\/\/www.interac.ca\/en\/content\/life\/the-data-privacy-dictionary\/#primaryimage"},"thumbnailUrl":"https:\/\/www.interac.ca\/wp-content\/uploads\/2023\/01\/data-privacy-dictionary-header.png","datePublished":"2023-01-24T11:59:00+00:00","dateModified":"2025-05-30T23:03:45+00:00","description":"Learn what\u2019s what in the wide world of digital security with our Data Privacy Dictionary so you can help protect yourself and your information online.","breadcrumb":{"@id":"https:\/\/www.interac.ca\/en\/content\/life\/the-data-privacy-dictionary\/#breadcrumb"},"inLanguage":"en-CA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.interac.ca\/en\/content\/life\/the-data-privacy-dictionary\/"]}]},{"@type":"ImageObject","inLanguage":"en-CA","@id":"https:\/\/www.interac.ca\/en\/content\/life\/the-data-privacy-dictionary\/#primaryimage","url":"https:\/\/www.interac.ca\/wp-content\/uploads\/2023\/01\/data-privacy-dictionary-header.png","contentUrl":"https:\/\/www.interac.ca\/wp-content\/uploads\/2023\/01\/data-privacy-dictionary-header.png","width":2400,"height":1326,"caption":"Man beside his car looking at his phone"},{"@type":"BreadcrumbList","@id":"https:\/\/www.interac.ca\/en\/content\/life\/the-data-privacy-dictionary\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.interac.ca\/en\/"},{"@type":"ListItem","position":2,"name":"The Data Privacy Dictionary"}]},{"@type":"WebSite","@id":"https:\/\/www.interac.ca\/en\/#website","url":"https:\/\/www.interac.ca\/en\/","name":"Interac","description":"","publisher":{"@id":"https:\/\/www.interac.ca\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.interac.ca\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-CA"},{"@type":"Organization","@id":"https:\/\/www.interac.ca\/en\/#organization","name":"Interac Corp.","url":"https:\/\/www.interac.ca\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-CA","@id":"https:\/\/www.interac.ca\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.interac.ca\/wp-content\/uploads\/2022\/03\/Interac_Two-Colour_RGB.png","contentUrl":"https:\/\/www.interac.ca\/wp-content\/uploads\/2022\/03\/Interac_Two-Colour_RGB.png","width":2210,"height":2210,"caption":"Interac Corp."},"image":{"@id":"https:\/\/www.interac.ca\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/interac","https:\/\/x.com\/interac","https:\/\/www.instagram.com\/interac\/","https:\/\/www.linkedin.com\/company\/interac-corp\/","https:\/\/www.youtube.com\/user\/InteracBrand"]}]}},"_links":{"self":[{"href":"https:\/\/www.interac.ca\/en\/wp-json\/wp\/v2\/content\/107476","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.interac.ca\/en\/wp-json\/wp\/v2\/content"}],"about":[{"href":"https:\/\/www.interac.ca\/en\/wp-json\/wp\/v2\/types\/content"}],"author":[{"embeddable":true,"href":"https:\/\/www.interac.ca\/en\/wp-json\/wp\/v2\/users\/28"}],"version-history":[{"count":0,"href":"https:\/\/www.interac.ca\/en\/wp-json\/wp\/v2\/content\/107476\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.interac.ca\/en\/wp-json\/wp\/v2\/media\/107492"}],"wp:attachment":[{"href":"https:\/\/www.interac.ca\/en\/wp-json\/wp\/v2\/media?parent=107476"}],"wp:term":[{"taxonomy":"content-tags","embeddable":true,"href":"https:\/\/www.interac.ca\/en\/wp-json\/wp\/v2\/content-tags?post=107476"},{"taxonomy":"content-category","embeddable":true,"href":"https:\/\/www.interac.ca\/en\/wp-json\/wp\/v2\/content-category?post=107476"},{"taxonomy":"spokespeople","embeddable":true,"href":"https:\/\/www.interac.ca\/en\/wp-json\/wp\/v2\/spokespeople?post=107476"},{"taxonomy":"in_the_know_post_format","embeddable":true,"href":"https:\/\/www.interac.ca\/en\/wp-json\/wp\/v2\/in_the_know_post_format?post=107476"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}