Acronym | Full Form |
AI | Artificial Intelligence |
AIM | Academic Information Management |
BCRs | Binding Corporate Rules |
BIPA | Biometric Information Privacy Act (Illinois, United States) |
BPA | Basic Privacy Assessment |
BYOD | Bring Your Own Device |
C2C | Controller to Controller |
C2P | Controller to Processor |
CAD | Campus Active Directory |
CAPS | Counseling and Psychological Services |
CAS | Central Authentication Service |
CCPA | California Consumer Privacy Act 2018 (California, United States) |
CDPA | Consumer Data Protection Act (Virginia, United States) |
CES | Church Educational System |
CISA | Cybersecurity Information Sharing Act |
CNIL | National Commission on Informatics and Liberty (France) |
COPPA | Children's Online Privacy Protection Act (United States) |
CPO | Chief Privacy Officer |
CPRA | California Privacy Rights Act (California, United States) |
DBQ | Department Baseline Questionnaire |
DCE | Division of Continuing Education |
DP | Data Protection |
DPA | Data Protections Act 1998 and 2018 (United Kingdom) |
DPA | Data Protection Authority |
DPA | Data Processing Agreement |
DPC | Data Protection Commission |
DPIA | Data Protection Impact Assessment |
DPM | Data Protection Manager |
DPO | Data Protection Officer |
DSA | Data Sharing Agreement |
DSAR | Data Subject Access Request |
DSR | Data Subject Request |
EDPB | European Data Protection Board |
FERPA | Family Educational Rights and Privacy Act |
FIPPs | Fair Information Practices/Principles |
FOIA | Freedom of Information Act 2000 |
GDPR | General Data Protection Regulation (European Union) |
IaaS | Infrastructure as a Service |
IAPP | International Association of Privacy Professionals |
ICO | Information Commissioner's Office |
IDTA | International Data Transfer Agreement |
IG | Information Governance |
LDU | Limited Data Use |
LGPD | General Personal Data Protection Law (Brazil) |
MNPI | Material Nonpublic Information |
NaaS | Network as a Service |
NPI | Nonpublic Personal Information |
OECD | Organization for Economic Co-operation and Development |
P2C | Processor to Controller |
P2P | Processor to Processor |
PaaS | Platform as a Service |
PbD | Privacy by Design |
PD | Personal Data |
PECR | Privacy and Electronic Communications Regulations 2003 |
PET | Privacy Enhancing Technologies |
PI | Personal Information |
PIA | Privacy Impact Assessment |
PII | Personal Identifiable Information |
PIPA | Personal Information Protection Act (Japan) |
PIPEDA | Personal Information Protection and Electronic Documents Act (Canada) |
PIPL | Personal Information Protection Law (China) |
POPIA | Protection of Personal Information Act (South Africa) |
ROPA | Record of Processing Activities |
RTBF | Right to Be Forgotten |
SaaS | Software as a Service |
SAR | Subject Access Request |
SARs | Suspicious Activity Reports |
SCCs | Standard Contractual Clauses |
SIS | Student Information System |
SOC | Security Operations Center |
SOP | Standard Operating Procedure |
SPI | Sensitive Personal Information |
TIA | Transfer Impact Assessment |
TOMs | Technical and Organizational Measures |
TRA | Transfer Risk Assessment |
UX | User Experience |
UI | User Interface |
VPN | Virtual Private Network |