Jump to Navigation


Glossary beginning with P

Click one of the letters above to go to the page of all terms beginning with that letter.

A prescription that a particular behavior is allowed to occur.

Person Pseudonym

A substitute or alias for a data subject's civil identity (name) which may be used in many different contexts.

Personal Data

Personal data shall mean any information relating to an identified or identifiable natural person ('data subject'); an identifiable person is one who can be identified, directly or indirectly, in particular by reference to an identification number or to one or more factors specific to his physical, physiological, mental, economic, cultural or social identity.

Personally Identifiable Information (PII)

Information which can be used to distinguish or trace an individual's identity, such as their name, social security number, biometric records, etc. alone, or when combined with other personal or identifying information which is linked or linkable to a specific individual, such as date and place of birth, mother's maiden name, etc.

Platform as a Service (PaaS)

The capability provided to the consumer is to deploy onto the cloud infrastructure consumer-created or acquired applications created using programming languages, libraries, services, and tools supported by the provider.


A set of rules related to a particular purpose. A rule can be expressed as an obligation, an authorization, a permission, or a prohibition. Not every policy is a constraint. Some policies represent an empowerment.

Policy Enforcement

The execution of a policy decision.

Policy Violation

see Violation

Primary Service Provider (PSP)

see Cloud Provider


The claim of individuals, groups, or institutions to determine for themselves when, how, and to what extent information about them is communicated to others. The ability to control the collection and sharing of information about oneself.

Privacy by Design

Privacy by Design (PbD) is an approach to protecting privacy by embedding it into the design specifications of information technologies, accountable business practices, and networked infrastructures, right from the outset.

Privacy Enhancing Tool (PET)

It refers to a coherent system of information and communication technology (ICT) measures that protect privacy by eliminating or reducing personal data or by preventing unnecessary and/or undesired processing of personal data, all without losing the functionality of the information system.

Privacy Impact Assessment (PIA)

An analysis of how information is handled 1) to ensure handling conforms to applicable legal, regulatory, and policy requirements regarding privacy; 2) to determine the risks and effects of collecting, maintaining, and disseminating information in identifiable form in an electronic information system; and 3) to examine and evaluate protections and alternative processes for handling information to mitigate potential risks.

Privacy Impact Audit

Systematic evaluation of a cloud system by measuring how well it conforms to a set of established privacy-impact criteria.

Privacy Policy Language (PPL)
Privacy Preferences
Private Cloud

The cloud infrastructure is provisioned for exclusive use by a single organization comprising multiple consumers (e.g., business units).

Processing of Personal Data

Any operation or set of operations which is performed upon personal data, whether or not by automatic means, such as collection, recording, organization, storage, adaptation or alteration, retrieval, consultation, use, disclosure by transmission, dissemination or otherwise making available, alignment or combination, blocking, erasure or destruction.

Processor Agreement

Transfers of personal data from a data controller to a data processor must be secured by a contractual agreement. The contract must stipulate that the data processor shall act only on instructions from the data controller. The data processor must provide sufficient guarantees in respect of the technical security measures and organizational measure governing the processing to be carried out, and must ensure compliance with such measures.


A prescription that a particular behavior must not occur.

Proof of Retrievability (POR)

Protocol that allows a client that has stored data at an untrusted store to verify in an efficient way that has means to retrieve the original data without actually retrieving it.


A pseudonym is an identifier of a subject other than the subject?s civil identity.

Public Cloud

The cloud infrastructure is provisioned for open use by the general public.