Data Privacy
Glossary

Plain-language definitions of key data privacy terms — from the SECURE Data Act and GDPR to data minimization, consent, and consumer rights. Use this glossary to understand the terminology behind federal and state privacy compliance.

25+

Terms Defined

21+

State Laws Covered

3

Major Frameworks

2025

Last Updated

Biometric Data

Sensitive Data
B

Unique physical or behavioral characteristics that can be used to identify an individual, including fingerprints, facial recognition data, voiceprints, iris scans, and gait analysis. Under the SECURE Data Act and most state privacy laws, biometric data is classified as sensitive data requiring opt-in consent before collection or processing.

Example

A company using facial recognition for employee time-tracking must obtain opt-in consent under the SECURE Data Act.

Related:Sensitive DataOpt-In ConsentGenetic Data
Read More →

CCPA (California Consumer Privacy Act)

Privacy Law
C

A California state privacy law enacted in 2018 (and significantly amended by the CPRA in 2020) that grants California residents rights to know what personal data is collected about them, to delete that data, to opt out of the sale of their data, and to non-discrimination for exercising these rights. The CCPA applies to for-profit businesses that meet certain revenue or data processing thresholds. If the SECURE Data Act is enacted, it would preempt the CCPA.

Example

A business with $25M+ in annual revenue that collects data from California residents must comply with CCPA.

Related:CPRASECURE Data ActFederal PreemptionConsumer Rights
Read More →

Controller

Roles & Responsibilities
C

An entity that determines the purposes and means of processing personal data. Under the SECURE Data Act, controllers bear the primary compliance burden — including maintaining a written privacy program, conducting data protection assessments, fulfilling consumer rights requests, and ensuring processors operate under written contracts. The term is equivalent to "data controller" under GDPR.

Example

A SaaS company that collects user data to provide its service is a controller; the cloud provider storing that data is a processor.

Related:ProcessorData Protection AssessmentPrivacy Program
Read More →

CPRA (California Privacy Rights Act)

Privacy Law
C

A 2020 California ballot initiative that significantly amended and expanded the CCPA. The CPRA created the California Privacy Protection Agency (CPPA), established new rights (right to correct, right to limit use of sensitive personal information), and introduced a limited private right of action for data breaches. The CPRA would be preempted by the SECURE Data Act if enacted.

Example

Under CPRA, consumers can limit how businesses use their sensitive personal information, such as precise geolocation.

Related:CCPASECURE Data ActFederal PreemptionSensitive Data
Read More →

Data Breach

Security
D

An unauthorized acquisition, access, use, or disclosure of personal data that compromises the security, confidentiality, or integrity of that data. Under the SECURE Data Act, covered businesses must notify the FTC within 72 hours of discovering a breach affecting 500 or more consumers, and must notify affected consumers without unreasonable delay. The Act would preempt all 50 state breach notification laws.

Example

A ransomware attack that exposes customer records triggers breach notification obligations under the SECURE Data Act.

Related:Breach NotificationFTCPersonal Data
Read More →

Data Mapping

Compliance Practice
D

The process of identifying and documenting all personal data an organization collects, processes, stores, and shares — including the source of the data, its purpose, where it flows, and who has access to it. Data mapping is a foundational compliance activity required before conducting a gap analysis or data protection assessment. It is also essential for fulfilling consumer rights requests under the SECURE Data Act.

Example

A company creates a data map showing that its CRM collects names and emails, its analytics tool collects IP addresses, and its payment processor handles financial data.

Related:Data MinimizationData Protection AssessmentController
Read More →

Data Minimization

Compliance Principle
D

The principle that organizations should collect, process, and retain only the personal data that is reasonably necessary, proportionate, and limited to what is required to fulfill a specific, disclosed purpose. The SECURE Data Act codifies data minimization as a mandatory requirement — businesses cannot collect data speculatively for undefined future uses. Each data element collected must be tied to a clear, documented purpose.

Example

A newsletter signup form that collects only name and email address — not phone number, address, or date of birth — demonstrates data minimization.

Related:Purpose LimitationPrivacy by DesignController
Read More →

Data Protection Assessment (DPA)

Compliance Practice
D

A documented analysis that weighs the benefits of a processing activity against the risks it poses to consumers. Under the SECURE Data Act, data protection assessments are mandatory before engaging in high-risk processing activities including: processing sensitive data, targeted advertising, selling personal data, profiling with significant effects, and any processing presenting foreseeable risk of harm. The FTC may request DPAs during investigations.

Example

Before launching a behavioral advertising program, a company must complete a DPA documenting the risks and safeguards.

Related:ControllerSensitive DataTargeted AdvertisingFTC
Read More →

De-identification

Technical Measure
D

The process of removing or altering information that identifies or could identify an individual, such that the data can no longer be reasonably linked to a specific person. Properly de-identified data is generally not subject to privacy law obligations. However, the standard for de-identification varies by law — the SECURE Data Act requires that re-identification be technically infeasible, not merely unlikely.

Example

A hospital removes patient names and replaces them with random IDs before sharing data with researchers.

Related:Personal DataAnonymizationData Minimization

Federal Preemption

Legal Concept
F

The legal doctrine by which federal law supersedes conflicting state laws under the Supremacy Clause of the U.S. Constitution. The SECURE Data Act contains a broad preemption clause that would nullify any state law "relating to" its provisions — replacing the current patchwork of 21+ state privacy laws (including CCPA, CPRA, VCDPA, CPA, and others) with a single federal standard. Some sector-specific state laws may partially survive depending on final legislative language.

Example

If the SECURE Data Act passes, a business currently complying with CCPA, VCDPA, and CPA would only need to comply with the single federal standard.

Related:SECURE Data ActCCPAGDPRState Privacy Laws
Read More →

FTC (Federal Trade Commission)

Regulatory Body
F

The primary U.S. federal agency responsible for consumer protection and competition enforcement. Under the SECURE Data Act, the FTC serves as the primary enforcement authority — authorized to pursue civil penalties of up to $10,000 per violation per day for knowing or willful violations. The FTC is also authorized to issue implementing regulations post-enactment. The FTC currently enforces data privacy obligations under Section 5 of the FTC Act.

Example

The FTC can investigate a company's data practices and impose civil penalties for SECURE Data Act violations.

Related:EnforcementCivil PenaltiesState Attorney General
Read More →

GDPR (General Data Protection Regulation)

Privacy Law
G

The European Union's comprehensive data protection regulation, effective since May 2018. GDPR applies to any organization processing the personal data of EU residents, regardless of where the organization is located. It requires a lawful basis for all processing, grants individuals extensive rights, mandates data protection by design, and imposes fines of up to 4% of global annual revenue for violations. The SECURE Data Act draws inspiration from GDPR but differs in enforcement, consent standards, and scope.

Example

A U.S. company with European customers must comply with GDPR regardless of where the company is based.

Related:CCPASECURE Data ActData ControllerData Processor
Read More →

Geolocation Data

Sensitive Data
G

Data that identifies or can be used to identify the precise physical location of an individual. Under the SECURE Data Act, precise geolocation data — defined as location within a radius of 1,750 feet — is classified as sensitive data requiring opt-in consent. This includes GPS coordinates, cell tower triangulation data, and Wi-Fi positioning data that can pinpoint a person's location.

Example

A fitness app that tracks a user's running routes collects precise geolocation data and must obtain opt-in consent.

Related:Sensitive DataOpt-In ConsentPersonal Data
Read More →

Opt-Out

Legal Basis
O

A mechanism that allows individuals to withdraw from or prevent certain data processing activities. Under the SECURE Data Act, consumers have the right to opt out of the sale of their personal data and targeted advertising. Unlike opt-in consent, opt-out mechanisms allow processing to proceed by default unless the individual takes action to stop it. Opt-out mechanisms must be clear, accessible, and easy to use.

Example

A website provides a "Do Not Sell My Personal Information" link allowing users to opt out of data sales.

Related:Opt-In ConsentTargeted AdvertisingConsumer Rights
Read More →

Personal Data

Core Concept
P

Any information that identifies or is reasonably linkable to a specific individual. Under the SECURE Data Act, personal data includes names, email addresses, IP addresses, device identifiers, location data, browsing history, purchase history, and any other information that can be used to identify a person. Properly de-identified data and publicly available information are generally excluded from the definition.

Example

A customer's name, email address, and purchase history are all personal data under the SECURE Data Act.

Related:Sensitive DataDe-identificationData Minimization
Read More →

Privacy by Design

Compliance Principle
P

An approach to systems engineering and product development that embeds privacy protections into the design and architecture of products and services from the outset, rather than as an afterthought. Privacy by design requires organizations to consider privacy implications at every stage of product development and to implement technical and organizational measures that minimize data collection and protect personal data by default.

Example

A product team builds a new feature that collects only the minimum data needed and automatically deletes it after 30 days.

Related:Data MinimizationData Protection AssessmentController

Privacy Notice

Compliance Requirement
P

A public-facing document that discloses an organization's data collection and processing practices to consumers. Under the SECURE Data Act, covered businesses must maintain a privacy notice that is reasonably accessible, clear, and written in plain language. The notice must disclose: categories of data collected, processing purposes, data sales and targeted advertising practices, consumer rights, and contact information for privacy inquiries. It must be updated within 30 days of any material change.

Example

A company's website privacy policy that explains what data is collected, why, and how consumers can exercise their rights.

Related:Consumer RightsOpt-OutController
Read More →

Privacy Officer

Roles & Responsibilities
P

A qualified individual responsible for coordinating and overseeing an organization's data protection program. Under the SECURE Data Act, covered businesses must designate a privacy officer. The role can be filled by an employee, consultant, or outside privacy counsel. Responsibilities include maintaining the written privacy program, overseeing consumer rights request fulfillment, managing data protection assessments, and serving as the FTC point of contact during investigations.

Example

A mid-size SaaS company designates its VP of Engineering as privacy officer and retains outside privacy counsel to support the role.

Related:Privacy ProgramData Protection AssessmentFTC
Read More →

Privacy Program

Compliance Requirement
P

A comprehensive, written framework that documents an organization's data privacy policies, procedures, and controls. Under the SECURE Data Act, covered businesses must maintain a written privacy program that includes: data inventory and mapping, privacy notice, consumer rights procedures, data protection assessments, vendor management protocols, breach response plan, and employee training. The program must be reviewed and updated regularly.

Example

A company's privacy program includes its privacy policy, data handling procedures, consumer request process, and incident response plan.

Related:Privacy OfficerData MappingPrivacy Notice
Read More →

Processor

Roles & Responsibilities
P

An entity that processes personal data on behalf of a controller, pursuant to the controller's instructions. Under the SECURE Data Act, processors have secondary compliance obligations — they must operate under written contracts with controllers, process data only as instructed, implement appropriate security measures, and assist controllers in fulfilling consumer rights requests. Processors cannot process data beyond the scope of the controller's instructions.

Example

A cloud storage provider that stores customer data on behalf of a SaaS company is a processor.

Related:ControllerData Processing AgreementThird-Party Data Sharing
Read More →

Profiling

Processing Activity
P

The automated processing of personal data to evaluate, analyze, or predict aspects of an individual's behavior, preferences, interests, performance, or location. Under the SECURE Data Act, profiling that produces legal or similarly significant effects on individuals is a high-risk processing activity requiring a data protection assessment. Examples include credit scoring, insurance risk assessment, and automated hiring decisions.

Example

An insurance company uses an algorithm to assess risk and set premiums based on customer data — this is profiling with significant effects.

Related:Data Protection AssessmentTargeted AdvertisingConsumer Rights
Read More →

SECURE Data Act

Privacy Law
S

The Setting an American Framework to Ensure Data Access, Transparency, and Accountability Act — a proposed federal privacy law that would create a single national standard for how businesses collect, use, and protect consumer data. If enacted, it would preempt all existing state privacy laws. The Act covers businesses processing data of 200,000+ U.S. consumers annually, requires opt-in consent for sensitive data, grants consumers four core rights (access, correction, deletion, portability), and is enforced by the FTC and state attorneys general.

Example

A national e-commerce retailer processing data of 500,000 customers would be covered by the SECURE Data Act.

Related:Federal PreemptionFTCConsumer RightsSensitive Data
Read More →

Sensitive Data

Data Classification
S

Categories of personal data that receive heightened protection under privacy laws due to the particular risks their processing poses to individuals. Under the SECURE Data Act, sensitive data includes: health and medical information, biometric data, genetic data, precise geolocation data (within 1,750 feet), financial account information, government-issued identification numbers, racial or ethnic origin, religious beliefs, sexual orientation or gender identity, immigration status, and data of individuals under 16. Processing sensitive data requires affirmative opt-in consent.

Example

A company collecting employee fingerprints for access control is processing sensitive biometric data requiring opt-in consent.

Related:Opt-In ConsentBiometric DataGeolocation DataData Protection Assessment
Read More →

State Attorney General

Regulatory Body
S

The chief legal officer of a U.S. state, authorized to bring civil enforcement actions on behalf of state residents. Under the SECURE Data Act, state attorneys general may bring civil actions against businesses that violate the Act's provisions. This concurrent enforcement authority — alongside the FTC — means businesses face potential enforcement from both federal and state levels. State AGs currently enforce state privacy laws like CCPA and VCDPA.

Example

The California AG can bring a civil action against a company for violating CCPA; under the SECURE Data Act, state AGs retain concurrent enforcement authority.

Related:FTCEnforcementCivil Penalties
Read More →

Targeted Advertising

Processing Activity
T

The practice of serving advertisements to individuals based on personal data collected across different businesses, websites, or applications — also known as behavioral advertising or interest-based advertising. Under the SECURE Data Act, targeted advertising is a regulated processing activity that must be disclosed in the privacy notice, requires a data protection assessment, and is subject to consumer opt-out rights. Ad networks facilitating targeted advertising are treated as processors.

Example

A retailer uses browsing history from multiple websites to serve personalized ads — this is targeted advertising requiring disclosure and opt-out rights.

Related:Opt-OutData Protection AssessmentPrivacy Notice
Read More →

Third-Party Data Sharing

Processing Activity
T

The transfer of personal data from one organization to another entity outside the original collection relationship. Under the SECURE Data Act, data sharing with processors requires written contracts specifying the nature, purpose, and duration of processing. Data sales — transfers for monetary or other valuable consideration — require consumer opt-out rights and privacy notice disclosure. Controllers remain liable for processor violations if they fail to conduct reasonable due diligence.

Example

A company sharing customer data with a marketing analytics vendor must have a written data processing agreement in place.

Related:ProcessorControllerPrivacy NoticeOpt-Out
Read More →

GDPR vs. CCPA vs. SECURE Data Act

A side-by-side comparison of the three most significant data privacy frameworks affecting U.S. businesses.

FeatureGDPR (EU)CCPA/CPRA (CA)SECURE Data Act (US)
JurisdictionEU residents worldwideCalifornia residentsU.S. consumers (federal)
Coverage ThresholdAny processing of EU data$25M revenue or 100K consumers200K consumers or 100K + 25% revenue from data sales
Consent ModelOpt-in for all processing (lawful basis required)Opt-out for data sales; opt-in for minorsOpt-out for general data; opt-in for sensitive data
Consumer RightsAccess, rectification, erasure, portability, objectionKnow, delete, opt-out, non-discriminationAccess, correction, deletion, portability
Private Right of ActionYes — individuals can sueLimited (data breaches under CPRA)No private right of action
Enforcement AuthorityData Protection Authorities (DPAs)California AG + CPPAFTC + State Attorneys General
Maximum Penalties4% of global annual revenue or €20M$7,500 per intentional violation$10,000 per violation per day
Data Protection AssessmentRequired (DPIA) for high-risk processingRequired under CPRA for certain processingRequired for high-risk processing activities
Breach Notification72 hours to supervisory authorityVaries by state law72 hours to FTC for 500+ consumers
Preemption EffectN/A (EU law)State law onlyPreempts all state privacy laws

Sources: GDPR (Regulation (EU) 2016/679); CCPA (Cal. Civ. Code § 1798.100 et seq.); CPRA (Proposition 24, 2020); SECURE Data Act (proposed, H.R. 8413, 118th Congress). Last updated April 2025.

Next Step

Ready to apply these concepts
to your compliance program?