Glossary
- Accountability
- Accuracy
- Active Data Collection
- Actively Exploited Vulnerability
- Adequate Level of Protection
- AI Literacy
- AI Office
- AI Regulatory Sandbox
- AI System
- Anonymization
- Appropriate Safeguards
- Authorised Representative
- Availability
- BCR
- Binding Corporate Rules
- Biometric Categorisation System
- Biometric Data
- Biometric Data
- Biometric Identification
- Biometric Verification
- CE Marking
- Cloud Computing Service
- Codes of Conduct
- Common Specification
- Common Specifications
- Component
- Conformity Assessment
- Conformity Assessment
- Conformity Assessment Body
- Conformity Assessment Body
- Connected Product
- Consent
- Consumer
- Content Delivery Network
- Controller
- Cookies
- Core Platform Service
- Critical Infrastructure
- Critical Product with Digital Elements
- Cross-Border Processing
- Customer
- Cybersecurity
- Cybersecurity Act
- Cyber Threat
- Data
- Data Concerning Health
- Data Egress Charges
- Data Holder
- Data Intermediation Service
- Data Processing Service
- Data Protection Impact Assessment
- Data Recipient
- Data Subject
- Deep Fake
- Deployer
- Digital Assets
- Digital Markets Act
- Digital Sector
- Digital Service
- Distributor
- Distributor
- DMA
- DNS
- DNS Service Provider
- Domain Name System
- Downstream Provider
- DPIA
- Economic Operator
- eIDAS
- Electronic Communications Service
- Electronic Information System
- Elevated Privilege
- Emotion Recognition System
- Endpoint
- End Users
- Enterprise
- Entity (NIS2)
- Entity Providing Domain Name Registration Services
- Exportable Data
- Floating-Point Operation
- Functional Equivalence
- Gatekeeper
- GDPR
- General Data Protection Regulation
- General-Purpose AI Model
- General-Purpose AI System
- Genetic Data
- Hardware
- Harmonised Standard
- Harmonised Standard
- Harmonised Standard
- health data
- High-Impact Capabilities
- Highly Critical Product with Digital Elements
- ICT Process
- ICT Product
- ICT service
- Identification Service
- Importer
- Importer
- Incident
- Incident Handling
- Indirect Connection
- Informed Consent
- Input Data
- Instructions for Use
- Intended Purpose
- Intended Purpose
- Intended Purpose
- Internet Exchange Point
- Interoperability
- Interoperability
- Large-Scale Cybersecurity Incident
- Law Enforcement
- Law Enforcement Authority
- Lawfulness, Fairness and Transparency
- Logical Connection
- Making Available on the Market
- Managed Security Service Provider
- Managed Service Provider
- Manufacturer
- Market Surveillance Authority
- Metadata
- National Cybersecurity Strategy
- Near Miss
- Network and Information System
- Networking or Computing Resources
- NIS2
- Non-Personal Data
- Notified Body
- Notified Body
- Notifying Authority
- Notifying Authority
- Online Marketplace
- Online Search Engine
- Online Social Networking Service
- On-Premises ICT Infrastructure
- Open Interoperability Specification
- Operating System
- Operational Technology
- Operator
- Operator
- Payment Systems for In-App Purchases
- Performance of an AI System
- Personal Data
- Personal Data Breach
- Physical Connection
- Placing on the Market
- Post-Market Monitoring System
- Post-Remote Biometric Identification System
- Privilege
- Processing
- Processor
- Product Data
- Product with Digital Elements
- Profiling
- Provider
- Pseudonymisation
- Public Administration Entity
- Public Electronic Communications Network
- Public Emergency
- Publicly Accessible Space
- Putting into Service
- Qualified Trust Service
- Qualified Trust Service Provider
- Ranking
- Readily Available Data
- Real-Time Remote Biometric Identification System
- Real-World Testing Plan
- Reasonably Foreseeable Misuse
- Reasonably Foreseeable Use
- Recall of an AI System
- Recipient
- Related Service
- Related Service Data
- Remote Biometric Identification System
- Remote Data Processing
- Representative (GDPR)
- Representative (NIS2)
- Research Organisation
- Risk
- Safety Component of a Product or System
- Same Service Type
- Sandbox Plan
- Search Results
- Sensitive Data
- Sensitive Operational Data
- Serious Incident
- Significant Cybersecurity Risk
- Significant Cyber Threat
- Smart Contract
- Social Networking Services Platform
- Software
- Software Application
- Software Application Stores
- Software Bill of Materials
- Special Categories of Personal Data
- Special Categories of Personal Data
- Standard
- Subject
- Substantial Modification
- Substantial Modification
- Supervisory Authority
- Supervisory Authority Concerned
- Switching
- Switching Charges
- Systemic Risk
- Technical and Organisational Measures
- Technical and Organizational Measures
- Technical Specification
- Testing Data
- Testing in Real-World Conditions
- Third Party
- TLD name registry
- TOMs
- TOMs
- Top-Level Domain Name Registry
- Trade Secret
- Trade Secret Holder
- Training Data
- Trust Service
- Trust Service Provider
- Undertaking
- User
- Validation Data
- Virtual Assistant
- Vulnerability
- Web Browser
- Widespread Infringement
- Withdrawal of an AI System