Glossary: the Privacy Policy Generator’s Key Terms

List of words in the glossary:

IP Address

Every computer connected to the Internet has a unique IP address. It is its identifier on the network. And it is these addresses that computers use when they communicate with each other.


A firewall is a computer device that filters the information circulating between two networks. It allows you to manage access to a given network and thus, to reduce the risk of external aggression.

Access Rights

The right of access allows Internet users, on the one hand, to know what personal information an organization or company holds on them and, on the other hand, to update and, if necessary, rectify it.

Right to Object

The right to object allows Internet users to refuse from their personal information being used for certain purposes mentioned at the time of collection.

Right of Withdrawal

The right to opt-out allows Internet users to request that their personal information no longer appears on a given list (e.g., mailing list, commercial prospecting list).

Log Files

Files containing site activity.

Security Measures

An organization or business shall implement security safeguards to protect against, among other things, loss, destruction, and interception of collected personal information.

These measures shall be state-of-the-art and provide a level of security appropriate to the processing and nature of the information collected.

Privacy Policy

A tool that allows an organization or company to inform Internet users of its commitments regarding the treatment of personal or other information collected on its Web site. Example: Google’s privacy policy.

Personal Information

The term “personal data” refers to any information that can be used to identify a natural person.

Examples of such information include surnames, first names, postal and e-mail addresses, telephone numbers, credit card numbers, social security or social insurance numbers, date of birth, origin, political or trade union affiliation, religion, medical data, education, occupation, income, preferences.

Certification Seal

The presence of a seal informs Internet users that the website on which they are browsing adheres to a certification program and, consequently, undertakes to respect certain conditions, for example, the protection of personal information, the security of transactions and the observance of state and non-state standards.

SET (Secure Electronic Transaction)

The SET protocol is used to ensure the security of online financial transactions.

SSL (Secure Sockets Layer)

The SSL protocol allows for the authentication, confidentiality and integrity of data exchanged.