It's Reglitory!
Plug that Leak
What are your DLP Terms!
I'm in control!
Let's do the ByteDance
100

Protects EU residents' personal data, requiring data breach detection and notification.

GDPR (General Data Protection Regulation)

100

This term describes the unauthorized transfer of data from within an organization to an external destination.

Data Exfiltration

100

This acronym refers to information that can be used to uniquely identify an individual, such as a Social Security number.

PII (Personally Identifiable Information)

100

This mode allows a user to send sensitive data but requires them to provide a business justification first.

User Override

100

This app that specializes in short-form videos gets its name from the sound of a clock.

TikTok

200

Protects sensitive patient health information from being disclosed without consent, and establishing standards for electronic health records and facilitating insurance portability.

HIPPA (Health Insurance Portability and Accountability Act)

200

This is the practice of tricking people into giving up sensitive information through emails or phone calls

Social Engineering

200

This type of DLP monitors data being moved from a computer to a USB drive or printed.

Endpoint DLP

200

This method involves replacing sensitive data with a non-sensitive "placeholder" that has no exploitable value.

Tokenization

200

ByteDance was founded in 2012 by this Chinese entrepreneur.

Zhang Yiming

300

Ensures the secure handling of credit card data, often requiring encryption of sensitive data in transit or at rest.

PCI DSS (Payment Card Industry Data Security Standard)

300

Where attackers impersonate reputable individuals or organizations to trick victims into revealing sensitive information

Phishing

300

In DLP, this is the process of scrambling data so it is unreadable without a specific key.

Encryption

300

DLP systems use this technique to identify sensitive files by comparing them to a "fingerprint" of the original.

Exact Data Matching

300

In 2017, ByteDance acquired this lip-syncing app, which was later merged into TikTok.

400

Grants California residents increased control over their data, including the rights to correct information, limit the use of "sensitive personal information," and opt-out of sharing data for targeted advertising.

(CCPA) California Consumer Privacy Act

400

Information technology systems, software, hardware, or services used within an organization without explicit approval, oversight, or knowledge of the central IT department

Shadow IT

400

This proactive strategy involves monitoring user behavior to flag "unusual" activities before a breach occurs.

User and Entity Behavior Analytics (UEBA)

400

This type of DLP monitors and protects data as it moves through corporate email and web gateways.

Network

400

In 2024, US federal law necessitated a, requiring ByteDance to reduce its ownership stake in the US entity to this percentage.

19.9%

500

Restricts data collection from children under 13.

COPPA (Children’s Online Privacy Protection Act)

500

Refers to a security risk that originates from a person within the organization, like an employee.

Insider Threat

500

This common DLP technique uses specific patterns (like a 16-digit credit card number) to identify sensitive data.

Pattern Matching

500

This is the term for scanning data that is stored in "the cloud," such as in OneDrive, SharePoint, or AWS.

Data-at-Rest

500

Pioneered by TikTok, these quick, vertical, engaging clips typically ranging from 15 to 60 seconds,

Short Videos