Cookie: A cookie is a small piece of data (text file) that a website – when visited by you, (a user) asks your browser to store on your device in order to remember website configuration (e.g. language preferences), login details, and products added to the shopping cart, even after you leave the website, but because cookie files are widely used to collect certain pieces of information, they can also be used to carry out advertising processes like behavioral profiling and retargeting.
Data controller: is the natural or legal person who determines the purpose and the means of the processing of personal data.
De-identify: Anonymize or remove information or data elements that could be used to connect sensitive information to a specific individual.
Encryption: The process of converting data into a cipher or code to prevent unauthorized access. The technique obfuscates data in such a manner that a specific algorithm and key are required to interpret the cipher.
File recovery: Restoring individual files or records from original, archive or backup media.
First-party cookies are stored by the domain (website) you are visiting directly. They allow website owners to collect analytics data, remember language settings, and perform other useful functions that help provide a good user experience.
FTP: “File Transfer Protocol.” A non-secure method of transferring files between computers on a network. The currently preferred alternative is SFTP.
HTTP: “Hypertext Transfer Protocol.” The communication protocol (language) that enables web browsing.
HTTPS: “Secure Hypertext Transfer Protocol.” Acronym used to indicate a secure, encrypted HTTP connection.
Integrity: The consistency, accuracy, and trustworthiness of data over its entire lifecycle. Integrity is one of the 3 elements of the "CIA Triad" security model (Confidentiality, Integrity, and Availability).
Malicious Software, or "malware": A generic term for software that performs unauthorized activities on a computer, causes damage or allows unauthorized access to be gained. Examples of malicious software include viruses, spyware, and email spam robots.
Passphrase: A sequence of words or other text used as part of the authentication process. A passphrase is similar to a password in usage but is generally longer for added security.
Personal Information: means data which relate to a living individual (whether in personal or family life, business or profession) who can be identified (a) from those data, or (b) from those data and other information which is in the possession of, or is likely to come into the possession of the data controller.
Redact: To obscure or remove the sensitive portions of a data set or document, typically prior to publication or release.
SDKs: means third-party computer code that we may incorporate into our mobile applications that may be used for a variety of purposes, including to provide us with analytics regarding the use of our mobile applications, to integrate with social media, add features or functionality to our app, or to facilitate online advertising.
ST corporate group: share the same definition as STMicroelectronics International N.V. and its group.
STMicroelectronics International N.V. and its group companies: means STMicroelectronics International N.V. a company incorporated under the laws of Netherlands, having its registered office at WTC Schiphol Airport, Schiphol Boulevard 265, 1118 BH Luchthaven Schiphol, Amsterdam, The Netherlands, and any other legal entity, now and thereafter directly or indirectly controlled by or under common control with STMicroelectronics N.V. having its registered office at WTC Schiphol Airport, Schiphol Boulevard 265, 1118 BH Luchthaven Schiphol, Amsterdam, The Netherlands.
Transactional Information: Information, including electronically gathered information, needed either to complete or to identify an electronic communication. Examples include but are not limited to electronic mail headers, summaries, addresses and addressees; records of telephone calls; and IP address logs. Transactional information does not include the actual contents of people's computers, files, emails, telephone conversations, etc.
Third-party cookies are created by domains other than the one you are visiting directly, hence the name third-party. They are used for cross-site tracking, retargeting, and ad-serving.
Web Beacons: Web beacons (also called “web tags” or “pixels”) are tiny graphics or scripts that communicate information from your device to a server. Beacons can be embedded in online or mobile content, videos, advertisements, or emails. They allow a server to read certain types of information from your device, such as when you viewed the beacon (and thus the content in which it is embedded) and the IP address of the device on which you viewed the beacon. We and third parties use beacons for a variety of purposes, including to analyze the use of our Services and (in conjunction with cookies) to provide content and ads that are more relevant to you.