glossary


Find further information about terms from "a" like access control to "z" like zero information policy.

  • a

    • access

      Access in the security context is the privilege and permission to see and/or use data. Therefore an access right or privilege has to be given by the owner of the data. In olmogo this access can be given by just swiping one mogo to another mogo or identity. The withdraw of access is also just one swipe at any point of time.
    • access control

      Access control is a mechanism to limit access only for dedicated users (persons or entities). Access control is usually performed by a unique identification of the user like a password, fingerprint, speech, or others.
    • accountability

      Accountability in terms of GDPR/DSGVO describes the requirement for an entity to demonstrate it complies with GDPR/DSGVO legislation. There have to be appropriate technologies implemented and processes documented to ensure and demonstrate that all personal data activities are GDPR/DSGVO compliant. olmogo ensures by design by fully encrypting each personal data element (mogo) the absolute control and ownership of personal data.
    • agent

      An agent is a technical user which can be defined by the olmogo user to perform tasks on the users behalf. For example you can give certain access privileges to an agent to post on your behalf content in your favorite social media network. Or you define routine operations like statistics, analytics and let an agent do the job for you.
    • algorithm

      As algorithm is defined a step by step process to solve a problem. olmogo is based on a patented algorithm to securely store and encrypt your data. (s.a. patented solution)
    • app

      An app is - usually a small - computer program for mobile devices. olmogo also comes as an app for the end user as well as a desktop app(lication) called olmogo explorer for managing your data.
    • attack

      An attack is an attempt to alter an information system without authorized access privileges. In an attack information can be just viewed and disclosed to unauthorized third parties, can be modified or deleted. In olmogo attacks to stored information itself with disclosure to third parties is nearly impossible since all information is stored with zero information (s.a. zero information). Attacks to single severs of olmogo would not result in a breach. However your device PLUS your password in the hand of a third party would that enable to access your information.
    • authentication

      Authentication is the process to ensure and confirm your identity. Authentication is usually performed with a user name and a password, but also with finger print, voice, etc..
  • b

    • big data

      Today nearly all processes are digitized. All that produces data which is stored. In the case of personal data it is stored on the user behalf. These tremendous amounts of data are referred to as big data. To analyze and profile this data are huge business cases and a lot of effort is put into big data analytics and profiling.
    • biometrics

      Biometrics in terms of data access is an authentication based on biometrical criteria like a fingerprint.
    • breach

      A breach is referred to a security relevant incident leading to accidental or unlawful access to data. Data may due to a breach be disclosed to (unwanted) third parties, modified or deleted.
  • c

    • cloud

      Cloud commonly used means IT services like storing or processing data via the internet. The problem of cloud services is in general that the provider of the service has access to all information stored in the cloud. Even if the data is encrypted by the provider they are holding the „master-key“ to unlock your data. olmogo is based on a patented key sharing algorithm which ensures without your part of the key no third party and not even olmogo has access to your data. Therefore olmogo can manage and administer all your keys for your convenience still having no access to any of your data.
    • connected devices

      Devices tracking your actions in daily life (a wearable, a connected car) and sending this data via the internet to a service provider. According to Gartner there will be 20.2 billion connected devices around us by 2020. All this tracked data is your data according to actual law and has to be under your governance. olmogo empowers you to control and manage this data. (s.a. IoT)
    • consent (management)

      Consent by a data subject is a freely, informed and explicit given statement or action signifying agreement to the processing of your personal data. Consent in our opinion and also according to the newly introduced Data Protection Regulation (GDPR/DSGVO) should not only be given or ask in form of a pop up window. Consent is a differentiated action of the owner, which should be granted within free motivation of the owner. Free in this respect means: the time of the consent is in the users hands the data amount can be freely decided the purpose of the consent can be defined consent can be withdrawn with the same action (convenience) with which it was given olmogo provides an absolute owner centered governance approach and enables therefore the best solution to GDPR/DSGVO legislation and privacy concerns of users.
    • consumer trust

      95% of consumers are concerned about personal data protection. The ability to gain and maintain consumer trust will be one of the key differentiators for companies in the future. olmogo is the platform enabling companies to store data on the users behalf plus to give the user (and customer of the company) full access and control to this data. This is the basic principle to create transparency and trust and therefore defining competitiveness for the future of the enterprise.
    • cryptographic key

      This key is a string of bits used to transform readable information into encrypted information and the other way round. In olmogo these encryption keys are again encrypted and split between olmogo and the user to make sure that a loss of the key would not result in a loss of information. This guarantees also that olmogo (or any other service provider) has no access at all to any stored data.
    • cyberattrack

      s.a. attack however a cyberattack refers more to an IT system or enterprise network.
    • cybersecurity

      Cybersecurity refers to methods used to prevent cyberattacks.
  • d

    • data governance

      In the context of olmogo data governance is used to describe the concept of user centered ownership and control of data. This concept is based on the fact that all data produced by an user is her/his data and that this user should have knowledge and control about this data. This resembles the basic idea of the GDPR/DSGVO legislation. In olmogo data can be stored on the user behalf but the user stays in full control of all stored data. On the other hand this does not mean for the company or service provider loosing control. On the contrary the enterprise can be sure to have legally compliant consent to use this data with the customers trust in fair data processing.
    • data marketplace

      A data marketplace is designed to buy and sell data - the idea is that most data are user data created by users and belonging to them. To fairly let users participate in the added value of these data users can offer and/or sell data on a dedicated marketplace. olmogo lays ground for such a solution.
    • data mining

      The process of data mining is defined by recognizing patterns within data according to different problem settings or questions. Data mining is performed on nearly all existing data and defines/creates the true value of the underlying data. Within olmogo data mining is only possible after the explicit consent and data share of the data owner. This gives the user of olmogo the confidence that no data is analyzed without permission and control.
    • data ownership

      Data ownership by definition is the legal right and complete control over a single set of information. In the context of olmogo data ownership refers to personal data and therefore data first and foremost belongs to the originator or producer of this data. In olmogo consent for a third party to process this data can be given automatically or manually as defined by the users of olmogo. This represents a fair personal data management and is not only compliant to GDPR/DSGVO but also the approach to gain the most out of this data for all parties.
    • data portability

      Data portability is the requirement to provide the data subject with a copy of her or his data in a standard format. Data subjects may ask at any point of time for such a copy of their data.
    • data subject

      The data subject is a natural person who created and owns data. The data subject gained multiple rights with the introduction of GDPR/DSGVO in May 2018. (s.a. data subjects rights).
    • data subjects rights

      The data subject - this is you - gained multiple rights with the introduction of GDPR/DSGVO legislation in May 2018. Just to name some of this rights: the right to require information about the personal data being processed access to your data correction of data which is wrong the right to restrict certain processing of your data the right to receive data in a structured and commonly used format the right to data portability These rights can be claimed towards the DPO of the enterprise processing your data.
    • digital footprint

      As digital footprint is defined all traces of an individual using digital devices. This includes using the internet, wearables, driving a car or even making phone calls. With the spread of the Internet of Things (IoT) digital footprints will be nearly everywhere in our life. Management of personal data becomes a serious and ubiquitous challenge in any facet of our life.
    • digital identity

      As digital identity is referred to a defined identity in cyberspace by an individual person or an entity. A digital identity may be enriched by the digital footprint to profile the identity.
    • digital life

      With digital life is meant all activities which an user undertakes during her/his daily life leaving traces and fingerprints in various systems caused by her/his actions and behavior. olmogo takes the function to guard your data created living your digital life. You can be sure that your data is securely stored and only under your control. You may share this data with any third party (friends, companies) you wish. You also do NOT have to refrain from common social media platforms since olmogo offers you a comfortable way to post content in Facebook or the like.
    • digital transformation

      The digital transformation is the continuous change process within our society and within corporations triggered by the use and availability of digital technology. Digital transformation causes myriads of data produced by users and stored by corporations to optimize services and for personality profiling of their customers. The legal situation of creator and ownership causes a growing field of tension between users and corporations carried by mistrust and uncertainty. Olmogo wants to bridge this field of tension by providing owner centric data storage and access as well as corporate privileges to analyze and profile this data.
    • DPO (data protection officer)

      The DPO is working to ensure that the entity is complying with the policies and regulation defined in GDPR/DSGVO legislation. The DPO is the person to talk to if it comes to any question about your data - as a data subject.
  • e

    • EHR

      EHR stands for electronic health record - see there for more information
    • electronic health record

      An electronic health record is a paperless version of a medical record. Also referred to as electronic patient record (EPR) or electronic medical record (EMR). Electronic health records are held in most medical service institutions however the connectivity of these records is not yet solved and a challenging undertaking due to significant privacy issues. Within olmogo a health record could remain in the particular medical entity (hospital, private practice, etc.) and linked to a mogo. This mogo can then be shared by the owning patient with other service providers reducing double examinations and costs. You can find more information on the website at the olmogo health use case.
    • electronic medical record

      see electronic health record
    • electronic patient record

      see electronic health record
    • email

      Email is a digital way to send and receive information in form of single messages called email. Emails are very commonly used however security is significantly lacking since email pass many servers under access of third parties where the contend could potentially disclosed. With olmogo you can substitute email with the concept, that the information is not physically sent through the networks but information can be shared in the form of a view to this information saving storage space, bandwidth and maintaining data control. You can find more information on the website at the olmogo workspaces whitepaper.
    • email encryption

      Email encryption prevents that unauthorized third parties are able to read sent emails. This serves a a solution to the security and privacy issue of emails however it is not is very user friendly and convenient. Olmogo offers email functionality freeing the user from all concern about security and all handling hassles of encryption keys. You can find more information on the website at the olmogo workspaces whitepaper.
    • email security

      Email security refers to all measures to provide and enhance the security of email. See also email encryption and email. s.a. email encryption
    • embedded analytics

      Today mostly all devices and/or software systems have analytics and reporting capabilities embedded. Analytics of data is one of the major value generation out of data or big data. S.a. big data.
    • EMR

      EMR stands for electronic medical record - see electronic health record for more information
    • encrypted data

      Encrypted data is in the context of GDPR/DSGVO personal data which is protected through technical measures to ensure that this data is only accessible by authorized parties. Within olmogo any data (mogo) is client side encrypted and carries therefore zero information (see there) for unauthorized third parties. The owner of the data however does not have to worry about encryption key handling or loss of the same due to olmogo´s patented encryption key management.
    • ENISA

      ENISA stands for European Network and Information Security Agency. Created 2004 the ENISA has defined 9 high probability/high impact security risks for cloud based services. These are: loss of governance isolation failure malicious insider insecure or incomplete data deletion management interface compromise service engine compromise subpoena or e-discovery changes of jurisdiction data protection risk All these risks have been addressed while designing olmogo and have been solved. The link to download the ENISA study: https://www.enisa.europa.eu/publications/cloud-computing-risk-assessment
    • enterprise

      An enterprise is any entity engaged in economic activity regardless of legal form. The enterprise is responsible to comply with GDPR/DSGVO legislation.
    • enterprise data management

      Enterprise data management (EDM) is the capability and necessity of a corporation to handle all data related to their business. This is due to stringent legislation especially for personal data a growing challenge. olmogo helps enterprises to optimize their personal data management efforts to a minimum, comply with GDPR/DSGVO and create a fair and future driven relationship to customers.
    • enterprise solution

      An enterprise solution is a software framework designed to integrate data from multiple aspects of a company´s business. Companies offering enterprise solutions are SAP, Oracle, IBM, Microsoft and many more. Olmogo interfaces with nearly all enterprise solutions with defined interfaces to give an easy and lean to implement approach for GDPR/DSGVO and corporate data management.
    • EPR

      EPR stands for electronic patient record - see electronic health record for more information
  • f

    • file sharing

      File sharing is the process of offering access to digital information to third parties. This can be done in different ways: giving access to a directory or network hyperlink the file in the world wide web sending the file to the third party via email or other message systems Today files and information are most commonly shared on social networks within certain user groups. Fact and problem about file sharing is that the service provider has full access to the shared information and can therefore analyze and profile content and users which is the business case for these companies. In contrary to these applications olmogo has no access to your information shared in olmogo and ensures 100% your privacy.
    • fines

      The GDPR/DSGVO legislation established significant fines for breaches of entities. The fines are up to the higher of 4% of the annual worldwide turnover of the enterprise or 20 million Euros.
  • g

    • GDPR/DSGVO

      GDPR/DSGVO is the abbreviation for General Data Protection Regulation. This new legislation marks quite a radical change in terms of personal data protection and the ownership of data. The data subject is put into the center of the legislation and is empowered with multiple rights to gain more governance over her/his data. Some of this rights are the right to require information about data being processed access to data in certain circumstances correction of data which is wrong the right to restrict certain processing of data the right to receive data in a structured and commonly used format the right to data portability In olmogo data governance can be fully assigned to the data subject without loosing control over the data as a corporation. Therefore all data subjects rights are fully fulfilled and compliance to GDPR/DSGVO legislation is implicit.
    • GPS

      GPS is the abbreviation for Global Positioning System. With this technology a GPS sensor can locate its position anywhere in the world up to an accuracy of 2m. Most mobile phones and wearables have inbuilt GPS sensors and thus are able to locate and track the position of the user exactly. Again this tracking data is very valuable since it allows exact movement profiles of the consumer.
  • h

    • hybrid cloud

      Hybrid cloud combines enterprise internal IT-infrastructure with external cloud infrastructure to optimize and/or enhance the service. olmogo can be used in the set up of a hybrid cloud solution for example as a GDPR/DSGVO enterprise solution. This allows the customer of olmogo to remain the internal IT infrastructure nearly untouched but still gain optimal solution support.
  • i

    • information privacy

      Information privacy can be referred to as the privacy of personal information. There are different mechanisms to reach and/or maintain information privacy like access management, encryption, information hiding or masking. A common problem is the balance between openness for sharing and communication versus the loss of governance, security and privacy. olmogo is the optimal tool to solve this challenge.
    • internet privacy

      Internet privacy has commonalities with information privacy (see there) but refers more to the behavior within the internet and the involved tracking.
    • IoT

      The internet of things is a network of physical objects containing sensors to communicate and track the users activities. According to a research of Gartner there will 20.2 billion connected devices in 2020. This significant number of sensors will track user behavior in multiple situations in daily digital life. Data governance for this data will be a significant challenge and a fair processing will be a competitive advantage to companies being open and transparent. olmogo is setting ground for this competitive advantage by a owner centric approach - lean to your business and fair to your customer.
  • m

    • malicious insider

      As malicious insider an employee is defined who misuses high level privileges within the corporation s/he is working for. In terms of data protection security breaches caused by malicious insiders are hard to address because this employee has access to passwords, servers or other administrative informations to get hold of the desired data. In olmogo encryption keys are always in the data owners hands so malicious insiders will gain no access no matter what information they acquire.
    • messaging

      Messaging is a way to communicate via short text messages between two or more parties. In instant messaging the messages are sent immediately. SMS or WhatsApp are commonly used messaging services. It is quite likely that messaging services find their business model in the analytics of messages but also in the analysis of the network of who is communicating with whom plus by collecting contact list information. If and how for example WhatsApp is creating revenue and why Facebook payed 19 billion dollars for it is still a controversy.
    • mobile device

      Mobile devices are mobile phones and tablets made compact and lightweight. Today the capabilities of this devices are manifold and extremely powerful due to micro technologies. Mobile devices are very potential data sources about users behavior with all kind of tracking and surveillance capabilities like motion sensors, camera, microphone and GPS sensors. Personal data protection is especially for data of these devices a major challenge. Users should be aware that life is tracked and profiled extensively using „free“ apps and services.
    • mobile health

      Mobile health is the technology for delivering medical and health services through mobile devices.
    • mogo

      A mogo is the smallest information unit within the olmogo universe. mogos can be any kind of data independent of content, size and origin. Mogos are client side encrypted and follow therefore our zero information policy. mogos themselves can be stored on any (even unsecured) server since they contain no information. mogos can be linked to one another to enable multipart documents such as chat or even email or structured archives of your data. A mogo gives you with one glance the overview with whom and when you shared your data.
  • o

    • olmogo

      olmogo is the place where all mogos live. olmogo is a patented solution providing secure data storage, sharing and retrieving with a consequent concept of ownership. olmogo enables multiple use cases such as truly secure cloud, social media and messaging for consumers as well as GDPR/DSGVO, data management and IoT solutions for businesses.
    • olmogo identity

      An identity within olmogo is a role of a person or entity with which s/he or it has access to mogos. One person or entity can have multiple identities. For example a company can have the identity of marketing, quality assurance and others for which access may be given. The advantage is you may give access to your data only for quality assurance but not to marketing of the respective company. Also a person may have different identities for example identity A may be private and identity B may be business related data.
    • own your own data

      Own your own data could be defined as a movement of users not to give their data away indifferent. Data you as a user create while using digital devices are your data unless you give explicit consent to third parties to use this data for other purposes. According to actual studies 95% of users are concerned about misuse of their data, 80% are more concerned than a year ago. This indicates a clear tendency towards raising awareness towards privacy and data governance.
  • p

    • patented solution

      olmogo is based on a patented algorithm for data security and privacy. The patent can be viewed here. Having a patent olmogo is able to guaranty its value propositions which are on the one side publicly available and on the other side protected by the patent.
    • personal cloud

      As personal cloud is referred to a cloud service especially designed for consumers using it privately and/or at home. The term personal cloud as well private cloud are marketing driven buzz words rather than contextual different meanings. Somehow privacy and security is intended to be emphasized. However all cloud solutions the provider has access to the stored data.
    • personal data

      Personal data is any data related to a natural person or data subject that can be used to directly or indirectly identify the person. Personal data is normally produced by the data subject and is to put under her/his governance.
    • personal data protection

      Personal data protection is an upcoming issue, demand of users and necessity for businesses to regain customer trust, fulfill legal requirements and stay competitive in the future. In the past very few customers cared about data they were leaving while using a service. Today there is a significant change in awareness and user behavior. Users demand governance and also a fair return for the added value of their data. olmogo is addressing these demands directly in its design and puts the data owner into complete governance enabling fair and lean use cases for consumers and corporations.
    • personality profiling

      Profiling is any automated processing of personal data intended to evaluate, analyze or predict the behavior of the person who created this data. Since olmogo handles only fully encrypted data with zero information and is NOT holding the encryption key to decrypt your data you can be 100% sure that within olmogo no profiling is performed on any data of you.
    • pervasive computing

      Pervasive is supposed to signify „everywhere“. With the rise of sensors and connected devices everywhere in our life computing of data is penetrating completely our lives. All this tracked personal data has to be managed, stored, secured, handled correctly and legally compliant and fair to the customer. There is an emerging need for more user awareness of these tremendous amounts of data allowing powerful analytics and profiles.
    • privacy

      According to a European paper of Micheal Friedewald the type of privacy of data and images includes “that personal data is not automatically available to other individuals or organizations and that the owner of the data has a substantial degree of control over that data and its use.“ Olmogo is exactly fulfilling this definition with its user (owner) centered approach.
    • privacy by default

      The legal requirement for privacy by default is around for a while. However most applications up to now do not really follow this requirement. With the GDPR/DSGVO legislation there is the legal obligation to implement data protection by default. This means the product has to be preconfigured in a personal data protection friendly status. Configurations have to be in a way that personal data is only processed to the extend which is absolutely necessary for the underlying purpose. A processing of data to any third parties has to be accepted explicitly by the data subject.
    • privacy by design

      With the demand of privacy by design the producer of a product is obliged to undertake all reasonable measures to comply with all data protection principles. Privacy is supposed to become therefore a feature of any product rather than an optional add on.
    • privacy concern

      95% of consumers are concerned about personal data protection and their privacy. This significant number which is supported by a number of independent studies raises the obvious question what can and should be done to regain customers trust since trust influences significantly consumer behavior like buying or using the service at all.
    • privacy paradox

      The privacy paradox is a phenomena that users in all surveys state being concerned about privacy but at the same time their behavior does not reflect this concern at all.
    • private cloud

      see personal cloud
    • private key

      The private key is the confidential half of a asymmetric key pair. This key is only known by the owner of the data. The private key has to kept safe and secure to enable effective encrypted communication.
    • profiling

      see personality profiling
    • Pseudonymisation

      The processing of personal data in a way that it can no longer be attributed to a single person without the use of any additional data. This means anonymisation stays only so long in effect as long as additional data stays separate. With additional data attribution it is very well possible to de-anonymize data. Olmogo is not an anonymized data system, every mogo has an unique and defined owner. However the content of the mogo carries for any third party zero information. This means olmogo has the knowledge to whom a single mogo belongs but has no access what so ever to the content of the mogo.
    • public cloud

      As the opposite of personal or private cloud this cloud service is for the general public.
    • public key

      The public key is the public half of a asymmetric key pair. This key is known by all senders of the data. The public key can be published to enable effective encrypted communication.
  • r

    • recipient

      A recipient is a third party (entity or person) to which personal information is disclosed. In olmogo only you as the data owner decide to whom information is disclosed. This comes with one simple swipe in your olmogo app, withdraw of this access rights is also only one swipe and can be performed at any time. Data access can be granulated to any wished extent.
    • renderer

      A renderer in olmogo is defined as a specific way to display the desired information. Various renderers come with olmogo by default. Developer can design their own favorite renderer and apply for integration in olmogo as on open source add on.
    • right to be forgotten

      The right to be forgotten entitles you to have the data controller erase your data and cease further dissemination. Also third parties should potentially cease processing of your data, which is hard to control or guarantee.
    • RSA

      RSA encryption is the standard in encryption for data shared over the internet. It is a public key encryption developed by RSA Data Security. olmogo is also using RSA encryption. As a corporate user you may use your own favorite encryption methodology if desired.
  • s

    • secure file sharing

      Secure file sharing is done by encrypting the file before sharing. This is one aspect of how olmogo is sharing files. olmogo however is not sending the file physically - it is giving the recipient a link to be able to decrypt and view the file - the owner remains in control of the data element all the times.
    • security certificate

      A security certificate is used by a website or a web application to prove its identity and authenticity in form of a small file or string.
    • sidebar

      The sidebar in olmogo is a GUI (Graphical User Interface) element to ease usability by expanding the screen size with an additional layer. On the side bar often used mogos, contacts or agents can be placed to link them with one swipe to other mogos on the main stage.
    • social media

      Social media is an online platform where users create and distribute or search and consume content for the purpose of communication within communities named as friends, contacts, followers. Social media per se is a beneficial and effective environment for communication to pursue particular interests. Recently social media came in disrepute due to the fact, that personal data is analyzed, profiled and processed to third parties for multiple reasons. Also because of the fair question who may participate in the added value of this data. The fact that the customer became the product is for a growing number of users a discomfort. olmogo has no access at all to any stored data and can not follow classic business models like analyzing or selling user data.
  • t

    • TPM

      TPM stands for trusted platform module. It is a secured hardware element (hardware security module) which is a dedicated micro controller with integrated cryptographic keys.
    • trust

      Trust is defined as “the willingness of a party to be vulnerable to the actions of another party based on the expectation that the other will perform a particular action important to the truster, irrespective of the ability to control or monitor that other party” In olmogo there is no trust to third parties required. All other solutions providing privacy and security we know are based on a trust center approach - therefore someone has the master key which may decrypt or access your data. With olmogo you are in full control of your keys but still do not have to worry about loosing the key and with it all your data.
  • v

    • vertical cloud

      Vertical cloud are defined solutions which provide a cloud solution especially for a business segment or a branch. olmogo can be used as a vertical cloud solution for various branches like automotive, logistics, medicine and many more.
    • view

      A view in olmogo is the combination of a search for mogos under defined criteria and a selected renderer to display the search result. For example all my pictures of 2017 viewed in a gallery view.
    • virtual private cloud

      Virtual private cloud (VPC) stands for a solution where a private cloud is provided within a public cloud by a provider. Basically a part of the public cloud is isolated and only accessible for dedicate users. VPC´s are designed for customers having some more concerns about cloud usage. It does provide some more security against outside attacks but the provider has still full access to all information stored. olmogo takes one step ahead and encrypts all stored data with a unique key of the user and has therefore no access to the stored data.
  • w

    • wearable

      A wearable is a (usually small) device like a wristwatch which is worn on the body to track actions of the user like activity, body signals like perspiration, temperature, heart rate. Wearable devices create huge amounts of data of the user. olmogo is specialized on the storage of this kind of pervasive data offering a safe way to store, view and share this data.
  • z

    • zero information policy

      All mogos within olmogo are client side encrypted. Neither the infrastructure storing and handling your data nor olmogo and any employees of olmogo have access. Mogos have without your key no information for any third party and render therefore completely useless even if a storage server would be attacked. As a consequence the storage capacity consuming data parts can be stored on insecure and inexpensive storage media.