Wiki

Kooch Cybersecurity & Compliance – Technical Terms Wiki

Access Control

Mechanisms ensuring only authorized users can access systems, networks, or data.

Annex A Controls

The set of 114 reference security controls listed in ISO/IEC 27001 that organizations can choose from to manage risks.

Asset Inventory

A structured list of all information assets (servers, databases, documents) needed for risk assessments under ISO 27001.

Breach Notification

The mandatory process of informing regulators and affected data subjects about a personal data breach within legal timeframes.

Business Continuity

A framework ensuring critical business functions continue during and after incidents (e.g., cyberattacks, outages).

Clarification Text (KVKK)

A mandatory privacy notice under Turkish law (KVKK) informing individuals how their data is processed.

Cloud Security

Practices and technologies (IAM, encryption, monitoring) to secure data and applications hosted in cloud platforms such as AWS, Azure, and GCP.

Compliance Management

The continuous process of monitoring, auditing, and updating organizational practices to meet laws like KVKK and GDPR.

Cookie Banner

A website popup requesting users’ consent for cookies and trackers as required under GDPR/KVKK.

Data Controllers’ Registry (VERBIS)

Turkey’s mandatory registry where organizations must list their personal data processing activities.

Data Mapping

The process of identifying how personal data flows through an organization (collection, storage, transfers).

Data Processing Agreement (DPA)

A legal contract between a data controller and processor that defines obligations for handling personal data.

Data Protection Impact Assessment (DPIA)

A structured risk assessment for projects that process sensitive or high-risk personal data.

Data Subject Access Request (DSAR)

A formal request by an individual to access, correct, or delete their personal data.

DPO (Data Protection Officer)

A designated role responsible for overseeing data protection compliance and liaising with regulators.

DPR (Data Protection Representative)

A local representative appointed by foreign companies to meet KVKK requirements for handling Turkish personal data.

Firewall

A network security device or software that filters incoming/outgoing traffic based on predefined security rules.

Gap Analysis (KVKK/GDPR)

An audit that compares current data protection practices against regulatory requirements to identify compliance gaps.

GDPR (General Data Protection Regulation)

The EU’s data privacy regulation, setting standards for personal data collection, storage, and use.

IDS/IPS (Intrusion Detection/Prevention System)

Tools that monitor and potentially block malicious activity on networks.

Incident Response

A structured process for detecting, managing, and recovering from cybersecurity incidents.

Information Security Management System (ISMS)

A documented management framework aligning with ISO 27001 for managing and improving information security.

ISO 27001

The international standard for information security management systems, widely recognized for audits and certifications.

KVKK (Kişisel Verilerin Korunması Kanunu)

Turkey’s Personal Data Protection Law, similar in scope to the EU’s GDPR.

NDA (Non-Disclosure Agreement)

A confidentiality agreement protecting sensitive business or client information.

Network Security

Safeguards (firewalls, VPNs, IDS/IPS) to protect networks against unauthorized access or cyberattacks.

Privacy Notice

A legal statement informing individuals how their personal data will be used (required by both KVKK and GDPR).

Professional Liability Insurance (E&O)

Insurance covering consulting errors or negligence in data protection services.

Risk Assessment (ISO 27001)

A structured evaluation of threats, vulnerabilities, and potential impacts on organizational assets.

RoPA (Records of Processing Activities)

A GDPR/KVKK requirement to maintain an internal log of how personal data is processed.

Scope of ISMS

The defined boundaries of an ISO 27001 implementation (e.g., which departments, systems, and data types are covered).

SMART Goals

A governance framework ensuring goals are Specific, Measurable, Achievable, Relevant, and Time-bound.

Statement of Applicability (SoA)

ISO 27001 document listing all security controls chosen or excluded, with justifications.

VERBIS

See Data Controllers’ Registry.