Version: 1.0 | Updated: December 2024
This glossary contains technical terms used in the EU compliance framework documentation. English terms are listed with their Czech equivalents and explanations.
Navigation
A
| English term | Czech equivalent | Explanation |
|---|
| Access Control | Rizeni pristupu | Mechanism for controlling who has access to certain resources |
| Accountability | Odpovednost | GDPR principle requiring demonstration of compliance |
| Accuracy | Presnost | Degree of correctness of AI system outputs |
| AI Act | Narizeni o AI | European regulation on artificial intelligence (EU 2024/1689) |
| AI System | AI system | System utilizing artificial intelligence |
| Annex | Priloha | Supplement to a regulation or directive |
| Anonymization | Anonymizace | Irreversible removal of identifying information |
| Audit | Audit | Systematic review of processes or systems |
| Audit Log | Auditni zaznam | Chronological record of all activities in a system |
| Audit Trail | Auditni stopa | Chronological record documenting the sequence of activities |
| Automated Decision-Making | Automatizovane rozhodovani | Decision-making performed by AI without human intervention |
B
| English term | Czech equivalent | Explanation |
|---|
| Backup | Zaloha | Copy of data in case of loss of the original |
| Balancing Test | Test vyvazeni | Assessment of legitimate interest vs. data subject rights |
| BCM | Rizeni kontinuity cinnosti | Business Continuity Management |
| Bias | Zkresleni | Systematic error in an AI model |
| Bias Testing | Testovani zkresleni | Evaluation of an AI system for discriminatory outputs |
| Biometric Data | Biometricke udaje | Physical or behavioral characteristics for identification |
| Board | Predstavenstvo | Governing body providing oversight |
| Breach | Poruseni zabezpeceni | Unauthorized access to personal data |
| Business Continuity | Kontinuita cinnosti | Ability to continue operations even during an incident |
C
| English term | Czech equivalent | Explanation |
|---|
| CE marking | Oznaceni CE | Mark confirming conformity with EU legislation |
| Chatbot | Chatbot | Conversational interface powered by AI |
| Checklist | Kontrolni seznam | List of items to verify |
| CISO | CISO | Chief Information Security Officer |
| Classification | Klasifikace | Assignment to a category based on risk |
| C-level | Vrcholovy management | Executive leadership (CEO, CTO, CISO, etc.) |
| Cloud Computing | Cloud computing | Delivery of IT services over the internet |
| Compliance | Soulad | Adherence to legal requirements |
| Conformity Assessment | Posouzeni shody | Verification that an AI system meets requirements |
| Consent | Souhlas | Free and informed consent of the data subject |
| Controller | Spravce | Entity determining the purposes of personal data processing |
| Critical Infrastructure | Kriticka infrastruktura | Infrastructure essential for the functioning of society |
| Cryptography | Kryptografie | Data protection using mathematical algorithms |
| CTO | CTO | Chief Technology Officer |
D
| English term | Czech equivalent | Explanation |
|---|
| Dashboard | Prehledovy panel | Visual overview of key metrics |
| Data Breach | Poruseni zabezpeceni dat | Security incident involving personal data leakage |
| Data Controller | Spravce | Organization determining the purpose of data processing |
| Data Mapping | Mapovani dat | Discovery of what data an organization processes |
| Data Minimization | Minimalizace dat | Principle of processing only necessary data |
| Data Processing Agreement (DPA) | Smlouva o zpracovani | Agreement between controller and processor |
| Data Processor | Zpracovatel | Entity processing data on behalf of the controller |
| Data Protection Impact Assessment (DPIA) | Posouzeni vlivu na ochranu udaju | Assessment of risks of personal data processing |
| Data Protection Officer (DPO) | Poverenec pro ochranu udaju | Person responsible for GDPR compliance |
| Data Subject | Subjekt udaju | Natural person whose data is being processed |
| Data Subject Access Request (DSAR) | Zadost o pristup k udajum | Subject’s request for a copy of their personal data |
| Deadline | Termin | Final date for meeting a requirement |
| Deepfake | Deepfake | Synthetic media created by AI |
| Deployer | Provozovatel | Entity deploying an AI system into operation |
| Disaster Recovery | Obnova po havarii | Process of restoring systems after a catastrophe |
| Drift Detection | Detekce odchylek | Monitoring changes in AI model behavior |
| Due Diligence | Hloubkova kontrola | Detailed vetting of a partner or supplier |
E
| English term | Czech equivalent | Explanation |
|---|
| Encryption | Sifrovani | Data protection using cryptography |
| Encryption at Rest | Sifrovani ulozenych dat | Encryption of data on disk |
| Encryption in Transit | Sifrovani pri prenosu | Encryption of data during transfer (TLS) |
| Endpoint Protection | Ochrana koncovych bodu | Antivirus and other protection on devices |
| Essential Entity | Zakladni subjekt | NIS2 category with higher obligations |
F
| English term | Czech equivalent | Explanation |
|---|
| Fail-safe | Bezpecnostni mechanismus | Mechanism for safe system failure |
| Firewall | Firewall | Network perimeter protection |
| Fraud Detection | Detekce podvodu | AI system for detecting fraud |
| Framework | Ramec | Structured approach or methodology |
G
| English term | Czech equivalent | Explanation |
|---|
| GDPR | GDPR | General Data Protection Regulation (EU 2016/679) |
| General Purpose AI (GPAI) | AI pro obecne ucely | AI models such as GPT, Claude usable for various purposes |
| Global Turnover | Celosvetovy obrat | Total annual revenue of the organization worldwide |
| Governance | Sprava a rizeni | System of management and oversight |
H
| English term | Czech equivalent | Explanation |
|---|
| Hallucination | Halucinace | AI output that is factually incorrect |
| High-Risk AI | AI s vysokym rizikem | AI systems with significant impact on rights per Annex III |
| Human Oversight | Lidsky dohled | Ability of a human to intervene in AI decision-making |
| Human-in-the-loop | Clovek ve smycce | AI decision requires human approval |
I
| English term | Czech equivalent | Explanation |
|---|
| Important Entity | Dulezity subjekt | NIS2 category with lower obligations |
| Incident Management | Rizeni incidentu | Process of responding to security incidents |
| Incident Response | Reakce na incident | Procedures when a security incident occurs |
| Incident Response Plan (IRP) | Plan reakce na incidenty | Document describing incident procedures |
| Information Security Management System (ISMS) | System rizeni informacni bezpecnosti | Systematic approach to security management per ISO 27001 |
| Inventory | Inventura | List of all AI systems in the organization |
K
| English term | Czech equivalent | Explanation |
|---|
| Key Performance Indicator (KPI) | Klicovy ukazatel vykonnosti | Metric for measuring success |
| Knowledge Cutoff | Hranice znalosti | Date after which an AI model has no training data |
L
| English term | Czech equivalent | Explanation |
|---|
| Law Enforcement | Organy cinne v trestnim rizeni | Police and judicial authorities |
| Legal Basis | Pravni zaklad | Lawful reason for processing personal data |
| Legitimate Interest | Opravneny zajem | Legal basis per Art. 6(1)(f) GDPR |
| Legitimate Interest Assessment (LIA) | Posouzeni opravneneho zajmu | Test for legitimate interest |
| Limited Risk AI | AI s omezenym rizikem | AI requiring transparency (chatbots, deepfakes) |
| Logging | Logovani | Recording of events in a system |
M
| English term | Czech equivalent | Explanation |
|---|
| Machine Learning (ML) | Strojove uceni | Artificial intelligence technology |
| Minimal Risk AI | AI s minimalnim rizikem | AI without specific obligations |
| Mitigation | Zmirneni | Measures to reduce risk |
| Model Card | Karta modelu | AI model documentation |
| Monitoring | Monitorovani | Continuous system observation |
| Multi-Factor Authentication (MFA) | Vicefaktorova autentizace | Authentication using multiple factors |
N
| English term | Czech equivalent | Explanation |
|---|
| NIS2 | NIS2 | Cybersecurity Directive (EU 2022/2555) |
O
| English term | Czech equivalent | Explanation |
|---|
| Onboarding | Zaskoleni | Process of integrating a new employee |
| Opt-in | Aktivni souhlas | Active granting of consent (checking a box) |
| Oversight | Dohled | Control and supervision |
P
| English term | Czech equivalent | Explanation |
|---|
| Patch Management | Sprava zaplat | Process of applying security updates |
| Penalty | Sankce | Fine for regulatory violation |
| Penetration Testing | Penetracni testovani | Simulated attack for security testing |
| Personal Data | Osobni udaj | Any information about an identified person |
| Policy | Smernice | Internal organizational directive |
| Post-Market Monitoring | Monitorovani po uvedeni na trh | Monitoring of an AI system after deployment |
| Privacy by Design | Ochrana soukromi od navrhu | Principle of embedding protection from the start of development |
| Privacy Policy | Zasady ochrany osobnich udaju | Document informing about data processing |
| Procedure | Postup | Detailed instructions for performing a task |
| Processor | Zpracovatel | Entity processing data on behalf of the controller |
| Prohibited AI | Zakazana AI | AI systems prohibited under Article 5 of the AI Act |
| Provider | Poskytovatel | Entity developing an AI system |
| Pseudonymization | Pseudonymizace | Replacement of identifiers with pseudonyms |
| Purpose Limitation | Omezeni ucelu | GDPR principle — processing only for stated purposes |
R
| English term | Czech equivalent | Explanation |
|---|
| RBAC | Rizeni pristupu na zaklade roli | Role-Based Access Control |
| Record Keeping | Vedeni zaznamu | Obligation to maintain documentation |
| Records of Processing Activities (ROPA) | Zaznamy o cinnostech zpracovani | List of all personal data processing activities |
| Recovery Point Objective (RPO) | Cilovy bod obnovy | Maximum acceptable data loss |
| Recovery Time Objective (RTO) | Cilovy cas obnovy | Maximum downtime duration |
| Resilience | Odolnost | Ability of a system to handle problems |
| Retention | Doba uchovavani | Data retention period |
| Right to Access | Pravo na pristup | Subject’s right to obtain a copy of their data |
| Right to be Forgotten | Pravo na vymaz | Subject’s right to have their data erased |
| Right to Data Portability | Pravo na prenositelnost | Right to receive data in a machine-readable format |
| Right to Object | Pravo vznest namitku | Subject’s right to object to processing |
| Right to Rectification | Pravo na opravu | Subject’s right to correct inaccurate data |
| Right to Restriction | Pravo na omezeni | Subject’s right to restrict processing |
| Risk Assessment | Posouzeni rizik | Identification and evaluation of risks |
| Risk Management | Rizeni rizik | Systematic approach to risk reduction |
| Robustness | Robustnost | Ability of a system to function even under errors |
S
| English term | Czech equivalent | Explanation |
|---|
| SaaS | SaaS | Software as a Service |
| Sanction | Sankce | Fine for regulatory violation |
| Scope | Rozsah pusobnosti | Area to which a regulation applies |
| Security Incident | Bezpecnostni incident | Event threatening security |
| SIEM | SIEM | Security Information and Event Management |
| SLA | SLA | Service Level Agreement |
| Social Scoring | Socialni bodovani | Rating of individuals based on behavior (prohibited by AI Act) |
| Special Category Data | Zvlastni kategorie udaju | Sensitive data per Art. 9 GDPR (health, biometrics, race, etc.) |
| Standard Contractual Clauses (SCCs) | Standardni smluvni dolozky | Mechanism for data transfer outside the EU |
| Storage Limitation | Omezeni ulozeni | GDPR principle — retain only as long as necessary |
| Sub-processor | Dalsi zpracovatel | Processor engaged by the processor |
| Supply Chain Security | Bezpecnost dodavatelskeho retezce | Protection of products across the entire supply chain |
T
| English term | Czech equivalent | Explanation |
|---|
| Template | Sablona | Prepared document pattern |
| Terms of Service (ToS) | Podminky sluzby | Contractual terms with the provider |
| Third-party | Treti strana | External provider |
| Threat | Hrozba | Potential danger to a system |
| Timeline | Casova osa | Schedule of dates and milestones |
| Training Data | Trenovaci data | Data used for training an AI model |
| Transfer Impact Assessment (TIA) | Posouzeni dopadu transferu | Risk analysis for data transfers outside the EU |
| Transparency | Transparentnost | Openness and clarity |
V
| English term | Czech equivalent | Explanation |
|---|
| Vendor | Dodavatel | External service provider |
| Vendor Management | Rizeni dodavatelu | Process of selecting and managing vendors |
| Vulnerability | Zranitelnost | Security weakness in a system |
| Vulnerability Management | Sprava zranitelnosti | Process of identifying and remediating vulnerabilities |
W
| English term | Czech equivalent | Explanation |
|---|
| Wireframe | Wireframe | Visual design of a user interface structure |
| Workflow | Pracovni postup | Defined sequence of steps |
Regulation abbreviations
| Abbreviation | Full name | Description |
|---|
| AI Act | Artificial Intelligence Act | EU Regulation 2024/1689 on artificial intelligence |
| GDPR | General Data Protection Regulation | EU Regulation 2016/679 on personal data protection |
| NIS2 | Network and Information Security Directive 2 | EU Directive 2022/2555 on cybersecurity |
Role abbreviations
| Abbreviation | English name | Czech equivalent |
|---|
| CEO | Chief Executive Officer | Generalni reditel |
| CFO | Chief Financial Officer | Financni reditel |
| CISO | Chief Information Security Officer | Vedouci informacni bezpecnosti |
| CTO | Chief Technology Officer | Technicky reditel |
| DPO | Data Protection Officer | Poverenec pro ochranu osobnich udaju |
Last updated: December 2025