Here is a helpful glossary of Salesforce acronyms for General Data Management and Security you will hear.

2FATwo-factor AuthenticationAlso an extra layer of security that proves a user trying to login to Salesforce is who they say they are. You will have seen this in action when creating/updating your password, and selecting a question (eg. “City you were born”) and a memorable answer. Note: 2FA has now been broadly replaced by MFA.
CASLCanada Anti-Spam LawAn anti-spam law that applies to all electronic messages (i.e. email, texts) organizations send in connection with a “commercial activity.” Its key feature requires Canadian and global organizations that send commercial electronic messages (CEMs) within, from or to Canada to receive consent from recipients before sending messages.
CCPACalifornia Consumer Privacy ActSimilar to GDPR, CCPA applies to businesses that collect or use personal information of California residents (even if the business is not in California).
CORSCross-Origin Resource Sharing“Allows web browsers to request resources from other origins. For example, using CORS, the JavaScript for a web application at can request a resource from” (source).
CSPContent Security PolicyThe Lightning Component framework uses CSP to impose restrictions on content. The main objective is to help prevent cross-site scripting and other code injection attacks.
GDPRGeneral Data Protection RegulationA legal framework that sets guidelines for the collection and processing of personal information from individuals who live in the European Union (EU).
HIPAAHealth Insurance Portability and Accountability ActEnsures that individual health-care plans are accessible, portable and renewable, and it sets the standards and the methods for how medical data is shared across the U.S. health system in order to prevent fraud.
HMSHardware Security Module“Used to provide cryptography processing and key management for authentication. Shield Platform Encryption uses HSMs to generate and store secret material, and run the function that derives data encryption keys used by the encryption service to encrypt and decrypt data.” (source).
KMSShield Key Management ServiceShield Platform Encryption uses data encryption keys to encrypt and decrypt data. Data encryption keys are derived on the Shield Key Management Service (KMS) using keying material split between a per-release master secret and an org-specific tenant secret stored encrypted in the database.” (source).
MFAMulti-factor AuthenticationAn extra layer of security that proves a user trying to login to Salesforce is who they say they are. MFA combines something you know (ie. password) with something you own (ie. mobile phone). There are Salesforce approved MFA methods (Salesforce Authenticator app, built-in authenticators, security keys). MFA was formerly two-factor authentication or 2FA.
PIIPersonally Identifiable InformationAny data that can be used to identify a specific individual: social security numbers, mailing or email address, and phone numbers have most commonly been considered PII
For auditing purposes, in Salesforce, Admins can indicate that a field contains PII in the field definition in Salesforce Setup.
SCVSingle Customer ViewThe concept of collating every data point and interaction that an individual (customer, prospect, or partner) has with an organization, accessible from one record. Also referred to as a “360-degree View”, Salesforce launched the “Customer 360” messaging to communicate that the tightly connected Salesforce platform can enable organizations to achieve this rich profile of each individual.
SSLSecure Sockets Layer“Salesforce certificates and key pairs are used for signatures that verify a request is coming from your organization. They are used for authenticated SSL communications with an external web site, or when using your organization as an Identity Provider.” (source).
SSOSingle Sign-onSign in to one system, and then be automatically signed into all the rest of the applications you need. Fewer passwords, fewer headaches, less tedium and it should enable you to get on with what you actually intended to do, rather than get bogged with admin stuff such as hunting around for where you put your password hint.
Related Posts
Salesforce Jigsaw
Salesforce Jigsaw, a prominent figure in cloud computing, has finalized a deal to acquire Jigsaw, a wiki-style business contact database, for Read more

Health Cloud Brings Healthcare Transformation
Health Cloud Brings Healthcare Transformation

Following swiftly after last week's successful launch of Financial Services Cloud, Salesforce has announced the second installment in its series Read more

Alphabet Soup of Cloud Terminology

As with any technology, the cloud brings its own alphabet soup of terms.  This insight will hopefully help you navigate Read more

We Are All Cloud Users
How Good is Our Data

My old company and several others are concerned about security, and feel more secure with being able to walk down Read more