{"id":6157,"date":"2024-03-11T15:20:42","date_gmt":"2024-03-11T13:20:42","guid":{"rendered":"https:\/\/security-robotics.de\/?p=6157"},"modified":"2024-04-24T11:02:13","modified_gmt":"2024-04-24T09:02:13","slug":"data-security","status":"publish","type":"post","link":"https:\/\/security-robotics.de\/en\/glossary\/data-security","title":{"rendered":"Data security"},"content":{"rendered":"\n<p><a rel=\"popover\" data-title=\"Data security\" data-post-id=\"6157\" class=\"sr-glossary-link\" aria-label=\"Data security\" href=\"https:\/\/security-robotics.de\/en\/glossary\/data-security\">Data security<\/a> in the context of <a rel=\"popover\" data-title=\"security technology\" data-post-id=\"5907\" class=\"sr-glossary-link\" aria-label=\"Security technology\" href=\"https:\/\/security-robotics.de\/en\/glossary\/security-technology\">security technology<\/a> and <a rel=\"popover\" data-title=\"robotics\" data-post-id=\"5878\" class=\"sr-glossary-link\" aria-label=\"Robotics\" href=\"https:\/\/security-robotics.de\/en\/glossary\/robotics\">robotics<\/a> refers to measures taken to ensure the confidentiality, integrity and availability of data in robot-controlled systems. This includes protective mechanisms against unauthorised access, manipulation or data loss. Technologies such as encryption, <a rel=\"popover\" data-title=\"access controls\" data-post-id=\"5891\" class=\"sr-glossary-link\" aria-label=\"Access control\" href=\"https:\/\/security-robotics.de\/en\/glossary\/access-control\">access controls<\/a> and secure <a rel=\"popover\" data-title=\"communication protocols\" data-post-id=\"6025\" class=\"sr-glossary-link\" aria-label=\"Communication protocol\" href=\"https:\/\/security-robotics.de\/en\/glossary\/communication-protocol\">communication protocols<\/a> are used to ensure that sensitive information in robotic systems is protected and cannot be compromised.<\/p>","protected":false},"excerpt":{"rendered":"<p>Data security in the context of security technology and robotics refers to measures taken to ensure the confidentiality, integrity and availability of data in robot-controlled systems. This includes protective mechanisms against unauthorised access, manipulation or data loss. Technologies such as encryption, access controls and secure communication protocols are used to ensure that sensitive information in [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"off","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[388],"tags":[549],"class_list":["post-6157","post","type-post","status-publish","format-standard","hentry","category-glossary","tag-data-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.1 (Yoast SEO v24.9) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Data security - Security Robotics<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/security-robotics.de\/en\/glossary\/data-security\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Data security\" \/>\n<meta property=\"og:description\" content=\"Data security in the context of security technology and robotics refers to measures taken to ensure the confidentiality, integrity and availability of data in robot-controlled systems. This includes protective mechanisms against unauthorised access, manipulation or data loss. Technologies such as encryption, access controls and secure communication protocols are used to ensure that sensitive information in [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/security-robotics.de\/en\/glossary\/data-security\" \/>\n<meta property=\"og:site_name\" content=\"Security Robotics\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-11T13:20:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-24T09:02:13+00:00\" \/>\n<meta name=\"author\" content=\"Michael Engel\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Michael Engel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/security-robotics.de\/en\/glossary\/data-security\",\"url\":\"https:\/\/security-robotics.de\/en\/glossary\/data-security\",\"name\":\"Data security - Security Robotics\",\"isPartOf\":{\"@id\":\"https:\/\/security-robotics.de\/en#website\"},\"datePublished\":\"2024-03-11T13:20:42+00:00\",\"dateModified\":\"2024-04-24T09:02:13+00:00\",\"author\":{\"@id\":\"https:\/\/security-robotics.de\/en#\/schema\/person\/28cc52f7777054d66557d928ef562e56\"},\"breadcrumb\":{\"@id\":\"https:\/\/security-robotics.de\/en\/glossary\/data-security#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/security-robotics.de\/en\/glossary\/data-security\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/security-robotics.de\/en\/glossary\/data-security#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/security-robotics.de\/en\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Data security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/security-robotics.de\/en#website\",\"url\":\"https:\/\/security-robotics.de\/en\",\"name\":\"Security Robotics\",\"description\":\"Innovative Security-Roboter | \u00dcberwachung, Messung, Zutritt\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/security-robotics.de\/en?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/security-robotics.de\/en#\/schema\/person\/28cc52f7777054d66557d928ef562e56\",\"name\":\"Michael Engel\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/security-robotics.de\/en#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1d4d5fa3248381de9f4886ea0db0aec3f525afddc61e6d24f41910856cf22706?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1d4d5fa3248381de9f4886ea0db0aec3f525afddc61e6d24f41910856cf22706?s=96&d=mm&r=g\",\"caption\":\"Michael Engel\"},\"url\":\"https:\/\/security-robotics.de\/en\/author\/m-engel\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Data security - Security Robotics","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/security-robotics.de\/en\/glossary\/data-security","og_locale":"en_US","og_type":"article","og_title":"Data security","og_description":"Data security in the context of security technology and robotics refers to measures taken to ensure the confidentiality, integrity and availability of data in robot-controlled systems. This includes protective mechanisms against unauthorised access, manipulation or data loss. Technologies such as encryption, access controls and secure communication protocols are used to ensure that sensitive information in [&hellip;]","og_url":"https:\/\/security-robotics.de\/en\/glossary\/data-security","og_site_name":"Security Robotics","article_published_time":"2024-03-11T13:20:42+00:00","article_modified_time":"2024-04-24T09:02:13+00:00","author":"Michael Engel","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Michael Engel","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/security-robotics.de\/en\/glossary\/data-security","url":"https:\/\/security-robotics.de\/en\/glossary\/data-security","name":"Data security - Security Robotics","isPartOf":{"@id":"https:\/\/security-robotics.de\/en#website"},"datePublished":"2024-03-11T13:20:42+00:00","dateModified":"2024-04-24T09:02:13+00:00","author":{"@id":"https:\/\/security-robotics.de\/en#\/schema\/person\/28cc52f7777054d66557d928ef562e56"},"breadcrumb":{"@id":"https:\/\/security-robotics.de\/en\/glossary\/data-security#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/security-robotics.de\/en\/glossary\/data-security"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/security-robotics.de\/en\/glossary\/data-security#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/security-robotics.de\/en"},{"@type":"ListItem","position":2,"name":"Data security"}]},{"@type":"WebSite","@id":"https:\/\/security-robotics.de\/en#website","url":"https:\/\/security-robotics.de\/en","name":"Security Robotics","description":"Innovative Security-Roboter | \u00dcberwachung, Messung, Zutritt","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/security-robotics.de\/en?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/security-robotics.de\/en#\/schema\/person\/28cc52f7777054d66557d928ef562e56","name":"Michael Engel","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/security-robotics.de\/en#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1d4d5fa3248381de9f4886ea0db0aec3f525afddc61e6d24f41910856cf22706?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1d4d5fa3248381de9f4886ea0db0aec3f525afddc61e6d24f41910856cf22706?s=96&d=mm&r=g","caption":"Michael Engel"},"url":"https:\/\/security-robotics.de\/en\/author\/m-engel"}]}},"_links":{"self":[{"href":"https:\/\/security-robotics.de\/en\/wp-json\/wp\/v2\/posts\/6157","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/security-robotics.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/security-robotics.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/security-robotics.de\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/security-robotics.de\/en\/wp-json\/wp\/v2\/comments?post=6157"}],"version-history":[{"count":1,"href":"https:\/\/security-robotics.de\/en\/wp-json\/wp\/v2\/posts\/6157\/revisions"}],"predecessor-version":[{"id":6180,"href":"https:\/\/security-robotics.de\/en\/wp-json\/wp\/v2\/posts\/6157\/revisions\/6180"}],"wp:attachment":[{"href":"https:\/\/security-robotics.de\/en\/wp-json\/wp\/v2\/media?parent=6157"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/security-robotics.de\/en\/wp-json\/wp\/v2\/categories?post=6157"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/security-robotics.de\/en\/wp-json\/wp\/v2\/tags?post=6157"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}