Fact-checked by Grok 2 weeks ago

Secure Electronic Transaction

Secure Electronic Transaction (SET) is a designed to secure electronic credit and debit card payments over unsecured networks such as the by using (PKI), digital certificates, and dual encryption to protect sensitive cardholder information from merchants and potential interceptors. The SET Consortium was formed in 1996 by Visa International, Mastercard International, and technology firms including IBM, Microsoft, Netscape, GTE, SAIC, Terisa Systems, RSA Data Security, and VeriSign, with the first specification published in 1997; SET aimed to standardize secure online transactions amid the early growth of e-commerce, addressing limitations in existing protocols like Secure Sockets Layer (SSL) by ensuring merchants never directly access full card details. The protocol employed X.509 digital certificates issued by trusted Certificate Authorities for authentication, asymmetric encryption via 1,024-bit RSA algorithms for secure key exchange, and symmetric encryption such as triple DES for data protection, facilitating a process where cardholders used software "digital wallets" to generate encrypted purchase orders and payment authorizations separately signed for the merchant and issuer. In operation, a typical SET transaction involved the cardholder selecting items on a 's site, initiating through their software, which encrypted the details for the and the details for the acquirer ; the then forwarded the request to their , which verified signatures and certificates before seeking approval from the , all while maintaining and through dual digital signatures. This dual-channel approach treated online purchases as equivalent to "card-present" transactions for purposes, reducing risk by preventing card number exposure. Despite its robust security features, including resistance to eavesdropping, tampering, and identity spoofing, SET saw limited adoption due to its technical complexity, high implementation costs for software and certificates, slow transaction processing from cryptographic overhead, and poor user experience requiring wallet installations and multiple steps. By the early 2000s, uptake was minimal in the United States but slightly better in Europe and Asia; efforts to extend SET with EMV smart card integration and 3D SET for simplified flows failed to revive it, leading to its obsolescence as simpler alternatives like SSL/TLS with tokenization and protocols such as 3-D Secure, originally developed by Visa in 1999 and launched in 2001, with adoption by Mastercard, gained prominence for balancing security and usability in online payments.

History and Development

Origins and Creation

The development of the Secure Electronic Transaction (SET) protocol began in the mid-1990s through a joint effort by Visa International and , who announced plans in June 1995 to create a standardized system for secure online payments. This initiative addressed the limitations of existing payment methods on emerging digital networks. The SET Consortium was formed in 1996 by and , in collaboration with technology partners including , , , , , SAIC, Terisa Systems, and , to coordinate the protocol's design and implementation. These entities contributed expertise in , , and to ensure broad . In 1997, and formed Secure Electronic Transaction LLC (SETCo) to oversee the protocol's implementation and standardization. The primary motivation for SET was to combat increasing e-commerce fraud risks by establishing a robust standard for credit card transactions over insecure channels like the early , where data interception was a major threat. The aimed to build trust among consumers, merchants, and by guaranteeing secure exchanges without compromising . The SET specification was finalized as version 1.0 and publicly released on May 31, 1997, with a core emphasis on protections that shielded cardholder details from merchants and merchant order information from card issuers. Initial testing commenced later that year through pilot programs conducted by major banks to validate the protocol's effectiveness in real-world scenarios.

Timeline of Implementation and Decline

The Secure Electronic Transaction (SET) protocol underwent initial testing and early implementation in 1997, with the first commercial pilots launched in the United States involving major banks such as Bank of America and First Union, alongside limited merchant partners like Alaska Airlines and Capitolnet Marketing. These U.S. trials, which included small-scale employee testing groups of 25 to 500 participants, were complemented by international pilots in Europe (including Germany, France, the Netherlands, Denmark, and Norway), Canada, Singapore, Taiwan, Japan, Hong Kong, and South Africa, marking the protocol's debut in real-world e-commerce scenarios but with constrained merchant integration due to the need for specialized software and digital certificates. From 1998 to 2000, SET experienced updates aimed at improving , including the formal release of version 1.0 in May 1997 and subsequent enhancements to address technical compatibility issues across systems. This period represented the peak of SET's adoption efforts, with the first wave of compliant products becoming available and industry enthusiasm driving trials and product launches, yet overall uptake remained low among consumers owing to mandatory such as digital wallets and certificates, resulting in only limited merchant participation. The dot-com bust of 2000–2001 exacerbated SET's challenges by curtailing investments and slowing the growth of online payment infrastructures. By 2001, and shifted focus to simpler alternatives like SSL/TLS, leading to the effective withdrawal of official support for SET and initiating its decline. Following this, the protocol underwent a gradual phase-out, with active implementations ceasing in the mid-2000s, after which it persisted primarily as a in security literature highlighting the pitfalls of overly complex protocols.

Core Components and Participants

Key Entities Involved

The Secure Electronic Transaction (SET) protocol involves several key entities that play distinct roles in facilitating secure credit card payments over the internet, ensuring confidentiality, authentication, and trust among participants. Cardholder is the end-user, typically a consumer or corporate purchaser, who holds a payment card issued by a financial institution and uses SET-compliant wallet software containing a digital certificate to authorize payments without revealing sensitive card details to merchants. This entity initiates the purchase by digitally signing payment instructions, relying on the protocol to maintain the privacy of account information during electronic interactions. Merchant refers to the online seller or organization offering goods and services for purchase, who maintains a relationship with an acquirer to accept payment cards and employs SET gateway software to receive encrypted transaction data. The merchant's role centers on verifying cardholder orders and processing authorization requests while being unable to access the cardholder's actual payment information, thereby reducing fraud risk. Card Issuer is the financial institution, such as a , that issues the to the cardholder, establishes the , and guarantees payment for authorized transactions in accordance with card brand regulations like those of or . This entity verifies the cardholder's identity through digital signatures and certificates during the transaction validation process. Acquirer denotes the that provides the merchant with an for processing transactions, handling authorizations, and settling funds through established networks. The acquirer's primary function is to reimburse the for valid purchases after coordination with the , ensuring the financial flow between parties. Payment Gateway serves as an intermediary, often operated by the acquirer or a third-party provider like VisaNet, that routes encrypted messages between the , cardholder, , and acquirer using SET protocols and encryption keys. It processes payment instructions and authorization requests, acting as a secure bridge to traditional bankcard networks without direct access to sensitive card data. Certificate Authority (CA) is a trusted third-party organization, such as , responsible for issuing and managing X.509v3 digital certificates to cardholders, merchants, and payment gateways by digitally signing public keys to establish a . This entity authenticates participants' identities, enabling secure verification of signatures and preventing unauthorized involvement in transactions.

Essential Technical Elements

The Secure Electronic Transaction (SET) protocol relies on several foundational software and cryptographic components to enable secure payments over open networks. These elements include specialized software for cardholders and merchants, structures for protecting sensitive data, standardized message formats, and a for establishing trust. Developed jointly by and , these components ensure , , and without exposing card details to merchants. The SET Wallet is the primary software application for cardholders, installed on their workstations to manage encrypted data and facilitate transaction initiation. It stores sensitive information such as card numbers in an encrypted format and generates envelopes to protect details during transmission. features include support for creating instructions, handling requests and renewals, and generating hashes for validation purposes. This software also enables unsigned transactions for users without certificates, ensuring broader while maintaining through hardware cryptographic modules where recommended. Merchant Server Software serves as the backend system for merchants, processing SET messages from cardholders and interfacing with payment gateways. It handles incoming purchase requests, verifies digital signatures on received data, and prepares and capture requests while ensuring idempotency through unique identifiers. This software manages merchant certificates, including generation and renewal processes tied to agreements with acquirers, and supports extensions for enhanced functionality. Like the wallet, it benefits from with modules to bolster cryptographic operations. Digital Envelopes form the core cryptographic structures in SET for separately encrypting Payment Information (PI), which contains cardholder payment details, and Order Information (OI), which details the purchase. These envelopes use asymmetric and symmetric encryption techniques, such as with for key protection and for data confidentiality, to create secure capsules that tunnel PI directly to the payment gateway while allowing OI access for the . A linking mechanism, such as PI-OI links via hashes, binds the two without merging sensitive data, preventing merchants from viewing card information. This separation addresses privacy concerns central to the protocol's design. SET defines specific message types as standardized formats for communication, including AuthReq for merchant requests to the and CapReq for subsequent captures. AuthReq encapsulates transaction identifiers, PI, and order data within encrypted variants like EncB or EncX to ensure secure delivery. Similarly, CapReq uses encrypted structures such as EncB(M, P, CapReqData) or variants with authorization tokens, supporting idempotent processing to avoid duplicates. These messages, formatted according to standards, integrate signing and encryption for integrity and confidentiality. PKI Integration in SET employs a hierarchical Public Key Infrastructure based on X.509 v3 certificates to establish trust among participants, including cardholders, merchants, and gateways. Certificates bind public keys to entities, with chains rooted in trusted Certificate Authorities (CAs) like Brand CAs and issuing CAs for (CCA) or (MCA). Key features include certificate extensions for usage constraints, thumbprints via hashes for validation, and support for Certificate Revocation Lists (CRLs) to check validity. This infrastructure uses for encryption and signatures, enabling without shared secrets. Issuers, as key entities, rely on this PKI for verifying certificates during .

Protocol Operation

Step-by-Step Transaction Flow

The (SET) protocol operates through a structured sequence of phases that facilitate secure payments over the , involving the cardholder, , , acquirer, and issuer. In Phase 1, Purchase Initiation, the cardholder selects items from the online catalog and provides necessary details such as shipping address and preferences. The cardholder then generates an Order Request (OReq), which includes order information and payment details, signed using the cardholder's private key to ensure authenticity. This OReq is transmitted to the , initiating the process. During Phase 2, Merchant Processing, the merchant receives and verifies the OReq for completeness and validity. Upon confirmation, the merchant creates a Payment Request (PReq), incorporating the order details, payment authorization information, and relevant certificates. The PReq is then forwarded to the acquirer's for further processing on behalf of the merchant. Phase 3, , involves the routing the PReq to the for validation. The checks the cardholder's for sufficient funds, verifies the details, and responds with an Authorization Response (AuthRes), indicating approval or denial. The relays this response back to the , allowing the to proceed if authorized. In Phase 4, Capture and Settlement, which occurs after the merchant ships the goods, the merchant submits a Capture Request (CapReq) to the payment gateway, including the transaction identifier and amount. The gateway coordinates with the issuer to transfer funds from the cardholder's account to the merchant's account via the acquirer, finalizing the settlement. SET includes protocols for error handling throughout the flow, such as rejecting messages for format or content failures and issuing specific denial responses for issues like insufficient funds during . In cases of failed authorizations, the sends a rejection message via the gateway, prompting the to notify the cardholder and potentially abort the transaction.

Dual Signature Mechanism

The dual signature mechanism in the Secure Electronic Transaction (SET) protocol serves to link the payment information (PI), which contains sensitive cardholder details, with the order information (OI), which specifies purchase details, without fully disclosing either to the merchant or the issuer. This privacy-preserving approach ensures that the merchant cannot access card details while verifying the order, and the issuer cannot view order specifics while authenticating the payment, thereby maintaining confidentiality across parties. The construction begins by computing separate message digests for the PI and OI using a hash function. Let \text{PIMD} = H(\text{PIData}) and \text{OIMD} = H(\text{OIData}), where H denotes the hash function. These digests are then concatenated, and the result is hashed again to form the dual information: \text{DI} = H(\text{PIMD} \Vert \text{OIMD}). Finally, the cardholder signs this dual information with their private signature key to produce the dual signature: \text{DS} = \text{Sign}(\text{PR}_c, \text{DI}), where \text{PR}_c is the cardholder's private key. The DS is included in messages like the purchase request, alongside the PIMD (sent to the merchant) and OIMD (sent to the issuer), enabling consistent linkage. Verification occurs independently by the and using the shared DS. The , possessing the PIMD and OIMD, recomputes H(\text{PIMD} \Vert \text{OIMD}) and checks it against the decrypted DS using the cardholder's public key \text{PU}_c: if H(\text{PIMD} \Vert \text{OIMD}) = \text{Decrypt}(\text{DS}, \text{PU}_c), the signature is valid, confirming the linkage without revealing PI details. Similarly, the recomputes H(\text{PIMD} \Vert \text{OIMD}) and verifies against the decrypted DS, ensuring consistency with the order while protecting OI from exposure. This process relies on the cardholder's digital certificate for public key retrieval. The cryptographic basis of the dual signature employs as the for generating digests and for the , providing authenticity and . Symmetric encryption in related message envelopes uses (or triple-DES in some implementations) with 56-bit session keys for confidentiality, while asymmetric components leverage . These choices, specified in the original protocol, ensure computational efficiency and security for the era, though is now deprecated due to vulnerabilities. This mechanism's advantages include enhanced privacy by compartmentalizing data access—preventing merchants from seeing card details and issuers from viewing order specifics—while enabling efficient verification and reducing fraud risks through cryptographic binding.

Security Mechanisms

Encryption and Digital Certificates

The Secure Electronic Transaction (SET) protocol employs symmetric encryption using the Data Encryption Standard (DES) to secure message payloads, such as payment and ordering information, with 56-bit keys generated randomly for each session. These DES keys are exchanged securely through asymmetric methods to maintain confidentiality without exposing sensitive data during transmission. For asymmetric encryption, SET utilizes the algorithm to facilitate and generate digital signatures, employing a 1024-bit for enhanced in these operations. This approach allows parties to encrypt session keys and verify message authenticity, ensuring that only intended recipients can decrypt the payloads while confirming the origin of transactions. Digital certificates in SET adhere to the version 3 format, issued by trusted Certification Authorities (CAs), and include essential fields such as the subject's public key, issuer details, and validity periods to bind identities to cryptographic keys. Cardholders receive these as software-based certificates integrated into digital wallets, enabling seamless during transactions without physical hardware. Certificate validation in SET follows a hierarchical chain, starting from root CAs and progressing to intermediate and end-entity certificates, with checks against Certificate Revocation Lists (CRLs) to ensure ongoing trustworthiness during protocol handshakes. This chain incorporates brand-specific elements, such as BrandID for issuers like Visa or MasterCard, to align certificates with payment networks. Key management in SET prioritizes secure storage of private keys within cardholder and merchant wallets, protected by mechanisms like the PANSecret to prevent unauthorized access. Recovery of keys or certificates is facilitated through branded issuer processes, utilizing shared secrets and PANTokens to restore access without compromising security. These dual-signature hashes in SET further leverage the encryption framework for integrity, though the primary focus remains on certificate-bound protections.

Assurance of Integrity and Non-Repudiation

The Secure Electronic Transaction (SET) ensures the of transmitted messages by incorporating cryptographic hash functions that detect any alterations during transit. Specifically, SET employs as the primary hashing algorithm to generate 160-bit message digests, which are appended to messages such as purchase requests and responses; any modification to the original data would result in a mismatched digest upon verification by the recipient. This mechanism provides tamper-proofing across the 's message exchanges, including those between cardholders, merchants, and payment gateways, by leveraging the collision-resistant properties of to confirm that data remains unchanged from sender to receiver. Non-repudiation in SET is achieved through digital signatures that cryptographically bind parties to their actions, preventing any participant from denying involvement in a . For instance, the cardholder generates a on the Purchase Request (PReq) message using their private key, which the merchant and acquirer can verify against the cardholder's public key to confirm the and commitment to the purchase details. These signatures, formatted according to SignedData and employing encryption with hashing, ensure that once a message is signed—such as the merchant's authorization request—the signer cannot plausibly repudiate its origin or content in disputes. Digital certificates, issued by trusted certification authorities, enable this process by securely distributing public keys for signature verification. In symmetric encryption contexts within SET, Message Authentication Codes (MACs) further verify the sender's identity and message integrity after decryption. SET utilizes HMAC-SHA-1, a keyed-hash variant, to compute authentication tags on specific elements like transaction identifiers (XID) combined with shared secrets such as the CardSecret, ensuring that only authorized parties with the correct symmetric key can generate and validate these codes. This approach complements asymmetric signatures by providing efficient integrity checks in scenarios involving pre-shared keys between gateways and issuers, thereby protecting against unauthorized modifications post-encryption. Audit trails in SET support and legal enforceability by maintaining logs of all signed at key entities, including payment gateways. Gateways identifiers (e.g., XID and local IDs), signed contents, and associated signatures, creating an immutable that can be retrieved to prove the sequence and authenticity of events in a . These logs, combined with certificate revocation lists (CRLs) in signed structures, allow for forensic and non-repudiable in cases of or errors, enhancing the protocol's reliability for financial . Overall, SET provides end-to-end guarantees against common threats, including replay attacks, through the integration of timestamps and nonces in message wrappers and specific fields. Each message includes a field serving as a , alongside unique nonces like the EXNonce or Chall-C, which are random values generated per session to ensure freshness and prevent the reuse of valid messages. This combination, verified during signature checks, ensures that transactions cannot be replayed or altered without detection, upholding both and across the entire protocol flow.

Adoption Challenges and Legacy

Factors Limiting Widespread Use

The Secure Electronic Transaction (SET) protocol's intricate architecture demanded specialized software components, including digital wallets for consumers and customized payment servers for merchants, which were largely incompatible with the rudimentary web browsers prevalent in the late . This technical complexity imposed substantial implementation burdens, with the need for a robust (PKI) and digital certificates escalating costs to levels that proved prohibitive for many, especially smaller merchants lacking the resources for such infrastructure. User adoption was further hampered by the protocol's demanding requirements for cardholders, who had to obtain, install, and securely manage personal digital certificates and private keys—often involving additional hardware like readers or password-protected devices. These steps created significant friction in an era when was still emerging and users were unaccustomed to such digital security rituals, leading to low uptake despite SET's strong protections. Competition from the Secure Sockets Layer (SSL) and its successor, (TLS)—introduced in 1996 and 1999, respectively—undermined SET's viability by offering straightforward encryption for web communications without necessitating bespoke protocols or extensive PKI setups. SSL/TLS integrated seamlessly with existing , enabling quicker deployment and broader acceptance among merchants and browsers. Meanwhile, SET's reliance on dual signatures and multi-party message exchanges introduced processing overheads that slowed transactions, exacerbating scalability concerns in high-volume environments. By the early 2000s, evolving regulatory frameworks like the , launched in 2004, prioritized adaptable security measures that aligned with lightweight encryption via SSL/TLS, rendering rigid, resource-intensive protocols such as SET increasingly obsolete in compliance-driven payment ecosystems.

Impact on Contemporary Payment Systems

The Secure Electronic Transaction (SET) protocol pioneered the integration of (PKI) and digital certificates into electronic payment systems, establishing a foundation for authenticating parties and encrypting sensitive data during online transactions. By requiring digital certificates issued by trusted authorities for merchants, consumers, and payment gateways, SET ensured and , concepts that directly informed the development of standards for chip-based cards and requirements for data protection in cardholder environments. This early emphasis on PKI helped transition payment processing from insecure networks to robust, certificate-based verification, reducing risks like man-in-the-middle attacks in . SET's dual signature mechanism provided key lessons in privacy preservation by allowing the separation of payment details from order information, enabling merchants to process orders without accessing full card data and banks to authorize payments without viewing merchant-specific details. This approach influenced modern tokenization services, such as those in launched in 2014, where device-specific tokens replace actual card numbers to limit data exposure during transactions, and protocols that add authentication layers while minimizing shared information. By demonstrating how cryptographic techniques could balance with , SET's privacy innovations contributed to reduced liability for issuers and enhanced consumer trust in digital wallets. The protocol's security best practices, particularly the strict compartmentalization of payment and order data, have become integral to contemporary systems compliant with regulations like the EU's (GDPR), which mandates minimization and purpose limitation to protect personal information. SET's model of encrypted silos for transaction elements prefigured standards where processors handle separately from systems, preventing unnecessary and supporting containment in multi-party ecosystems. These practices are now embedded in PCI-compliant architectures, ensuring that only essential information is exchanged to mitigate risks from leaks. Although SET itself saw no active deployment by 2025, its architectural elements evolved into widely adopted protocols, including HTTPS (via TLS) for secure data transmission and EMV 3-D Secure for risk-based authentication in card-not-present scenarios. These successors simplified SET's complex flows while retaining its core principles of encryption and verification, enabling seamless integration in global payment networks. In academia, SET remains a staple in cybersecurity curricula as a case study in forward-thinking yet over-engineered design, illustrating the trade-offs between comprehensive security and practical adoption in evolving digital economies.

References

  1. [1]
    Secure Electronic Transaction (SET): Definition and How It Works
    Secure electronic transaction was an early communications protocol that was developed in 1996 and used by e-commerce websites to secure electronic debit and ...
  2. [2]
    [PDF] Secure Electronic Transactions (SET) - GIAC Certifications
    Nov 2, 2000 · SET is a messaging protocol designed to provide a mechanism to secure electronic credit card payments over open, unsecured networks such as the ...
  3. [3]
    [PDF] Secure Electronic Transactions (SET)
    This paper investigates how SET was predicted, designed, and rejected by e-commerce end-users. II. SECURE ELECTRONIC TRANSACTIONS. SET is a security protocol ...Missing: history | Show results with:history<|control11|><|separator|>
  4. [4]
    Electronic Commerce Time Line
    June 23, 1995 Visa and MasterCard announce plans to develop a protocol for credit card payments over the Internet. Visa's alliance with Microsoft, and ...Missing: history | Show results with:history
  5. [5]
    What is Secure Electronic Transaction (SET)? - TechTarget
    Sep 30, 2021 · Secure Electronic Transaction (SET) is a system and electronic protocol to ensure the integrity and security of transactions conducted over the internet.
  6. [6]
    [PDF] SET Book 1: Business Description - Maithean
    May 31, 1997 · Visa and MasterCard have jointly developed the SET Secure Electronic Transaction protocol as a method to secure payment card transactions ...Missing: venture | Show results with:venture<|control11|><|separator|>
  7. [7]
    First U.S. SET trials under way - CNET
    Jul 17, 1997 · First U.S. SET trials under way. Two major banks begin testing the SET protocol for secure credit card transactions on the Net.Missing: initial | Show results with:initial
  8. [8]
    Secure electronic transactions (SET) in e-commerce - Peter Davies
    ... SET (secure electronic transaction) is to introduce a mechanism for compromise. ... Every CA has a list of revoked or withdrawn ... SET protocol):. Browsing ...
  9. [9]
    [PDF] 17.3. Secure Electronic Transaction
    SET is an open encryption and security specification designed to protect credit card transactions on the Internet. The current version, SETv1, emerged from a ...
  10. [10]
    Understanding the Dotcom Bubble: Causes, Impact, and Lessons
    The dotcom bubble burst when capital began to dry up. In the years preceding the bubble, record-low interest rates, the adoption of the Internet, and interest ...Missing: protocol | Show results with:protocol
  11. [11]
    [PDF] Security of Electronic Payment Systems: A Comprehensive Survey
    Jan 12, 2017 · This comprehensive survey deliberated over the security of electronic payment systems. In our research,.Missing: numbers | Show results with:numbers<|separator|>
  12. [12]
    [PDF] SET Book 2: Programmer's Guide - Maithean
    May 31, 1997 · Page 1. PC. SET Secure Electronic Transaction. Specification. Book 2: Programmer's Guide. Version 1.0. May 31, 1997. Page 2. Book 2: ...
  13. [13]
    Secure Electronic Transaction Protocol
    BOOK2: Programmer's Guide - This is another download, and like BOOK1, this document is also extremely detailed and lengthy serving as a programmer's guide ...Missing: PDF | Show results with:PDF
  14. [14]
    Secure Electronic Transaction (SET) Protocol - GeeksforGeeks
    Jun 20, 2024 · The SET protocol was supported in development by major organizations like Visa, Mastercard, and Microsoft which provided its Secure Transaction ...Missing: history | Show results with:history
  15. [15]
    [PDF] SET Formal Protocol Definition - Maithean
    May 31, 1997 · Visa and MasterCard have jointly developed the SET Secure Electronic Transaction protocol as a method to secure payment card transactions ...
  16. [16]
    [PDF] Verifying the SET Purchase Protocols
    The Secure Electronic Transaction (SET) protocol has been proposed by a consortium of credit card companies and software corporations to guarantee.Missing: decline | Show results with:decline
  17. [17]
    [PDF] SET: A QUESTIONABLE SECURITY PROTOCOL - SciTePress
    Abstract: The Secure Electronic Transaction (SET) was developed by Visa and MasterCard in 1997. The SET is a protocol that is theoretically perfect with ...Missing: initial | Show results with:initial
  18. [18]
    PCI DSS History: How the Standard Came To Be - Secureframe
    Oct 2, 2024 · PCI DSS was introduced in December 2004. It was developed by the major credit card companies (Visa, MasterCard, American Express, Discover, and ...
  19. [19]
    Payment Card Data Security Standards (PCI DSS)
    PCI DSS provides a baseline of technical and operational requirements designed to protect payment account data.More information & resources · Here · Secure Software Lifecycle...
  20. [20]
    Art. 5 GDPR – Principles relating to processing of personal data
    Rating 4.6 (10,116) Art 5 GDPR principles include: lawfulness, fairness, transparency; purpose limitation; data minimization; accuracy; storage limitation; integrity and ...Lawfulness · Recital 39 · Article 89Missing: separation | Show results with:separation