Browse Definitions :
Definition

autofill

Autofill, also called autocomplete, is a software feature that automatically inserts previously-entered personal information into web form fields for the user’s convenience. Autofill is often used by browsers, word processors and password managers to reduce the effort required to provide information that is frequently requested. Autofill is typically saved locally on the computing device it is used on. Popular fields of information completed by autofill include name, date of birth, age, address, credit card or banking information.

Autofill often organizes previously submitted content based on the field where users would begin entering information, such as a person’s name or organization. For example, if entering shipping information for an online purchase, the user can begin entering a name and the associated information will populate the remaining fields automatically, including a street address, town, state and zip code. 

As with many convenience features, there is a security risk inherent in the use of autofill. For example, a known hack employs hidden text boxes after the name field that can be made to autofill almost any data a user has previously entered. Most browsers allow users to disable the autofill feature to avoid such vulnerabilities.

This was last updated in January 2019

Continue Reading About autofill

SearchCompliance
  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

SearchSecurity
  • social engineering

    Social engineering is an attack vector that relies heavily on human interaction and often involves manipulating people into ...

  • distributed denial-of-service (DDoS) attack

    A distributed denial-of-service (DDoS) attack is one in which multiple compromised computer systems attack a target, such as a ...

  • password cracking

    Password cracking is the process of using an application program to identify an unknown or forgotten password to a computer or ...

SearchHealthIT
SearchDisasterRecovery
  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

SearchStorage
  • storage security

    Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted ...

  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud data management

    Cloud data management is a way to manage data across cloud platforms, either with or instead of on-premises storage.

Close