Browse Definitions :
Definition

autofill

Contributor(s): Matthew Haughn

Autofill, also called autocomplete, is a software feature that automatically inserts previously-entered personal information into web form fields for the user’s convenience. Autofill is often used by browsers, word processors and password managers to reduce the effort required to provide information that is frequently requested. Autofill is typically saved locally on the computing device it is used on. Popular fields of information completed by autofill include name, date of birth, age, address, credit card or banking information.

Autofill often organizes previously submitted content based on the field where users would begin entering information, such as a person’s name or organization. For example, if entering shipping information for an online purchase, the user can begin entering a name and the associated information will populate the remaining fields automatically, including a street address, town, state and zip code. 

As with many convenience features, there is a security risk inherent in the use of autofill. For example, a known hack employs hidden text boxes after the name field that can be made to autofill almost any data a user has previously entered. Most browsers allow users to disable the autofill feature to avoid such vulnerabilities.

This was last updated in January 2019

Continue Reading About autofill

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

SearchSecurity

  • Malwarebytes software

    Malwarebytes is a cross-platform anti-malware program that detects and removes malware and other rogue software.

  • Transport Layer Security (TLS)

    Transport Layer Security (TLS) is a protocol that provides authentication, privacy, and data integrity between two communicating ...

  • van Eck phreaking

    Van Eck phreaking is a form of electronic eavesdropping that reverse engineers the electromagnetic fields (EM fields) produced by...

SearchHealthIT

SearchDisasterRecovery

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

  • business continuity software

    Business continuity software is an application or suite designed to make business continuity planning/business continuity ...

  • business continuity policy

    Business continuity policy is the set of standards and guidelines an organization enforces to ensure resilience and proper risk ...

SearchStorage

  • solid-state storage

    Solid-state storage (SSS) is a type of computer storage media made from silicon microchips. SSS stores data electronically ...

  • persistent storage

    Persistent storage is any data storage device that retains data after power to that device is shut off. It is also sometimes ...

  • computational storage

    Computational storage is an information technology (IT) architecture in which data is processed at the storage device level to ...

Close