Browse Definitions :
Definition

autofill

Contributor(s): Matthew Haughn

Autofill, also called autocomplete, is a software feature that automatically inserts previously-entered personal information into web form fields for the user’s convenience. Autofill is often used by browsers, word processors and password managers to reduce the effort required to provide information that is frequently requested. Autofill is typically saved locally on the computing device it is used on. Popular fields of information completed by autofill include name, date of birth, age, address, credit card or banking information.

Autofill often organizes previously submitted content based on the field where users would begin entering information, such as a person’s name or organization. For example, if entering shipping information for an online purchase, the user can begin entering a name and the associated information will populate the remaining fields automatically, including a street address, town, state and zip code. 

As with many convenience features, there is a security risk inherent in the use of autofill. For example, a known hack employs hidden text boxes after the name field that can be made to autofill almost any data a user has previously entered. Most browsers allow users to disable the autofill feature to avoid such vulnerabilities.

This was last updated in January 2019

Continue Reading About autofill

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance framework

    A compliance framework is a structured set of guidelines that details an organization's processes for maintaining accordance with...

SearchSecurity

  • Trojan horse (computing)

    In computing, a Trojan horse is a program downloaded and installed on a computer that appears harmless, but is, in fact, ...

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

  • DNS over HTTPS (DoH)

    DNS over HTTPS (DoH) is a relatively new protocol that encrypts domain name system traffic by passing DNS queries through a ...

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification and is used in internally mounted ...

  • kilobyte (KB or Kbyte)

    A kilobyte (KB or Kbyte) is a unit of measurement for computer memory or data storage used by mathematics and computer science ...

  • virtual memory

    Virtual memory is a memory management capability of an operating system (OS) that uses hardware and software to allow a computer ...

Close