In general, the term is used to refer to an entity that deliberately attempts to breach security, confidentiality and/or privacy.
In scenarios describing a breach of informational privacy, the adversary is conceived as a person who desires to gain access to information to which they are not entitled, whose motives are malicious. Scenarios focus on the skills and computational resources the adversary would need to compromise a system. Also called a motivated intruder, opponent, enemy, snooper or attacker.
See also: INTRUDER
Information Commissioner’s Office, 2012. Anonymisation: managing data protection risk code of practice. https://ico.org.uk/media/for-organisations/documents/1061/anonymisation-code.pdf.
Information Commissioner’s Office, 2012. Anonymisation: managing data protection risk code of practice. https://ico.org.uk/media/for-organisations/documents/1061/anonymisation-code.pdf.