2These terms are borrowed from the field of data encoding technology. Lossy data encoding algorithms can, and often do, degrade the quality of the data to which they are applied; likewise, lossy permissions can, and often do, degrade the security of the information to which they are applied.