TERMIUM Plus®

From: Translation Bureau

On social media

Consult the Government of Canada’s terminology data bank.

IMPERSONATION [11 records]

Record 1 2026-01-08

English

Subject field(s)
  • Offences and crimes
  • Electoral Systems and Political Parties

French

Domaine(s)
  • Infractions et crimes
  • Systèmes électoraux et partis politiques
OBS

Le fait de porter sans droit le nom d'autrui.

Spanish

Campo(s) temático(s)
  • Infracciones y crímenes
  • Sistemas electorales y partidos políticos
Save record 1

Record 2 2025-03-24

English

Subject field(s)
  • Theatre and Opera
  • Variety Shows and Circuses
DEF

A woman who dresses as a man and impersonates male characteristics for theatrical purposes.

CONT

... the male impersonator attempts to produce a plausible performance of maleness as the whole of her act ...

OBS

Male impersonation has been a theatrical genre for at least two hundred years, but the drag king is a recent phenomenon.

French

Domaine(s)
  • Théâtre et Opéra
  • Spectacles de variétés et Cirque

Spanish

Campo(s) temático(s)
  • Teatro y Ópera
  • Espectáculos de variedades y Circo
CONT

[La] novela de corte almodovariano titulada Tesis de una domesticación [...] narra la historia de una actriz travesti que adopta a un niño seropositivo junto a su pareja homosexual.

Save record 2

Record 3 2019-07-12

English

Subject field(s)
  • Human Behaviour
  • Collaborative and Social Communications
DEF

On social media, the act of pretending to be someone else with the intent of deceiving other users.

French

Domaine(s)
  • Comportement humain
  • Communications collaboratives et sociales
DEF

Dans les médias sociaux, action de prétendre être une autre personne pour tromper les utilisateurs.

Spanish

Campo(s) temático(s)
  • Comportamiento humano
  • Comunicaciones colaborativas y sociales
DEF

Ocurre cuando una persona se hace pasar por otra ante un tercero, normalmente con una finalidad ilegal o con la intención de causar un perjuicio.

Save record 3

Record 4 2016-02-03

English

Subject field(s)
  • IT Security
CONT

Authentication threats include the following types of attacks : online guessing, replay, eavesdropping, session hijacking, verifier impersonation/phishing, man-in-the-middle.

French

Domaine(s)
  • Sécurité des TI
CONT

Les menaces à l'authentification comprennent les types d'attaque suivants : la tentative de deviner en ligne, la réinsertion, l'écoute clandestine, le détournement de session, l'usurpation de l'identité du vérificateur/l'hameçonnage, l'attaque de l'intercepteur.

Spanish

Save record 4

Record 5 2014-11-10

English

Subject field(s)
  • Cosmetology
  • Performing Arts (General)
DEF

Prepare(an actor) for the impersonation of a character by dressing him in an appropriate costume and disguising his features by means of false hair, cosmetics, etc.

French

Domaine(s)
  • Cosmétologie
  • Arts du spectacle (Généralités)
CONT

[...] un comédien de longue expérience peut lui-même se maquiller, c'est-à-dire transformer l'aspect de son visage pour l'adapter aux nécessités de l'éclairage et à l'expression de son rôle.

Spanish

Campo(s) temático(s)
  • Productos de belleza
  • Artes escénicas (Generalidades)
DEF

Aplicar productos cosméticos a la cara de una persona para embellecerla o caracterizarla.

Save record 5

Record 6 2014-06-25

English

Subject field(s)
  • Criminology
  • Offences and crimes
  • Protection of Life
CONT

Typically identity thieves filch key pieces of personal data-credit card numbers or social insurance numbers-then commit various crimes by impersonation. Identity thieves also hang around banking machines to relieve the unwary of their bank account access numbers. They redirect mail to capture credit cards and other personal information and even paw through garbage in search of loan applications or employee files.

CONT

Identity thieves may also present or create documents such as birth certificates or immigration documents to obtain benefits such as health care, education, social assistance and public pensions.

French

Domaine(s)
  • Criminologie
  • Infractions et crimes
  • Sécurité des personnes
CONT

Les voleurs d'identité peuvent aussi, à l'aide de documents authentiques ou forgés comme un extrait de naissance ou document d'immigration, recevoir diverses prestations d'aide en matière de santé ou d'éducation, des prestations d'assistance sociale ou des pensions de l'État.

Spanish

Campo(s) temático(s)
  • Criminología
  • Infracciones y crímenes
  • Protección de las personas
Save record 6

Record 7 2014-05-05

English

Subject field(s)
  • Telecommunications Transmission
  • IT Security
DEF

Unauthorized interception of information-bearing emanations.

CONT

Eavesdropping allows a cracker to make a complete transcript of network activity. As a result, a cracker can obtain sensitive information, such as passwords, data, and procedures for performing functions. It is possible for a cracker to eavesdrop using wiretapping, eavesdropping by radio and eavesdropping via auxiliary ports on terminals ... It is also possible to eavesdrop using software that monitors packets sent over the network. In most cases, it is difficult to detect that a cracker is eavesdropping.

CONT

What are the basic security risks of Internet communications? Sending data across a network involves three basic security risks : Eavesdropping : intermediaries listen in on private conversation(one computer talking to another). Manipulation... Impersonation...

OBS

eavesdropping: term and definition standardized by ISO/IEC [International Electrotechnical Commission].

French

Domaine(s)
  • Transmission (Télécommunications)
  • Sécurité des TI
DEF

Interception non autorisée d'émissions porteuses d'informations.

OBS

écoute clandestine; interception illicite : termes et définition normalisés par l'ISO/CEI [Commission électrotechnique internationale].

Spanish

Campo(s) temático(s)
  • Transmisión (Telecomunicaciones)
  • Seguridad de IT
DEF

Vigilancia intencional de datos mediante la voz, el fax, el correo-e, los teléfonos móviles, los mensajes electrónicos, etc., frecuentemente con fines perversos, que permite al que escucha [a escondidas] interceptar y registrar el intercambio de mensajes entre un cliente y un servidor.

Save record 7

Record 8 2012-06-08

English

Subject field(s)
  • Electoral Systems and Political Parties
  • Special-Language Phraseology
CONT

Every person is guilty of an offence that is an illegal practice who...(c) being a candidate or an official agent of a candidate, wilfully contravenes paragraph 43(b)(impersonation of revising agent)...

French

Domaine(s)
  • Systèmes électoraux et partis politiques
  • Phraséologie des langues de spécialité
CONT

Est coupable d'une infraction constituant une manœuvre frauduleuse : [...] c) le candidat ou l'agent officiel d'un candidat qui contrevient volontairement à l'alinéa 43b) (se faire passer pour un agent réviseur) [...]

Spanish

Campo(s) temático(s)
  • Sistemas electorales y partidos políticos
  • Fraseología de los lenguajes especializados
Save record 8

Record 9 2011-06-07

English

Subject field(s)
  • IT Security
DEF

The pretense by an entity to be a different entity in order to gain unauthorized access.

OBS

masquerading; mimicking; impersonation; masquerade : terms and definition standardized by ISO.

French

Domaine(s)
  • Sécurité des TI
DEF

Fait de prétendre, pour une entité, d'être une autre entité pour obtenir un accès non autorisé.

OBS

déguisement; usurpation d'identité : termes et définition normalisés par l'ISO.

Spanish

Campo(s) temático(s)
  • Seguridad de IT
Save record 9

Record 10 2003-05-08

English

Subject field(s)
  • IT Security
DEF

An attempt to gain access to a system by posing as an authorized user.

French

Domaine(s)
  • Sécurité des TI

Spanish

Campo(s) temático(s)
  • Seguridad de IT
Save record 10

Record 11 1994-09-12

English

Subject field(s)
  • IT Security
DEF

An attempt to gain access to a computer system by posing as an authorized user after obtaining passwords or other authorization items through wiretapping or other means.

French

Domaine(s)
  • Sécurité des TI
DEF

Usurpation de l'identité d'un utilisateur autorisé après obtention, en accès clandestin, de son mot de passe ou autres types d'autorisation pour accéder à un système informatique.

Spanish

Save record 11

Copyright notice for the TERMIUM Plus® data bank

© Public Services and Procurement Canada, 2026
TERMIUM Plus®, the Government of Canada's terminology and linguistic data bank
A product of the Translation Bureau

Features

GCtranslate (available on the Government of Canada network only)

Use this artificial intelligence prototype to translate Government of Canada content up to and including Protected B. Available to employees of selected departments and agencies only.

Writing tools

The Language Portal’s writing tools have a new look! Easy to consult, they give you access to a wealth of information that will help you write better in English and French.

Glossaries and vocabularies

Access Translation Bureau glossaries and vocabularies.

Date Modified: