diff --git a/doc/src/sgml/ddl.sgml b/doc/src/sgml/ddl.sgml
index 61bf671c9f6a777611ddeb4860c8a2e3ca2a264e..052cf25ef3b208fb600b71883d92fc31f468fbe4 100644
--- a/doc/src/sgml/ddl.sgml
+++ b/doc/src/sgml/ddl.sgml
@@ -1512,20 +1512,11 @@ REVOKE ALL ON accounts FROM PUBLIC;
   <title>Row Security Policies</title>
 
   <indexterm zone="ddl-rowsecurity">
-   <primary>rowsecurity</primary>
+   <primary>row security</primary>
   </indexterm>
 
   <indexterm zone="ddl-rowsecurity">
-   <primary>rls</primary>
-  </indexterm>
-
-  <indexterm>
-   <primary>policies</primary>
-   <see>policy</see>
-  </indexterm>
-
-  <indexterm zone="ddl-rowsecurity">
-   <primary>POLICY</primary>
+   <primary>policy</primary>
   </indexterm>
 
   <para>
diff --git a/doc/src/sgml/ref/create_policy.sgml b/doc/src/sgml/ref/create_policy.sgml
index 7b4f9438cd517c70260ba4350431b90607b8fefd..a4043f629dbdf3b012fafe40e52e020d2003e0da 100644
--- a/doc/src/sgml/ref/create_policy.sgml
+++ b/doc/src/sgml/ref/create_policy.sgml
@@ -112,7 +112,7 @@ CREATE POLICY <replaceable class="parameter">name</replaceable> ON <replaceable
    the user running the overall query.  Therefore, users who are using a given
    policy must be able to access any tables or functions referenced in the
    expression or they will simply receive a permission denied error when
-   attempting to query the RLS-enabled table.  This does not change how views
+   attempting to query the table that has row-level security enabled.  This does not change how views
    work, however.  As with normal queries and views, permission checks and
    policies for the tables which are referenced by a view will use the view
    owner's rights and any policies which apply to the view owner.
diff --git a/doc/src/sgml/ref/create_role.sgml b/doc/src/sgml/ref/create_role.sgml
index ea26027511458b362c892c60f88c556c9eb6e9d0..f4a176bff3fe490ad7cc23079350e17f1ae5de9a 100644
--- a/doc/src/sgml/ref/create_role.sgml
+++ b/doc/src/sgml/ref/create_role.sgml
@@ -196,7 +196,7 @@ CREATE ROLE <replaceable class="PARAMETER">name</replaceable> [ [ WITH ] <replac
       <term><literal>NOBYPASSRLS</literal></term>
       <listitem>
        <para>
-        These clauses determine whether a role is allowed to bypass row-security
+        These clauses determine whether a role is allowed to bypass row-level security (RLS)
         policies.  A role having the <literal>BYPASSRLS</literal> attribute will
         be allowed to bypass row-security policies by setting
         <literal>row_security</literal> to