Chapter 1: Foundational Principles Flashcards
What is the defintion of risk
a potential threat or issue, along with the impact the threat or issue could cause, and the likelihood that it will occur
What is it important to identify risk early privacy models and frameworks
assist with the development of specific administrative, operational and technical measures to manage these risks
What is the Legal compliance model in privacy risk models
Statutory and regulatory mandates prescribe aspects of systems that handle personal information
To ensure compliance, both business process and system owners must understand the specific obligations and prohibitions their organizations are subject to and must work with their system design teams to relay those requirements, as well as identify and address any threats and vulnerabilities associated with the technologies that will be used.
What is the Fair Information Practice Principles model in privacy risk models
Fair Information Practice Principles (also referred to as FIPPs) are a set of long-standing privacy values that exist in various forms globally. FIPPs work alongside compliance models to mandate: notice, choice, and consent; access to information; controls on information; and how information is managed.
What is the Nissenbaum’s contextual integrity model in privacy risk models
Helen Nissenbaum’s Contextual Integrity—Privacy can be expressed as norms that should govern information access. Norms are domain specific; for example, the norms governing banking information will differ from the norms governing medical information.
Contextual integrity as maintaining personal information in alignment with the informational norms that apply to a particular context.
What is the concept of integrity
- actors: the senders and receivers of personal information attributes: the types of information being shared
- transmission principles: those that govern the flow of information
Give a example of Nissenbaum’s contextual integrity model
a patient visits a doctor with complaints (actors) and an x-ray is taken to determine the cause of their discomfort (attribute). The doctor shares results with a specialist to determine a course of action ( transmission)
Whats a challenge faced in the Nissenbaum’s contextual integrity model
considering context is that these norms do not generally have a preexisting reference point for privacy risks.
What is the Calo’s harms dimensions model in privacy risk models
Ryan Calo identified two dimensions of privacy harm: objective and subjective.
Objective harm occurs when privacy has been violated and direct harm is known to exist. It involves the forced or unanticipated use of personal information and is generally measurable and observable.
Subjective harm exists when an individual expects or perceives harm, even if the harm is not observable or measurable.
What is the relationship between objective harm and subjective harm in Calo’s model
analogous to the legal relationship between assault and battery.
subjective privacy harms amount to discomfort and other negative feelings, while objective privacy harms involve actual adverse consequences
what is the difference between objective harm and subjective harm in Calo’s model
Objective harms are measurable and observable, wherein a person’s privacy has been violated and a direct harm is known to exist. Subjective harms exist without an observable or measurable harm, but where an expectation of harm exists. Subjective harms may have the same impact on individual privacy because the individual takes similar steps to protect themselves
Subjective harm impacts individuals on a psychological and behavioral level, while objective harms can result in loss of business opportunity, consumer trust or even social detriment to the individual..
What is the The National Institute of Standards and Technology (NIST) model in privacy risk models
The National Institute of Standards and Technology (NIST) provides standards, guidelines and best practices for managing cybersecurity-related risks, including the Risk Management Framework, the Cybersecurity Framework, and the Privacy Framework.
The NIST Privacy Framework is a voluntary risk management tool alongside the NIST Cybersecurity Framework.
What is the The National Initiative for Cybersecurity Education’s Cybersecurity Workforce Framework in privacy risk models
o NICE frameworks:
The National Initiative for Cybersecurity Education’s Cybersecurity Workforce Framework (NICE Framework) is a nationally-focused resource published by NIST, which categorizes and describes cybersecurity work.
applies to all sectors
What is the Factors Analysis in Information Risk (FAIR) model in privacy risk models
The Factors Analysis in Information Risk (FAIR) model breaks down risk by its constituent parts, then further breaks down those parts to find factors that estimate the overall risk.
FAIR constructs a basic framework that breaks risk into the frequency of action and magnitude of the violations.
What does privacy by design based on?
• seven principles based on proactively incorporating privacy into all levels of operations organically, rather than viewing it as a trade off or something to add to a system, product, service or process after it has been built.
what is the Principle 1: Proactive, Not Reactive Preventative, Not Remedial Privacy
protection must be a forethought in any technology system, product, process or service development
Making privacy a consideration in the design phase—instead of reacting to privacy harms as they arise in the future—helps to mitigate potential privacy risks and violations.
Thinking about privacy when designing a system, product, service or process helps practitioners design these things with privacy considerations built in instead of trying to figure out how to address them in a design that may be less flexible when privacy is considered later
what is the Principle 2: Privacy as the Default Setting
-the default of a technology ecosystem should be that of preserving individuals’ privacy. Said another way, privacy is achieved automatically without the individual having to take explicit action.
what is the o Principle 3: Privacy Embedded into Design
Privacy should be embedded into the design and architecture of technology systems and business practices such that a system cannot operate without privacy-preserving functionality.
This principle suggests that privacy is not only included in the design of a program but is integral to the design.
what is the o Principle 4: Full Functionality- Positive Sum, Not Zero
Understanding the organization’s need to use and protect personal information aids privacy technologists in designing systems that still allow for desired performance and functionality while protecting information privacy
what is the Principle 5: End to End security
full life cycle Protection-Consideration of personal information at every stage in the data life cycle—collecting, processing, storing, sharing and destroying—is essential in any system design
what is the Principle 6: Visibility and Transparency
Information that communicates how the organization uses, shares, stores and deletes personal information should not be misleading, confusing or obscured.
Visibility and transparency in privacy notices not only helps reduce privacy risks but also allows individuals to make informed decisions about their own information and gives them choice when considering whether to use a service and when deciding what or how much they wish to disclose
what is the o Principle 7: Respect for User Privacy; Keep it User Centric
privacy technologists and organizations should keep individuals’ needs, and the risks to them, at the forefront when developing data ecosystems.
What is value sensitive design
• Value-sensitive design is a design approach that accounts for moral and ethical values and should be considered when assessing the overall “value” of a design these values might include things such as trust, fairness, informed consent, courtesy or freedom from bias.
• Value-sensitive design methods help to systematically assess the values at play in relation to specific technologies and respective stakeholders.
• The goal of value-sensitive design is that stakeholders should see their values reflected in the final design
o value sensitive design also focuses on the co-evolution of technologies and social structures. o this means considering the interplay of technological solutions, regulatory solutions, and organizational solutions when trying to resolve identified value tensions.
What is the goal of value sensitive design
that stakeholders should see their values reflected in the final design