Chapter 2: Engineering and Privacy Flashcards
(107 cards)
What is the role of Project Managers in the Privacy ecosystem?
Ensure that adequate resources are available and that team members communicate effectively
What is the role of Marketing and Sales in the Privacy ecosystem?
Work with customers to establish new requirements
What is the role of Lawyers in the Privacy ecosystem?
Track regulatory issues
What is the role of Requirements Engineers in the Privacy ecosystem?
Collect, analyze and manage requirements
What is the role of Designers in the Privacy ecosystem?
Translate software requirements into an architecture or design
What is the role of Programmers in the Privacy ecosystem?
Translate software design into source code
What is the role of Testers in the Privacy ecosystem?
Validate that the software conforms to the requirements
What is the role of Users in the Privacy ecosystem?
Operate or interact with the software
What is the role of Administrators in the Privacy ecosystem?
Install and maintain the software
What is the role of the Privacy Engineer in the Privacy ecosystem?
Is the Privacy Area Specialist
Serves as a repository of knowledge and works to tailor this knowledge for the different stakeholders
What are the responsibilities of the Privacy Engineer in the Privacy ecosystem?
Collect critical regulatory requirements from lawyers
Validate that marketing requirements are consistent with laws and social norms
Meet with designers to discuss best practices when translating requirements into design specifications
Collect user feedback and monitor privacy blogs, mailing lists and newspapers for new privacy incidents
Develop a community of practice
Name the 6 activities of software developers (regardless of the process used)
Requirements Engineering Design Implementation Testing Deployment Maintenance
Name 2 privacy lifecycle models
Privacy Management Reference Model (PMRM)
PReparing Industry to Privacy-by-design by supporting its Application in REsearch (PRIPARE)
Name 2 privacy risk assessment methods
LINDDUN threat modeling method
Privacy Risk Assessment Methodology (PRAM)
What is a Defect in software engineering?
A flaw in the requirements, design or implementation that can lead to a fault
What is a Fault in software engineering?
An incorrect step, process or data definition in a computer program
What is an Error in software engineering?
The difference between a computed, observed or measured value or condition and the true, specified or theoretically correct value or condition
What is a Failure in software engineering?
The inability of a system or component to perform its required functions within specified performance requirements
What is a Harm in software engineering?
The actual or potential ill effect or danger to an individual’s personal privacy, sometimes called a hazard
What is a Functional Violation of Privacy?
When a system cannot perform a necessary function to ensure individual privacy
Provide an example of a Functional Violation of Privacy
When PI is disclosed to an unauthorized third party
Defect: lines of computer code that do not correctly check that an access attempt is properly authorized
Fault: the execution of that source code
Error: unauthorized access
Failure: unauthorized third party access
Define the term Risk
A potential adverse impact along with the likelihood that this impact will occur
How are risks calculated?
Probability x impact
What are the 4 ways of managing risk?
Accept
Transfer
Mitigate
Avoid