CIPT Glossary Flashcards
(285 cards)
What is Abstracting data?
Abstraction limits the level of detail at which personal information is processed. Reducing the precision of data, while retaining the accuracy and suitability for its purpose, may yield the same desired results for an organization collecting personal information.
- Grouping aggregates data into correlated sets rather than processing it individually.
- Summarizing puts detailed information into categories based on more abstract attributes.
- Perturbing adds approximation or “noise” to data to reduce its specificity.
What is an Access Control Entry (ACE)?
An element in an access control list (ACL) that controls, monitors, or records access to an object by a specified user.
What is an Access Control List (ACL)?
A list of access control entries (ACE) that apply to an object, controlling or monitoring access by specified users.
What does Accountability mean?
The implementation of appropriate technical and organisational measures to ensure and be able to demonstrate that the handling of personal data is performed in accordance with relevant law, an idea codified in the EU General Data Protection Regulation and other frameworks, including APEC’s Cross Border Privacy Rules.
Traditionally, accountability has been a fair information practices principle, that due diligence and reasonable steps will be undertaken to ensure that personal information will be protected and handled consistently with relevant law and other fair use principles.
What is Active Data Collection?
Data subject is aware that collection is taking place and takes an action to enable the collection, ex. Filling out and submitting an online form
What is an Adequate Level of Protection?
A transfer of personal data from the EU to a third country may occur if the European Commission has determined that the country ensures adequate protection.
(a) the rule of law, respect for human rights and fundamental freedoms, both general and sectoral legislation, data protection rules, professional rules and security measures, effective and enforceable data subject rights and effective administrative and judicial redress for the data subjects whose personal data is being transferred;
(b) the existence and effective functioning of independent supervisory authorities with responsibility for ensuring and enforcing compliance with the data protection rules;
(c) the international commitments the third country or international organisation concerned has entered into in relation to the protection of personal data.
What is the Advanced Encryption Standard?
An encryption algorithm for security-sensitive non-classified material, selected by the U.S. Government in 2001.
What is defined as Adverse Action under the Fair Credit Reporting Act?
Any business, credit, or employment actions affecting consumers that have a negative impact, such as denying credit or employment.
No adverse action occurs in a credit transaction where the creditor makes a counteroffer that is accepted by the consumer. Such an action requires that the decision maker furnish the recipient of the adverse action with a copy of the credit report leading to the adverse action.
What is the Agile Development Model?
A software design process that incorporates new system requirements during creation, focusing on specific portions of a project.
What is an Algorithm?
A computational procedure or set of instructions designed to perform a specific task or solve a particular problem.
What is Anonymization?
The process of altering identifiable data so it can no longer be related back to an individual.
Among many techniques, there are three primary ways that data is anonymized.
- Suppression is the most basic version of anonymization and it simply removes some identifying values from data to reduce its identifiability.
- Generalization takes specific identifying values and makes them broader, such as changing a specific age (18) to an age range (18-24).
- Noise addition takes identifying values from a given data set and switches them with identifying values from another individual in that data set.
Note that all of these processes will not guarantee that data is no longer identifiable and have to be performed in such a way that does not harm the usability of the data.
What is Anonymous Information?
Data that is not related to an identified or identifiable natural person and cannot be re-identified.
What does Anthropomorphism mean?
Attributing human characteristics or behaviors to non-human objects.
What are Anti-discrimination Laws?
Laws indicating special classes of personal data that are subject to more stringent data protection regulations.
What is Application or field encryption?
The ability to encrypt specific fields of data, particularly sensitive information like credit card numbers.
What are Application-Layer Attacks?
Attacks that exploit flaws in network applications installed on servers, such as web browsers and email servers. Regularly applying patches and updates to applications may help prevent such attacks.
What is Appropriation in data privacy?
Using someone’s identity for another person’s purposes.
What is Asymmetric Encryption?
A form of data encryption that uses two separate but related keys to encrypt data. The system uses a public key, made available to other parties, and a private key, which is kept by the first party. Decryption of data encrypted by the public key requires the use of the private key; decryption of the data encrypted by the private key requires the public key.
What is Attribute-Based Access Control?
An authorization model that provides dynamic access control by assigning attributes to the users, the data, and the context in which the user requests access (also referred to as environmental factors) and analyzes these attributes together to determine access.
For example, a bank employee might only be able to approve large transactions if they are a manager, are accessing the system from a secure location, and are working during business hours.
What is an Audit Trail?
A chain of electronic activity or paperwork used to monitor, track, or validate an activity.
What is Authentication?
The process by which an entity determines whether another entity is who it claims to be.
What is Authorization in information security?
The process of determining if an end user is permitted access to a desired resource.
Authorization criteria may be based upon a variety of factors such as organizational role, level of security clearance, applicable law or a combination of factors. When effective, authentication validates that the entity requesting access is who or what it claims to be.
What is Automated decision-making?
The process of making a decision by technological means without human involvement.
What is Basel III?
A set of reform measures to strengthen the regulation and risk management of the banking sector.