Foundational principles of Privacy in Technology Flashcards

(72 cards)

1
Q

Data Lifecycle Components (5)

A
Collection
Use
Disclosure
Retention
Destruction
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The data lifecycle is shaped by…

A

privacy objectives and business practices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

First-party data

A

Individual provides their PI directly to collector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Individual’s data stream behavior is observed through their activities (searches, web visits, etc.)

A

Surveillance data collection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Repurposing/Secondary Use

A

Data used for purpose other than that for which it was previously collected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Third-party collection

A

Previously collected information is transferred to a third party

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Active collection

A

Data subject is aware of collection and takes action to enable collection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Passive collection

A

Occurs without action of the participant and isn’t always obvious

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Explicit consent

A

Requires user to take an action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Implied consent

A

Does not require a user to take an action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

True or False: Implied consent is valid

A

Mostly true: It is valid in some territories

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Is implied consent valid in the EU?

A

No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Explicit or Implied Consent: Clicking a button that acknowledges a privacy notice has been received.

A

Explicit consent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Explicit or Implied Consent: Users must choose to opt in or out of collection of information before using a website

A

Explicit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Privacy notice (aka privacy statement)

A

Statement made to data subjects that describes how PI is collected, used, retained, and disclosed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Repurposing or disclosing data in unstated ways causes…

A

Harms and may be illegal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What should happen before data is repurposed or disclosed in new contexts?

A

It should be assessed for risks.
Update notices
Request consent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What determines how long data can be retained?

A

Legal and regulatory requirements

Applicable standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What should be assessed before data is moved offsite?

A

Risks and benefits

Security of transfer mechanism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Quality requirements that should be associated with data (4)

A

Quality
Relevance
Accuracy
Completeness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What must DR and BCP plans highlight?

A

Business sensitive data that must be retained

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is a retention period attribute used for?

A

System reads attribute and deletes file when period has passed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A data lifecycle describes…

A

How data flows through an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

PbD

A

Privacy by Design

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
PbD is based on...
Proactively into privacy into all levels of operations.
26
What is not a tradeoff or something to add after it has been built?
Privacy by Design
27
What integrates the promition of privacy in system design?
Privacy by Design
28
Who conceptualized Privacy by Design?
Anne Cavoukian
29
Meaning: Proactive, not reactive; Preventative, not remedial
Make privacy a consideration in the design phase instead of reacting to harms.
30
Meaning: Privacy as the Default Setting
The default of a system should preserve privacy.
31
Privacy as the Default example
Opt-in instead of Opt-out
32
Contextual integrity
Personal information handled based on norms (situational expectations)
33
Meaning: Privacy Embedded into Design
Privacy is integral to design. System can't be used without privacy features.
34
Meaning: Full functionality - Positive sum, not zero sum
Getting full performance while protecting privacy. | Privacy is not a trade-off
35
Meaning: End-to-end Security-Full lifecycle protection
Assess privacy risks in each stage of the information lifecycle.
36
Meaning: Visibility and Transparency - Keep it open
Providing notice. Gives people a choice.
37
Meaning: Respect for user privacy; keep it user centric
Designing for privacy and respecting Individuals needs and risks
38
IAPP Risk calculation
Potential Threat + Impact of threat + Likelihood
39
Risk management options (4)
Accept Transfer Mitigate Avoid
40
FIPPs
Privacy values that work alongside compliance models | High level compared to legal compliance
41
Which privacy model is a high-level privacy strategy?
FIPPs
42
Contextual integrity
Using PI in alignment with norms that apply to a particular context
43
Actors
Senders and receivers of PI
44
Nissenbaum's term: "Attributes"
Type of information being shared
45
Transmission principles
Govern the flow of information
46
What happens when disruptions from informational norms occur?
Privacy problems
47
What principle applies to identifying norms and designing for vulnerabilities?
Nissenbaum's contextual privacy
48
Ryan Calo
Law professor (Cyber law, privacy, and robotics)
49
Calo's harms dimensions (2)
Objective | Subjective
50
Attributes of objective harms (4)
Privacy violation Direct harm is known Forced or unanticipated use of PI Measurable and Observable
51
Attributes of subjective harms
Expected or perceived harm | May not be observable or measurable
52
Subjective harms can cause...(3)
Fear Anxiety Embarrassment
53
Subjective vs. Objective harms
Subjective is threat. Objective is actual experience. | Feelings vs. consequences
54
Why type of harm affects psychology and behavior?
Subjective
55
Which harm leads to lost business, lost trust, social detriment?
Objective
56
Freedom is impacted by...
privacy harms
57
What can be used to build and retain trust?
Privacy notices and controls
58
What does the NIST Privacy Framework do? (2)
Assist orgs in communicating and organizing privacy risk. | Guidance to build and evaluate privacy governance program
59
NICE Framework
Categorizes and describes cybersecurity work using common terminology
60
FAIR Model
Estimate risk Build range of potential risk Breaks down risk by its constituent parts
61
FAIR risk parts
Frequency and magnitude, and impact
62
What asks how often violation will occur and what time period?
FAIR model
63
Value-sensitive design
Design approach that accounts for moral and ethical values
64
Goal of value sensitive design
Stakeholders see their values reflected in the final design
65
Direct stakeholders
Directly interact with the system
66
Indirect stakeholders
Affected by the system but don't interact with it.
67
Value-sensitive design investigations (3)
Conceptual Empirical Technical
68
Direct and indirect stakeholder analysis
Stakeholders and the benefits, harms, or tesions that affect them are identified
69
Design thinking process (5)
``` Empathize Define Ideate Prototype Test ```
70
Which design method accounts for ethical values?
Value-sensitive design
71
What type of approach is the Design Thinking Process?
Iterative
72
What is the result of combining value-sensitive design with Design thinking?
Integration of values with current system design methodologies.