LESSON 4: TECHNOLOGY AND PRIVACY Flashcards

(62 cards)

1
Q

Data privacy, also called

A

information privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

is the aspect of information technology (IT) that deals with the ability an organization or individual has to determine what data in a computer system can be shared with third parties.

A

data privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  • is the intrusion into the personal life of another, without just cause, which can give the person whose privacy has been invaded a right to bring a lawsuit for damages against the person or entity that intruded.
A

Invasion of privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  • is the deliberate use of someone else’s identity, usually as a method to gain a financial advantage or obtain credit and other benefits in the other person’s name, and perhaps to the other person’s disadvantage or loss.

The person whose identity has been assumed may suffer adverse consequences, especially if they are held responsible for the perpetrator’s actions.

A

Identity theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  • is when someone steals your personal information and uses it without your permission. This information could consist of your name, address, date of birth, social security number, etc. When your personal information is stolen and used to commit a crime or some type of fraud, that’s considered identity theft.
A

Identity theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The following are some of the primary features provided in identity theft protection services:

A

● Social Security Monitoring
● Social Media Monitoring
● Address Change Verification
● Pay Day Loan Monitoring
● Court Record Monitoring
● Sex Offender Registration
● Bank and Credit Card Activity Alerts
● Credit Score Monitoring
● Credit Score Reporting
● Bank Account Takeovers
● Identity Theft Insurance Coverage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

According to Cambridge Dictionary, it is the state of being alone, or the right to keep one’s personal matters and relationships secret.

A

Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

is the desire of an individual to be free of intrusion.

A

privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

refers to then freedom of a person to make one’s own decision without interference by other people regarding matters seen to be intimate and personal decisions.

A

Constitutional or Decisional Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

refers with the interest of individuals in exercising control over access to information about themselves

A

Informational Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

information relating to an identified or identifiable individual; )

A

personal data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

is one who can be identified, directly or indirectly, in particular by reference to an identification number (e.g. social security number) or one or more factors specific to his physical, physiological, mental, economic, cultural or social identity (e.g. name and first name, date of birth, biometrics data, fingerprints, DNA

A

identifiable person

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  • It is the policy of the State to protect the fundamental human right of privacy, of communication while ensuring free flow of information to promote innovation and growth.
A

Chapter 1, Section 2: Declaration of Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Why Privacy matters?

A

1.Limit on Power
2. Respect for Individuals
3. Maintaining Appropriate Social Boundaries
4. Trust
5. Freedom of Thought and Speech
6. Freedom of Social and Political Activities
7. Ability to Change and Have Second Chances
8. Not Having to Explain or Justify Oneself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  • The more someone knows about us, the more power they can have over us. Personal data is essential to make important decisions in our lives. Once that data lands into someone’s hand, they can use that information to influence our decisions and shape our behavior. It can used as a tool to exercise control over us.
A

Limit on Power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  • Privacy is about respecting individuals. Every person has a reason why they want to keep something for themselves, and we need to respect that.
A

Respect for Individuals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
  • People set boundaries from others in society. May it be physical or informational boundary. There are times that we want space or a place to be alone. Or for some people, they don’t want too much physical contact to other people.
A

Maintaining Appropriate Social Boundaries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
  • In relationships, whether personal or professional, we depend upon trusting the other party. In professional relationships such as our relationships with doctors and lawyers, this trust is the key to maintaining candor in the relationship. When trust is breached in one relationship, it could make us more reluctant to trust in other relationships.
A

Trust

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
  • Privacy is one of the keys to freedom of thought. A watchful eye over everything we read, or watch can chill us from exploring ideas outside the mainstream.
A

Freedom of Thought and Speech

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
  • Privacy helps protect our ability to associate with other people and engage in political activity. A key component of freedom of political association is the ability to do so with privacy if one chooses. The watchful eye can disrupt and unduly influence these activities.
A

Freedom of Social and Political Activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
  • People are not static; they change and grow throughout their lives. There is a great value in the ability to have a second chance, to be able to move beyond a mistake, to be able to reinvent oneself. Privacy nurtures this ability. It allows people to grow and mature without being shackled with all the foolish things they might have done in the past.
A

Ability to Change and Have Second Chances

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
  • An important reason why privacy matters is not having to explain or justify oneself. We may do a lot of things which, if judged from afar by others lacking complete knowledge or understanding, may seem odd or embarrassing or worse.
A

Not Having to Explain or Justify Oneself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q
  • happens when someone steals your personal information (name, Social Security number, credit card information, etc.) for financial gain and other highly illegal purposes
A

Online identity theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

is quickly becoming the most likely way your identity could be stolen.

A

Hacking a computer or mobile device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
20 TYPES OF IDENTITY THEFT AND FRAUD
1. Driver's License Identity Theft 2. Mail Identity Theft 3. Debit Card Fraud or Credit Card Fraud 4. Online Shopping Fraud 5. Social Security Number Identity Theft 6. Account Takeover Identity Theft 7. Senior Identity Theft/Senior Scams 8. Child Identity Theft 9. Tax Identity Theft 10. Biometric ID Theft 11. Criminal Identity Theft 12. Synthetic Identity Theft 13. New Account Takeover 14. Medical Identity Theft 15. Loan Stacking Fraud 16. Mortgage Fraud 17. Auto Lending Fraud 18. Employment Identity Theft 19. Bust-Out Fraud 20. Internet of Things Identity Theft
25
is the most common form of ID theft. The person who stole your ID may try to buy items under your name and get other forms of identification with their picture which can lead to criminal identity theft. You
Driver's license theft
26
is one of the oldest ways for a criminal to steal your personal information
Mail identity theft
27
is when someone uses your credit card or credit account to make a purchase you didn't authorize. Fraudsters can also steal your credit card account number, PIN and security code to make unauthorized transactions, without needing your physical credit
Credit card fraud or debit card fraud
28
occurs when a criminal leverage stolen payment information or fraudulently acquired bank or credit card accounts to attempt retail transactions without the account owner's knowledge.
Online shopping fraud or ecommerce fraud
29
can usually happen from data breaches or Tax ID theft. If you start to notice mail that lists the wrong last four digits of your SSN or the wrong name or address this may be a sign of fraud or ID theft
Social security number (SSN) identity theft
30
occurs when criminals gain or have access to your bank or credit card accounts—usually because of a data breach, phishing scam, or malware attack—and start making charges to those accounts.
Account Takeover Identity Theft (Account takeover fraud)
31
are very common as older Americans may not be checking their accounts or financial reports often since they're typically not opening as many new accounts or seeking new credit.
Senior identity theft or senior scams
32
may not be as common as other types of ID theft, but it is very attractive to thieves. That is because there is usually no credit history established for the children who become victims. Scammers sometimes use children's
Child identity theft
33
happens when fraudsters have your name and Social Security number and file a tax return in your name before you file yours. In some cases, the fraudsters use fake income and withholding numbers so they can get a bigger refund check sent to their address.
Tax identity theft
34
is when the physical or behavioral characteristics used to verify a person's identity through a device are stolen. These characteristics are measurable, such as a fingerprint or voice recognition "Hey, Alexa", that can be copied and recorded. These attributes are unique to individuals but in the wrong hands can be used to manipulate devices or people.
Biometric ID theft
35
is when a criminal gives your information to a police officer or law enforcement. This can happen when your ID is lost or stolen and in the possession of a criminal.
Criminal identity theft
36
is the fastest-growing type of ID fraud, representing 80-to-85% of all current identity fraud, according to the FTC.
Synthetic identity theft
37
merges real and fake personal consumer data to create a new identity using information such as Social Security numbers, names, addresses, and birthdays that can be bought on the dark web.
Synthetic ID theft
38
is when a criminal creates a new account under your name using personal information, they received from stealing your data, either directly or via a data breach. It is a combination of both synthetic identity theft and account takeover theft.
New account takeover or new account identity theft
38
can be harder to discover than other types of ID theft because it happens when someone steals another person's identity to obtain medical services.
Medical identity theft
39
occurs when multiple loans are taken out by borrowers who slide through today's automated approval process.
Loan stacking fraud
40
occurs when a borrower, broker or an appraiser lies about information on the application for a mortgage loan
Mortgage fraud
41
can be the same as mortgage fraud or loan stacking fraud and occurs when a consumer, a dealer or auto lender submits or accepts a fraudulent consumer application for credit.
Auto lending fraud
42
is when a criminal applies for a job using your Social Security number or ID. Employers report income to the IRS under your name, and the government expects you to pay taxes on all income earned in your name.
Employment identity theft
43
is first-party fraud scheme and a deliberate form of fraud or ID theft that is also known as sleeper fraud. It occurs when a consumer applies for credit and uses their own name or a synthetic identity with the intent of maxing out all available credit and eventually disappearing.
Bust-out fraud
44
is when your smartphones or tablets are paired with consumer products such as cars, heart monitors and household appliances that are connected to the Internet, creating an opportunity for hackers to steal your data
Internet of Things (IoT) identity theft
45
Four Ways to Reduce the Risk of Identity Theft
1. Monitor Your Credit 2. Keep Your Personal Documents Safe 3. Secure Your Online Data 4. Create Strong Passwords
46
People are not static; they change and grow throughout their lives. There is a great value in the ability to have a second chance, to be able to move beyond a mistake, to be able to reinvent oneself. Privacy nurtures this ability. It allows people to grow and mature without being shackled with all the foolish things they might have done in the past.
Ability to Change and Have Second Chances
47
It can happen with small businesses, commercial businesses, or even corporate account takeovers. This form of identity theft has been around for years. Watch out for unknown charges or decide if you want a credit lock as a preventative measure.
Account takeover fraud
48
It is when the physical or behavioral characteristics used to verify a person's identity through a device are stolen. These characteristics are measurable, such as a fingerprint or voice recognition "Hey, Alexa", that can be copied and recorded. These attributes are unique to individuals but in the wrong hands can be used to manipulate devices or people.
Biometric ID Theft
48
It can be the same as mortgage fraud or loan stacking fraud and occurs when a consumer, a dealer or auto lender submits or accepts a fraudulent consumer application for credit.
Auto Lending Fraud
49
They sometimes use children's Social Security numbers and other information to open new accounts, apply for government benefits, take out loans, and more. The child may not know their credit has been used to run up debt in their name until it's time to apply for school or car loans.
scammers
49
It is first-party fraud scheme and a deliberate form of fraud or ID theft that is also known as sleeper fraud. It occurs when a consumer applies for credit and uses their own name or a synthetic identity with the intent of maxing out all available credit and eventually disappearing. Lenders are left assuming all the risk as a result and bust-out fraud can happen from people using synthetic IDs or loan stacking methods.
burst out fraud
50
It is the policy of the State to protect the fundamental human right of privacy, of communication while ensuring free flow of information to promote innovation and growth. The State recognizes the vital role of information and communications technology in nation-building and its inherent obligation to ensure that personal information in information and communications systems in the government and in the private sector are secured and protected.
Privacy Right – Data Privacy Act 2012
51
A noun that refers to the physical and behavioral characteristics that distinguish males and females — Can refer to the sexual activity
sex
52
— A specific type of sexual activity — A noun that refers to the physical sexual contact between individuals that involve genetalia of at least one person
intercourse
53
— A formal noun that refers to the physical act of sex between two people
Sexual Intercourse
54
Any kind of sexual activity that people do with/ on the internet.
virtual sex
55
form of virtual sex
watching sexy blogs online role playing sexting phone sex kink power play
55
Online child sexual exploitation includes a wide range of behaviours and situations. Most commonly this includes grooming, live streaming, consuming child sexual abuse material and coercing and blackmailing children for sexual purposes
child pornography
55
A romantic or personal connection between individuals who primarily interact and get to know each other through the internet, meaning they communicate primarily through online platforms like social media, messaging apps, or dating sites, rather than meeting in person regularly.
online relationship
55
online relationships
cyberdating situationship casual commited relationship