VI - Privacy by Design Flashcards

1
Q

Goal Setting

A

Balance org needs, manadate privacy requirements and the cultivation of customer trust/loyalty.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Document Requirements

A

Privacy technologists need to understand privacy requirements and be able to differentiate between:

Functional requirements - functions of the system
Nonfunctional requirements - What the system shouldn’t do.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

identifying quality attributes

A

Nonfunctional requirements used to evaluate how a system is performing. Attributes include:

Identifiability
Network centricity 
Confidentiality
Integrity
Mobility
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Identifying information needs

A

Identify what is the least amount of personal info needed to accomplish the goal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

High-level design

A

How the larger parts of the system work together. Like macroeconomics. Surface-level information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Low-level design

A

The details of the high-level design system. Like microeconomics. More nuanced and specific.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Imposing Controls

A

Reduces a threat actor’s access to PII and minimizes privacy risks when collecting and processing information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Architecture (Imposing Controls)

A

Reduces the identifiability of information and decentralizes operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Supervision (Imposing Controls)

A

Enables an org to enforce privacy policies through processes, and by demonstrating that other actors (e.g. third parties) are also compliant with those polices/processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Security (Imposing Controls)

A

Data shared across domains can be secured through an “abstract and hide” strategy (e.g. encryption).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Balance (Imposing Controls)

A

Informs data subject and grants them control over data in order to reduce the imbalance of information and power.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Testing and Validation

A

Ensuring the system performs as intended (verification/testing) and satisfies the needs of the intended user base (validation).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly