1. Privacy in the Modern Era Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

Who wrote an article in the Harvard Law Review with the right “to be left alone?”

A

Louis D. Brandeis (1890)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Olmstead v. United States

A

The 1927 case of Olmstead v. United States proved to be an incredibly important and influential decision. The case revolved around the prosecution of Washington state resident Roy Olmstead for attempting to smuggle and sell alcohol in violation of Prohibition. After suspecting Olmstead for years, the government gathered evidence by wiretapping Olmstead’s office phones without first obtaining a warrant. Olmstead argued that the police had violated his Fourth and Fifth Amendment rights. The Supreme Court, in a 5 – 4 decision, ruled that the government could use the evidence obtained from wiretapping. The “Exclusionary Rule,” which holds that illegally-obtained evidence may not be used against defendants at trial, was in force at the time. However Chief Justice William Taft cited previous decisions which characterized the Fourth Amendment as only applying to physical search and seizure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Carpenter v. United States

A

Carpenter v. United States “raises a specific question about whether Americans have an expectation of privacy in historical ‘cell-site location information,’” he writes. The 6th Circuit, on appeal, affirmed that the defendant did not have an expectation of privacy with his CSLI, and thus, law enforcement did not need a warrant. “Whether the Supreme Court endorses or rejects this logic, the answer has enormous implications for privacy rights,” according to Vladeck. More specifically, the implications of the decision “and for the relationship between new technology and constitutional understandings of privacy — will be profound.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define Privacy as stated by the Generally Accepted Privacy Principles (GAPP)

A

The rights and obligations of individuals and organizations with respect to the collection, use, retention, disclosure, and destruction of personal information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define Personal Information as stated by Generally Accepted Privacy Principles (GAPP)

A

Information that is or can be about or related to an identifiable individual.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What type of information falls within Sensitive Personal Information (SPI)?

A
  • Racial or ethnic origin
  • Political opinions
  • Religious or philosophical beliefs
  • Trade union membership
  • Genetic data
  • Biometric data used for the purpose of uniquely identifying a natural person
  • Health data
  • Data concerning a natural person’s sex life or sexual orientation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Who publishes a de-identification standard?

A

U.S. Department of Health and Human Services (HHS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is “expert determination?”

A

The involvement of a trained statistician who analyzes a de-identified dataset and determines that there is very little risk that the information could be used to identify an individual, even if that information is combined with other publicly available information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Safe harbor requires the removal of 18 different information types, what are they?

A
  1. Names
  2. Geographic divisions and Zip codes containing fewer than 20,000 people
  3. Month and day of a person’s birth, death, hospital admission or discharge or the age in years of a person over 89
  4. Telephone numbers
  5. Vehicle identifiers and serial numbers, including license plate numbers
  6. Fax numbers
  7. Device identifiers and serial numbers
  8. Email addresses
  9. Web URLs
  10. Social Security numbers
  11. IP addresses
  12. Medical record numbers
  13. Biometric identifiers, including finger and voice prints
  14. Health plan beneficiary numbers
  15. Full-face photographs and any comparable images
  16. Account numbers
  17. Any other uniquely identifying number, characteristic, or code
  18. Certificate/license numbers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is anonymization?

A

The process of taking personal information and making it impossible to identify the individual to whom the information relates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is aggregation?

A

Summarizing data about a group of individuals in a manner that makes it impossible to draw a conclusion about a single person.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Why should an organization care about privacy?

A
  1. Privacy is an ethical obligation
  2. Laws and regulations require privacy protections
  3. Poor privacy practices reflect poorly on an organization
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the 10 Generally Accepted Privacy Principles (GAPP)?

A
  1. Management
  2. Notice
  3. Choice and Consent
  4. Collection
  5. Use, retention, and Disposal
  6. Access
  7. Disclosure to Third Parties
  8. Security for Privacy
  9. Quality
  10. Monitoring and Enforcement
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the U.S. Department of Commerce (DOC) 4 goals?

A
  1. Foster a culture of privacy and disclosure and demonstrate leadership through policy and partnership
  2. Provide outreach, education, training, and reports in order to promote privacy and transparency
  3. Conduct robust compliance and oversight programs to ensure adherence with federal privacy and disclosure laws and policies in all DOC activities
  4. Develop and maintain the best privacy and disclosure professionals i the federal government
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the three primary privacy roles?

A
  1. Data subjects
  2. Data controllers
  3. Data processors
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are Data Subjects?

A

The individuals about whom personal information is collected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are Data Controllors?

A

The organizations who determine the purpose and means of collecting personal information from the data subjects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are Data Processors

A

Service providers who collect or process personal information on behalf of data controllers.

19
Q

What are the steps in developing a Privacy Program?

A
  1. Craft strategy, goals, and objectives
  2. Appoint a Privacy Official
  3. Establish privacy roles
  4. Build inventories
  5. Conduct a privacy assessment
  6. Implement privacy controls
  7. Ongoing operation and monitoring
20
Q

What is a privacy notice?

A

The primary means that an organization uses to convey the details of its privacy policy to end users.

21
Q

What is the purpose of a privacy program?

A

To safeguard the privacy rights that individuals have to their personal information.

22
Q

What is the purpose of cybersecurity?

A

To protect the confidentiality, integrity, and availability of data maintained by an organization.

23
Q

GDPR what are the “special category data?”

A
  • Personal data revealing racial or ethnic origin;
  • Personal data revealing political opinions;
  • Personal data revealing religious or philosophical beliefs;
  • Personal data revealing trade union membership;
  • Genetic data;
  • Biometric data (where used for identification purposes);
  • Data concerning health;
  • Data concerning a person’s sex life; and
  • Data concerning a person’s sexual orientation.
24
Q

What are the 7 foundational principles of “Privacy by Design?”

A
  1. Proactive, not Reactive; Preventive, not Remedial
  2. Privacy as the Default Setting
  3. Privacy Embedded into Design
  4. Full Functionality - Positive-Sum, not Zero-Sum
  5. End-to-End Security - Full Lifecycle Protection
  6. Visibility and Transparency - Keep it Open
  7. Respect for User Privacy - Keep it User-Centric
25
Q

Which of the following types of information should be protected by a privacy program?
A. Customer records
B. Product plans
C. Trade secrets
D. All of the above

A

A. Customer records.

Privacy programs are specifically intended to protect personal information.

26
Q

Barry is consulting with his organization’s cybersecurity team on the development of their cybersecurity program. Which one of the following would not be a typical objective of such a program?
A. Privacy
B. Confidentiality
C. Availability
D. Integrity

A

A. Privacy

The three main goals of a cybersecurity program are confidentiality, integrity, and availability.

27
Q

Howard is assisting his firm in developing a new privacy program and wants to incorporate a privacy risk assessment process into the program. If Howard wishes to comply with industry best practices, how often should the firm conduct these risk assessments?
A. Monthly
B. Semiannually
C. Annually
D. Biannually

A

C. Annually

Industry best practice calls for an annual privacy risk assessment designed to analyze the organization’s current practices in light of the evolving privacy environment.

28
Q

Of the following fields, which fits into the “special categories of personal data” under GDPR?
A. Banking records
B. Union membership records
C. Educational records
D. Employment records

A

B. Union membership records

29
Q

Katie is assessing her organization’s privacy practices and determines that the organization previously collected customer addresses for the purpose of shipping goods and is now using those addresses to mail promotional materials. If this possibility was not previously disclosed, what privacy principle is the organization most likely violating?
A. Quality
B. Management
C. Notice
D. Security

A

C. Notice

Organizations should provide notice to data subjects before they use information for a purpose other than those that were previously disclosed.

30
Q

Kara is the chief privacy officer of an organization that maintains a database of customer information for marketing purposes. What term best describes the role of Kara’s organization with respect to that database?
A. Data subject
B. Data custodian
C. Data controller
D. Data processor

A

C. Data controller

The organization is collecting and processing this information for its own business.

31
Q

Richard would like to use an industry standard reference for designing his organization’s privacy controls. Which one of the following ISO standards is best suited for this purpose?
A. ISO 27001
B. ISO 27002
C. ISO 27701
D. ISO 27702

A

C. ISO 27701

Privacy Information Management | IT Governance

32
Q

Which of the following organizations commonly requests a formal audit of a privacy program?
A. Management
B. Board of directors
C. Regulators
D. All of the above

A

D. All of the above

Unlike assessments, audits are always performed by an independent auditor who does not have a vested interest in the outcome.

33
Q

Which element of a privacy program is likely to remain unchanged for long periods of time?
A. Mission
B. Goals
C. Objectives
D. Procedures

A

A. Mission

The mission of a privacy program should be written at a high level as an enduring document. The goals, objectives, and procedures of a privacy program may change frequently as business needs and privacy requirements change.

34
Q

Tonya is seeking to de-identify a set of records about her organization’s customers. She is following the HHS guidelines for de-identifying records and is removing ZIP codes associated with small towns. What is the smallest population size for which she may retain a ZIP code?
A. 1,000
B. 2,000
C. 10,000
D. 20,000

A

D. 20,000

The HHS guidelines for the de-identification of records specify that ZIP codes should be included only if the region represented by the ZIP code has 20,000 or more residence.

35
Q

Which one of the following statements is not correct about privacy best practices?
A. Organizations should maintain personal information that is accurate, complete, and relevant.
B. Organizations should inform data subjects of their privacy practices.
C. Organizations should retain a third-party dispute resolution service for handling privacy complaints.
D. Organizations should restrict physical and logical access to personal information.

A

C. Organizations should retain a third-party dispute resolution service for handling privacy complaints.

Organizations should maintain a dispute resolution process, there is no requirement that it be run by a third party.

36
Q

Which one of the following is not a common responsibility for an organization’s chief privacy officer?
A. Managing privacy risks
B. Encrypting personal information
C. Developing privacy policy
D. Advocating privacy strategies

A

B. Encrypting personal information

It would be unusual for someone in this role to be involved in the actual encryption of personal information.

37
Q

When designing privacy controls, an organization should be informed by the results of what type of analysis?
A. Impact analysis
B. Gap analysis
C. Business analysis
D. Authorization analysis

A

B. Gap analysis

The gap analysis is the formal process of identifying deficiencies that prevent an organization from achieving its privacy objectives. The results of the gap analysis may be used to design new controls.

38
Q

Which one of the following is an example of active online data collection?
A. Users completing an online survey
B. Collecting IP addresses from websites
C. Tracking user activity with web cookies
D. Authorization analysis

A

A. Users completing an online survey

Active data collection techniques directly request data from the subject, such as in an online survey or other form. Passive data collection techniques gather and analyze data automatically, such as by analyzing a user’s web browsing traffic.

39
Q

Which one of the following would not normally appear in an organization’s privacy notice?
A. Types of information collected
B. Contact information for the data controller
C. Detailed descriptions of security controls
D. Categories of recipients to whom personal information is disclosed

A

C. Detailed descriptions of security controls

May contain general descriptions of security controls, but it would not normally contain detailed descriptions of those controls.

40
Q

Gwen is investigating a security incident where attackers deleted important medical records from a hospital’s electronic system. There are no backups and the information was irretrievably lost. What cybersecurity goal was most directly affected?
A. Integrity
B. Privacy
C. Confidentiality
D. Availability

A

D. Availability

The most direct impact is the records were irretrievably deleted, causing an availability breach.

41
Q

When creating his organization’s privacy policy, Chris wrote a simplified version of the policy and placed it at the top of the document, following it with the legal detail. What term best describes this approach?
A. Layered policy
B. Filtered policy
C. Redacted policy
D. Condensed policy

A

A. Layered policy

Simplified version appears first, followed by the full legal and technical details.

42
Q

Under the Privacy by Design philosophy, which statement is correct?
A. Organizations should design systems to respond to privacy lapses that occur
B. Privacy should be treated as requiring trade-offs with business objectives
C. Organizations should strictly limit the disclosure of their privacy practices
D. Privacy should be embedded into design

A

D. Privacy should be embedded into design

Organizations should strive for a positive-sum approach to privacy that does not treat privacy as requiring trade-offs. Organizations should design privacy mechanisms with visibility and transparency in mind. Systems should be designed to prevent privacy risks from occurring in the first place, not to respond to privacy lapses that do occur.

43
Q

In what Supreme Court case did the term “right to be let alone” first appear?
A. Olmstead v. United States
B. Carpenter v. United States
C. Roe v. Wade
D. Katz v. United States

A

A. Olmstead v. United States

Justice Louis Brandeis used the term “right to be let alone” in a dissenting opinion in Olmstead v. United States. This opinion was later cited in Roe v. Wade, Katz v. United States, and Carpenter v. United States

44
Q

Matt wants to share some information gathered from student records but is concerned about disclosing personal information. To protect privacy, he discloses only a table of summary statistics about overall student performance. What technique has he used?
A. Anonymization
B. De-identification
C. Aggregation
D. Redaction

A

C. Aggregation

A technique that only reports summary information about a population in a manner that avoids disclosing information that may be traced back to a single person.